期刊文献+

一种基于数据依赖关系的软件水印算法 被引量:3

Software Watermarking Algorithm Based on Dataflow Dependence
下载PDF
导出
摘要 提出了一种基于数据依赖关系的软件水印算法。算法将水印信息编码为数据依赖图,选取目标程序的部分数据作为数据依赖图节点,通过添加数据之间的依赖关系将水印嵌入到目标程序中。实验及分析表明该水印算法能够抵御多种非数据流攻击方式的攻击,具有较好的鲁棒性;并且水印嵌入时利用了目标程序的数据,所嵌入的代码与程序中原有代码类似,具有较好的隐蔽性。 A software watermarking algorithm is proposed based on dataflow dependence. The watermark is encoded as the data dependency graph, the data of the original program is selected as the node of the data dependency graph, and the watermark is embedded into the program by adding the data dependence. Experiments and analysis shows that the algorithm has good resilience of obfusca- tion attacks; because the watermark embedding uses the data of the original program, the code em- bedded into the program is similar to the original code, and the algorithm has good stealth.
出处 《信息工程大学学报》 2015年第2期245-250,共6页 Journal of Information Engineering University
关键词 软件水印 数据流 软件保护 software watermark dataflow software protection
  • 相关文献

参考文献12

  • 1Davidson R, Myhrvold N. Method and system for generating and auditing a signature for a computer program[ P]. US Patent 5,559,884, 1996.
  • 2Qu G, Potkonjak M. Analysis of watermarking techniques for graph coloring problem [ C ]//Proceedings of the 1998 IEEE/ ACM international conference on Computer-aided design. 1998: 190-193.
  • 3Stern J, Hachez G, Koeune F, et al. Robust object watermarking: application to code[ C]//Information Hiding. 1999: 368- 378.
  • 4Venkatesan R, Vazirani V, Sinha S. A graph theoretic approach to software watermarking [ C ]//Information Hiding. 2001: 157-168.
  • 5Collberg C, Carter E, Debray S, et al. Dynamic path-based software watermarking[ J]. ACM SIGPLAN Notices, 2004, 39 (6) : 107-118.
  • 6Collberg C, Huntwork A, Carter E, et al. More on graph theoretic software watermarks: Implementation, analysis, and at- tacks[ J]. Information and Software Technology, 2009, 51 ( 1 ) : 56-67.
  • 7M oskowitz S A, Cooperman M. Method for stega-cipherprotection of computer code[ Z]. The Dice Company, 1996.
  • 8Palsberg J, Krishnaswamy S, Kwon M, et al. Experience with Software Watermarking[ C ]//Annual Computer Security Appli- cations Conference. 2000: 308-316.
  • 9Feng B, Zhang M, Xu G, et al. Dynamic data flow graph-based software watermarking[ C]//2009 IEEE international Confer- ence on Network Infrastructure and Digital Content. 2009: 1029-1033.
  • 10Collberg C, Nagra J. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection[ D ]. Addison Wesley Professional, 2010.

同被引文献12

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部