期刊文献+

基于哈希不透明谓词的JavaScript软件水印算法 被引量:1

A HASH OPAQUE PREDICATES-BASED SOFTWARE WATERMARKING ALGORITHM IN JAVASCRIPT
下载PDF
导出
摘要 针对现有软件水印算法存在性能开销大或无法抵抗各类攻击的缺点和鲜有在JavaScript源码中实现的现状,提出一种基于哈希不透明谓词的JavaScript软件水印算法。该算法构造一种新的基于除留余数法哈希映射不透明谓词并将软件水印信息嵌入不透明谓词的表达式中,进而构造此不透明谓词的永假基本块嵌入程序中实现软件水印。开发了一个基于此算法的JavaScript软件水印系统。实验证明,该算法能在增加较少的系统开销的前提下有效抵抗各种常见的静动态攻击,同时还能提高水印的隐秘性和鲁棒性。 Because of the weakness of current software watermarking algorithms in high performance overhead or suffering from various attacks,and of being scarcely implemented in JavaScript source code,we proposed a new hash opaque predicate-based JavaScript software watermarking algorithm. By constructing a new kind of hash-mapping opaque predicate,which is based on the method of remainder of division operation,and embedding the watermark information of software into opaque predicate expression,the algorithm constructs the everlasting basic block of this opaque predicate and embedding it into program to implement software watermarking. We also developed a JavaScript software watermarking system which is based on this algorithm. Experiments proved that the algorithm can effectively resist various common static and dynamic attacks on the premise of less system overhead increase,as well as improve the invisibility and robustness of the watermark.
出处 《计算机应用与软件》 CSCD 2016年第4期306-309,共4页 Computer Applications and Software
基金 广州市科技计划项目(2012Y2-00046 2013Y2-00043) 广东高校优秀青年创新人才培养计划项目(2012LYM_0054)
关键词 不透明谓词 除留余数法 软件水印 JAVASCRIPT Opaque predicate Method of remainder of division operation Software watermark JavaScript
  • 相关文献

参考文献12

  • 1Chan P P F,Hui L C K,Yiu S M.Heap graph based software theft detection[J].Information Forensics and Security,IEEE Transactions on,2013,8(1):101-110.
  • 2Patel,Swati J,Tareek M Pattewar.Software birthmark based theft detection of Java Script programs using agglomerative clustering and Frequent Subgraph Mining[C]//Embedded Systems(ICES),2014 International Conference on.IEEE,2014.
  • 3Ginger Myles,Christian Collberg,Zachary Heidepriem,et al.The evaluation of two software watermarking algorithms[J].Software:Practice and Experience,2005,35(10):923-938.
  • 4Wolfe G,Wong J L,Potkonjak M.Watermarking graph partitioning solutions[J].Computer-Aided Design of Integrated Circuits and Systems,IEEE Transactions on,2002,21(10):1196-1204.
  • 5Nagra,Jasvir,Clark Thomborson.Threading software watermarks[C]//Berlin:Springer Heidelberg,2005.
  • 6许金超,曾国荪.一种基于线程关系的软件水印算法[J].电子学报,2012,40(5):891-896. 被引量:8
  • 7Christian Collberg,Tapas Ranjan Sahoo.Software watermarking in the frequency domain:implementation,analysis,and attacks[J].Comput.Secur,2005,13(5):721-755.
  • 8汤战勇,房鼎益,苏琳.一种基于代码加密的防篡改软件水印方案[J].中国科学技术大学学报,2011,41(7):599-606. 被引量:7
  • 9Arboit,Genevieve.A method for watermarking java programs via opaque predicates[C]//The Fifth International Conference on Electronic Commerce Research(ICECR-5).2002.
  • 10Myles G,Collberg C.Software watermarking via opaque predicates:Implementation,analysis,and attacks[J].Electronic Commerce Research,2006,6(2):155-171.

二级参考文献25

  • 1史扬,曹立明,王小平.混淆算法研究综述[J].同济大学学报(自然科学版),2005,33(6):813-819. 被引量:12
  • 2LU Zheming LI Suzhi.Multipurpose Watermarking Algorithm for Secret Communication[J].Chinese Journal of Electronics,2006,15(1):79-84. 被引量:3
  • 3钮心忻,杨义先.信息隐写与隐写分析研究框架探讨[J].电子学报,2006,34(B12):2421-2424. 被引量:10
  • 4Collberg C, Thomborson C. Software watermarking: Models and dynamic embeddings[C]// Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. New York: ACM, 1999:311-324.
  • 5Collberg C, Thomborson C, Townsend G. Dynamic graph-based software watermarking[R]. Tucson, AZ, USA: University of Arizona, 2004: TR04-08.
  • 6Moskowitz S, Cooperman 1VL Method for stega-cipher protection of computer code: US, 5745569 [P]. 1998- 04-28[2011-04-15].
  • 7He Yong. Tamperproofing a Software Watermark by Encoding Constants [ D]. Auckland, New Zealand: University of Auckland, 2002.
  • 8Holmes K. Computer software protection: US, 5287407 [P]. 1994-02-15[2011-04-15].
  • 9Khiyal M, Khan A, Amjad S, et al. Evaluating effectiveness of tamper proofing on dynamic graph software watermarks [ J ]. International Journal of Computer Science and Information Security, 2009, 6 (3) : 57-63.
  • 10Collberg C, Jha S, Tomko D, et al. UWStego.. A general architecture for software watermarking [EB/ OL]. Madison, WI, USA: University of Wisconsin- Madison, 2001 [ 2011-04-15]. http://www. cs. wisc. edu/hbwang/watermark/TR.

共引文献26

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部