期刊文献+

基于同态的动态数据隐藏 被引量:3

Dynamic Data Hiding Based on Homomorphism
原文传递
导出
摘要 针对程序中的关键数据的保护问题,动态数据隐藏是个可行的方法。总结了软件保护的相关技术;介绍了软件混淆的基本思想;提出利用整数环上的同态加密机制进行数据加密和利用同态性质进行数据混淆的基本思路。设计出一个通过同态加密和同态数据混淆以实现动态数据隐藏的基本模型。最后指出动态数据隐藏和其它的软件保护技术相结合的主要方向。 In order to achieve software protection, dynamic data hiding makes use of homomorphic encryption scheme and data obfuscation to protect the key data in program. This paper reviews the technology of software protection, introduces the basic content of the software obfuscation, uses homomorphic encryption scheme in the integer ring to achieve data encryption and uses its character to achieve data obfuscation. A model of dynamic data hiding using homomorphic encryption scheme and homomorphic data obfuscation is designed. In the end, the main way of uniting dynamic data hiding and other software protection methods is pointed out.
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2009年第23期96-99,共4页 Journal of Wuhan University of Technology
基金 国家自然科学基金(60773008)
关键词 动态数据隐藏 同态加密 数据混淆 dynamic data hiding homomorphic encryption data obfuscation
  • 相关文献

参考文献3

二级参考文献41

  • 1史扬,曹立明,王小平.Java混淆器的设计与实现[J].计算机应用,2004,24(11):63-65. 被引量:5
  • 2史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 3高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 4Daemen J,Rijmen V.The block cipher rijndael,smart card research and applications[A].Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,2000.288-296.
  • 5Jansen W.Countermeasures for mobile agent security[J].Computer Communications,2000,13:1667-1676.
  • 6Sander T,Tschudin C F.Protecting mobile agents against malicious hosts[A].Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1998.44-60.
  • 7Collberg C,Thomborson C.Software watermarking:Models and dynamic embeddings[A].Proceedings of Symposium on Principles of Programming Languages[C].New York:ACM Press,1999.311-324.
  • 8Naumovich G,Memon N.Preventing piracy,reverse engineering,and tampering[J].Source Computer Archive,2003,36(7):64-71.
  • 9Kahng A B,Lach J,Mangione-Smith W H,et al.Watermarking techniques for intellectual property protection[A].Proceedings of the 35th Annual Conference on Design Automation[C].New York:ACM Press,1999.776-781.
  • 10Lindholm T,Yellin F.The Java virtual machine specification[M].New York:Addison-Wesley,1997.

共引文献19

同被引文献25

  • 1史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 2袁征,冯雁,温巧燕,张华.构造一种新的混淆Java程序的不透明谓词[J].北京邮电大学学报,2007,30(6):103-106. 被引量:9
  • 3Wang Chenxi.A security architecture for survivability mechanisms[D].Virginia:University of Virginia,2001.
  • 4Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations[R].New Zealand:Department of Computer Science,University of Auckland,1997:1-36.
  • 5Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaque constructs[C]//Proc of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.New York:ACM Press,1998:184-196.
  • 6Collberg C,Thomborson C,Low D.Breaking abstractions and unstructuring data structures[C]//Proc of International Conference on Computer Languages.[S.l.]:IEEE Press,1998:28-38.
  • 7Collberg C,Thomborson C,Low D.Obfuscation techniques for enhancing software security:U.S.,6668325[P].2003-12-23.
  • 8Chan J T,Yang W.Advanced obfuscation techniques for Java bytecode[J].Journal of Systems and Software,2004,71(1-2):1-10.
  • 9De A R,Van L O.Stealthy obfuscation techniques:misleading the pirates[D].Enschede:Department of Computer Science,University of Twente Enschedc,2003.
  • 10Sosonkin M,Naumovich G,Memon N.Obfuscation of design intent in object-oriented applications[C]//Proc of the 3rd ACM Workshop on Digital Rights Management.New York:ACM Press,2003:142-153.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部