期刊文献+

一种Java软件水印植入虚方法的永假式构造 被引量:1

Design of Contradiction Structure for Dummy Method Insertion in Java Software Watermarking
下载PDF
导出
摘要 软件水印是近年来出现的软件版权保护技术,它通过在软件作品中嵌入版权信息(水印)来达到版权保护的目的。针对基于字节码的Java软件水印算法,提出一种永假式的构造设计方法,用于水印算法中虚方法的植入。利用Java语言的反射机制动态随机生成一个0、1字符串,对该字符串进行正反码编码和解码,得到一个始终全为0的字符串,以此作为永假式的条件,确保虚方法不被执行。永假式的构造具有良好的隐蔽性,能抵抗多种常见的水印攻击。 Software watermarking is a software copyright protection technology appeared in recent years. It achieves the purpose of copyright protection by embedding copyright information (watermark) into a software product. This paper proposed a design method of the contradiction structure for the dummy method insertion used in the bytecode based Ja- va software watermark algorithm. The Java reflection mechanism is used to dynamically generate a random string of 0 and 1. The string is then encoded and decoded using the technique of the positive and inverse coding to obtain a string of all zeros. This string is used as the condition of the contradiction structure,which ensures that the dummy method will never be executed. The presented contradiction structure has good concealment and can resist various watermark attacks.
出处 《计算机科学》 CSCD 北大核心 2013年第12期211-214,共4页 Computer Science
基金 国家自然科学基金面上项目(61171132) 江苏省自然科学基金项目(BK2010280) 南通市应用研究计划项目(BK2011026)资助
关键词 软件水印 虚方法 永假式 JAVA反射机制 正反码 Software watermarking, Dummy method, Permanent false expression,Java reflection mechanism, Positive and inverse code
  • 相关文献

参考文献9

  • 1Collberg C, Thomborson C. Watermarking, tamper-proofing, and Obfuscation--Tools for Software Proteetion[J]. IEEE Transac- tions on Software Engineering, 2002,28(8) : 735-746.
  • 2张立和,杨义先,钮心忻,牛少彰.软件水印综述[J].软件学报,2003,14(2):268-277. 被引量:89
  • 3Zhu W, Thomborson C, Wang F. A Survey of Software Water- marking[C] IEEE International Conference on Intelligence and Security Informaties. 2005 : 454-458.
  • 4Hamilton J ,Danicic S. A survey of static software watermarking [C]IEEE World Congress on Internet Security. 2011 : 100-107.
  • 5鲍福良,彭俊艳,方志刚.Java类文件保护方法综述[J].计算机系统应用,2007,16(6):124-126. 被引量:5
  • 6周正虎,陈丹,周光霞,赵鑫.基于病毒多态性的Java软件水印技术[J].计算机与数字工程,2011,39(11):97-100. 被引量:2
  • 7Monden A, Iida H, Matsumoto K, et al. A Practical Method for Watermarking Java Programs [C]//The 24th International Computer Software and Applications Conference. 2000:191-197.
  • 8王春红,陈建平,王杰华,朱勤.基于字节码的Java软件水印的研究与实现[J].微电子学与计算机,2009,26(9):146-149. 被引量:2
  • 9樊昌信,曹丽娜.通信原理[M].北京:国防工业出版社,2010.

二级参考文献27

  • 1张敦华,刘建.Java动态类加载机制及其应用[J].计算机工程与设计,2004,25(3):432-435. 被引量:18
  • 2陈刚.基于封装包的Java源代码安全保护[J].电子信息对抗技术,2006,21(3):45-48. 被引量:2
  • 3鲍福良,彭俊艳,方志刚.Java类文件保护方法综述[J].计算机系统应用,2007,16(6):124-126. 被引量:5
  • 4William Zhu, Clark Thomborson, Fei- Yue Wang. A survey of software watermarking. Intelligence and security informatics[ C]//IEEE International Conference on Intelligence and Security Informatics. Atlanta, USA, 2005:454 - 458.
  • 5Christian Collberg, Clark Thomborson. Software watermarking: models and dynamic embeddings[ C]//Principles of Programming Languages. Auckland, 1999 : 311 - 324.
  • 6Akito Moden, Hajimu Iida, Ken- ichi Matsumoto, et al. A practical method for watermarking java programs[ C]// The 24th Computer Software and Applications Conference. Taiwan, Taipei, 2000.
  • 7Seventh Annual BSA/IDC Global Software 09 Piracy Study[EB/OL]. www. bsa. org/globalstudy,2010.
  • 8C. Collberg, C. Thomborson. Software watermark- ing Models and Dynamic Embeddings[C]//26th ACM SIGPLAN-SIGACT Symposium on Principles of Pro- gramming Languages, 1999.
  • 9Stern J, Hachez G, Koenue F. Robust Object Water- marking.. Application to Code [C]//Proceedings of the 3rd International Workshop on Information Hiding. Springer-Verlag, 19 9 9.
  • 10C. Collberg, A. Huntwork, E. Carter. Graph theo- retic software watermarks: Implementation, analysis andattacks[C]//6th International Information Hiding Workshop, 2004.

共引文献114

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部