期刊文献+

基于系统函数调用频率与指令基本块的软件胎记 被引量:2

Software Birthmark Based on System Function Call Frequency and Basic Block Instruction
下载PDF
导出
摘要 软件胎记作为软件独有的内部属性,常被用来检测不同软件之间的相似度。在研究软件胎记的基础上,提出一种将2种不同粒度级的动态胎记相结合的软件胎记提取方法。该方法以程序执行时调用的系统函数及其频率作为粗粒度级胎记,用户自定义函数执行时的指令基本块作为细粒度级胎记,将2种胎记相结合作为软件的最终胎记。仿真实验结果表明,与单一粒度级别的胎记方法相比,该方法提高了软件胎记的可信性和可靠性,具有更强的抗攻击能力。 As unique internal properties, software birthmark is often used to detect the similarity between different software. On the basis of researching software birthmark, this paper proposes a new method combining two dynamic birthmarks with different granularity to be a new software birthmark. The coarse-graired birthmark is the system function called by the executing program and the call frequency, and the fine-grained birthmark is the set of basic block instruction when user-defined function is executing. The combination of the two birthmarks is the final software birthmark. Simulation experimental results show that compared with the method using single-granularity birthmark, the proposed method improves the credibility and the reliability of software birthmark, and it has stronger ability to resist attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第10期86-90,共5页 Computer Engineering
基金 国家自然科学基金资助项目"手机视频直播系统QoE/QoS关键问题研究"(61379079) 国家科技支撑计划基金资助项目"三维动漫制作技术研究与应用示范"(2014BAH09F00)
关键词 软件胎记 系统函数 基本块 相似度 可信性 可靠性 software birthmark system function basic block similarity credibility reliability
  • 相关文献

参考文献16

  • 1Tamada H, Nakamura M, Monden A, et al. Java Birthmarks-detecting the Software Theft [J]. IEICE Transactions on Information and Systems ,2005 ,E88-D( 1 ) : 2148-2158.
  • 2Ginger M,Christian S C. K-gram Based Software Birth- marks [ C ]//Proceedings of ACM Symposium on Applied Computing. Santa Fe,USA: ACM Press,2005:314-318.
  • 3邓小鸿,拜亚萌,黄斌,满君丰.一种可检测Java程序盗版的动态胎记技术[J].计算机工程与应用,2010,46(17):69-71. 被引量:1
  • 4陈林,刘粉林,芦斌,谢鑫.基于k-gram频数的静态软件胎记[J].计算机工程,2011,37(4):46-48. 被引量:7
  • 5Liu Fenlin, Lu Bin, Chen Lin. A Software Birthmark Based on Weighted k-gram [C]//Proceedings of 2010 Conference on Intelligent Systems. Washington D. C 400-405. Computing and Intelligent , USA: IEEE Press, 2010:.
  • 6马世鑫,刘粉林,罗向阳,芦斌.基于互信息的k-gram软件胎记选取[J].计算机工程,2012,38(22):43-46. 被引量:1
  • 7罗养霞,房鼎益.基于聚类分析的软件胎记特征选择[J].电子学报,2013,41(12):2334-2338. 被引量:7
  • 8李菲菲,周清雷.基于信息增益的软件特征技术[J].计算机应用研究,2014,31(7):2082-2084. 被引量:1
  • 9Myles G,Collberg C. Detecting Software Theft via Whole Program Path Birthmarks [ C]//Proceedings of the 7th International Conference on Information Security. Washington D. C.,USA: IEEE Press ,2004:404-415.
  • 10Tamada H, Okamoto K, Nakam M, et al. Dynamic Software Birthmarks to Detect the Theft of Windows Appli- cations [C]//Proceedings of International Symposium on Future Software Technology. Washington D. C., USA : IEEE Press ,2004 : 125-136.

二级参考文献94

  • 1鲍明,管鲁阳,李晓东,田静.基于欧氏距离分布熵的特征优化研究[J].电子学报,2007,35(3):469-473. 被引量:9
  • 2Zhu W,Thomborson C.Extraction in software watermarking[C]//Proceedings of the 8th Workshop on Multimedia and Security,2006: 175-181.
  • 3Deng Xiao-hong,Xu Guo-wen,Sun Guang,et al.Software watermarking based on dynamic program slicing[C]//2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008 : 461-464.
  • 4Tamada H,Nakamura M,Monden A,et al.Design and evaluation birthmark for detecting theft of java programs[C]//Proceedings of the International Conference on Software Engineering,2004: 569-575.
  • 5Tamada H,Okamoto K,Nakamura M,et al.Java birthmaks--Detecting the software theft[J].IEICE Transactions on Information and Systems, 2005, E88-D(9 ) : 2148-2158.
  • 6Tamada H,Okamoto K,Nakamura M,et al.Dynamic software birthmarks to detect the theft of windows applications[C]//Proceedings of the International Symposium on Future Software Technology, 2004.
  • 7Myles G,Collberg C,Heidepriem Z,et al.The evaluation of two software watermarking algorithms[J].Software : Practice and Experience, 2005,35(10) : 923-938.
  • 8Bai Ya-meng,Sun Xing-ming,Sun Guang,et al.Dynamic k-gram based software birthmark[C]//19th Australian Software Engineering Conference, 2008 : 644-649.
  • 9Mund G B,Mall R.An efficient dynamic program slicing technique[J]. Information and Software Technology,2003: 123-132.
  • 10Binkley D,Danicic S,Gyimothy T,et al.Theoretical foundations of dynamic program slicing[J].Theoretical Computer Science, 2006,360: 23-41.

共引文献30

同被引文献20

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部