期刊文献+

软件特征和软件水印在软件保护中的应用研究 被引量:4

APPLICATION RESEARCH OF SOFTWARE FEATURES AND SOFTWARE WATERMARKING IN SOFTWARE PROTECTION
下载PDF
导出
摘要 软件盗版和软件攻击严重影响了软件产业的正常发展。在软件水印和软件特征技术的基础上,提出一种基于静态软件水印和软件指令集的软件特征值提取方法。将软件版权所有者信息和软件反编译得出的有效软件指令集合进行摘要计算,最终求得软件的特征值。设计软件特征值在软件保护中的应用方案,软件特征值经软件开发者对称加密后,可作为软件的一部分随软件可执行程序一起打包发售,用于鉴定软件的完整性和判断软件盗版源头。该方案在软件保护领域具有实际的应用价值。 Software piracy and software attack have seriously affected the normal development of the software industry. On the basis of software watermarking and software feature technology, we proposed a software eigenvalue extraction method based on static software watermarking and software instruction set. The information of software copyright owner and the effective software instruction set obtained by software decompilation were digested and calculated, and the eigenvalues of the software were finally obtained. We designed an application scheme of software eigenvalue in software protection. The software eigenvalue which had been symmetrically encrypted by software developer could be packaged and sold together as part of software along with the executable program. It could be used to identify the integrity of the software and to judge the source of software piracy. The scheme has practical application value in the field of software protection.
作者 范洁 李冬冬 庞岩梅 Fan Jie;Li Dongdong;Pang Yanmei(Department of Network Space Security,Beijing Electronic and Science Technology Institute,Beijing 100070,China)
出处 《计算机应用与软件》 北大核心 2018年第12期298-302,共5页 Computer Applications and Software
基金 北京高等学校教育教学改革项目(2015-ms042) 北京市2018年"人才培养共建项目--在线开放课程建设"
关键词 软件特征 软件水印 摘要计算 对称加密 Software feature Software watermarking Digest calculation Symmetric encryption
  • 相关文献

参考文献5

二级参考文献64

  • 1虞涛,杨杰.一种动态图软件水印技术编码方案[J].交通与计算机,2006,24(1):76-79. 被引量:3
  • 2芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360. 被引量:15
  • 3杨建龙,王建民,李德毅.软件水印技术及其新进展[J].计算机工程,2007,33(17):168-170. 被引量:14
  • 4王刚.一种基于二次剩余的混合软件水印研究[J].青岛大学学报(工程技术版),2007,22(3):38-43. 被引量:1
  • 5COLLBERGC,THOMBORSONC.Softwarewatermarking:modelsanddynamicembedding[C]//ProcofSymposium onPrinciplesofProgrammingLanguages.NewYork:ACMPress,1999:311-324.
  • 6NAGRAJ,THOMBORSONC.Threadingsoftwarewatermarks[C]//Procofthe6thInternationalWorkshoponInformationHiding.Berlin:Springer,2004:208-233.
  • 7PALSBERGJ,KRISHNASWAMYS,KWONM,etal.Experiencewithsoftwarewatermarking[C]//Procofthe16thAnnualComputerSecurityApplicationsConference.[S.l.]:IEEEPress,2000:308-316.
  • 8Ginger M, Christian S C. K-gram based software birthmarks [ C ]// Proceeding of ACM Symposium on Applied Computing. Santa Fe, New Mexico, USA, ACM, 2005 : 314 - 318.
  • 9Lu B, Liu F, Ge X, et al. A Software Birthmark based on Dynamic Opcode N-gram [ C]//Proeeedings of International Conference on Se- mantic Computing( ICSC ) ,2007 : 37 - 44.
  • 10Bai Y, Sun X, Sun G, et al. Dynamic K-gram based Software Birth- mark [ C]//19th Australian Conference on Software Engineering, 2008 : 644 - 649.

共引文献18

同被引文献31

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部