期刊文献+

一种基于防篡改的基数编码水印图 被引量:1

A WATERMARKING GRAPH WITH RADIX ENCODING BASED ON TAMPER-PROOFING PROPERTY
下载PDF
导出
摘要 在研究基数K编码动态图软件水印的基础上,针对其对多种形式的攻击表现抗攻击力弱的特点,提出了一种旨在提高抗攻击的防篡改方案。在考虑编码效率的前提下,引入对程序中的常量进行编码,并使得常量编码依赖于软件水印的编码结构。当攻击者在篡改软件水印结构以后,提取常量时将得不到正确的值,引起程序执行失败。从而能够有效地保护嵌入在程序中的软件水印信息。 In this paper we study the software watermarks of dynamic graph with radix-k encoding.Since it has the shortcoming of weak attack-resistant against a variety of attacks,in light of this feature,we propose a tamper-proofing scheme aiming at enhancing its resistant property against the attacks.Considering the premises of encoding efficiency,we encode the constant in program and make the constant encoding rely on the encoding structure of software watermarks.After tampering the structure of software watermarking,the attackers can't get the correct value while extracting the constant,which lead to the failure of program execution.Therefore,the software watermarking information embedded in the program can be protected effectively.
出处 《计算机应用与软件》 CSCD 2011年第2期298-301,共4页 Computer Applications and Software
关键词 防篡改 基数K编码动态图 PPCT图 常量编码 Tamper-proofing Dynamic graph with radix-k encoding PPCT graph Constant encoding
  • 相关文献

参考文献6

  • 1张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89
  • 2Zhu W,Thomborson C,Wang F Y.A survey of software watermarking[R].Lecture Notes in Computer Science-Volume,2002(3495):454-458.
  • 3Collberg C,Thomborson C.Software watermarking:models and dynamie embeddings[C]//A iken A.Proceedings of the 26th Annual SIGPLIAN-AIGACT Symposium on Principles of Programming Languages (POPL'99).Association for Computing Machinery Press.1999:311-324.
  • 4Holmes,K.Computer Software Protection[C]//US Patent 5,287,407.Assignee:International Business Machines,1994.
  • 5Clark Thomborson,Jasvir Nagra,Ram Somaraju,et al.Tamper-prooring Software Watermarks[C]//Proc.Second Australasian Information Security Workshop,ACS,CRPIT,2004,(32):27-36.
  • 6Palsberg J,Krishnaswami S,Kwon M,et al.Experience with software watermarking[C]//Proc.16th Ann.Comp.Security Applications Conf.(AC-SAC00)',IEEE Computer Society,2001:308-316.

共引文献88

同被引文献9

  • 1Collerg C, Thomborson J, Towsend G M. Dynamic Graph- based Software Watermarking[R]. Technical Report: TR04-08, College of Information Sciences and Technology, Pennsylvania State University, 2004.
  • 2Lee H, Kaneko K. Two New Algorithms for Software Water- marking by Register Allocation and Their Empirical Evaluation[C]//Proc. of the 6th International Conference on Information Technology. [S. l.]: IEEE Press, 2009: 217-222.
  • 3Li Jun, Liu Quan. Design of a Software Watermarking Algorithm Based on Register Allocation[C]//Proc. of the 2nd International Conference on e-Business and Information System Security. [S. l.]: IEEE Press, 2010: 1-4.
  • 4Tang Zhanyong, Fang Dingyi. A Tamper-proof Software Watermark Using Code Encryption[C]//Proc. of IEEE International Conference on Intelligence and Security Informatics. [S. l.]: IEEE Press, 2011: 156-160.
  • 5Qu Gang, Potkonjak K. Analysis of Watermarking Techniques for Graph Coloring Problem[C]//Proc. of IEEE/ACM Inter- national Conference on Computer-aided Design. [S. l.]: IEEE Press, 1998: 190-193.
  • 6Myles G, Collberg C. Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks[C]//Proc. of the 14th International Conference on Information Security and Cryptology. Berlin, Germany: Springer, 2003: 274-293.
  • 7王慧娇,沙宗鲁,轩爱成.基于PPCT和基数k的动态图混合编码方案[J].计算机工程与应用,2010,46(25):109-111. 被引量:9
  • 8王朝坤,付军宁,王建民,余志伟.软件防篡改技术综述[J].计算机研究与发展,2011,48(6):923-933. 被引量:25
  • 9张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部