期刊文献+

一种基于程序执行时间量化分析的软件水印方法

A Software Watermarking Method Based on Program Execution Time
下载PDF
导出
摘要 当前,应用软件面临的重要问题是不法分子通过软件剽窃、重打包等技术,将恶意负载或广告加载到合法应用软件中,并形成新软件进行发布,给用户和应用软件作者的合法权益带来威胁。为了实现对应用软件剽窃、重打包等安全风险的测评,该文提出一种基于程序执行时间量化分析的软件水印方法(SW_PET)。通过生成多种相互抵消功能的操作组,实现对水印信息的时间化编码,并植入应用软件中;在检测过程中,需要提取相应的水印信息,对照之前的时间编码对应的原始水印,比较不同操作的执行时间,判断水印相似度,进而判别原始水印的存在性,完成应用软件合法性的判断。该方法也可以与其它类型的水印信息相结合,增强水印的鲁棒性。最后,通过搭建仿真模拟器,实现对不同应用软件水印信息的比较和判断,验证该方法的有效性。 Currently,a main problem in software is repackaging or plagiarization,which means attackers can add malicious payloads or advertisements into legitimate APPs through piggybacking,it greatly threatens the users and original developers.In this paper,a novel Software Watermarking method based on Program Execution Time(SW_PET)is proposed.By generating a variety of effect-canceling operations,the watermark information can be encoded into the form of program execution time,and can be embedded into Android APPs.In the detection process,the watermark information is extracted and compared with the original watermark to check whether the APP is repackaged.This method can be combined with other types of watermarks(e.g.,picture-based watermarks)in order to enhance the robustness.Finally,the effectiveness of the proposed approach is verified,and the overhead introduced by the watermark is measured,which is demonstrated to be minimal.
作者 张颖君 陈恺 鲍旭华 ZHANG Yingjun;CHEN Kai;BAO Xuhua(Trusted Computing and Information Assureance Laboratory,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;Legendsec Information Technology(Beijing)Inc,Beijing 100015,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2020年第8期1811-1819,共9页 Journal of Electronics & Information Technology
基金 国家重点研发计划项目(2016QY04W0805) 国家自然科学基金(U1836211) 大数据协同安全国家工程实验室开放课题。
关键词 软件水印 程序执行 水印编码 Software watermarking Program execution Watermark encoding
  • 相关文献

参考文献3

二级参考文献49

  • 1芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360. 被引量:15
  • 2[1]I.J. Cox, J. Killian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, IP-6(12), 1673-1687.
  • 3[2]N. Memon, P. W. Wong, Protecting digital media content, Communications of the ACM, 1998, 41(7), 35-43.
  • 4[3]S. Crave, B. L. Yeo, M. Yeung, Technical trials and legal tribulations, Conmmnieations of theACM, 1998, 41(7), 45-54.
  • 5[4]G.C. Langelaar, R. L. Lagendijk, J. Biemond, Renoving spatial spread spectrum watermarks bynon-linear filtering, EUSIPCO'98, 1998, 2281-2284.
  • 6[5]I.J. Cox, J. M. G. Linnartz, Some general methods for tampering with waternarks, IEEE J. onSelected Areas in Communications, 1998, SAC-16(4), 587 593.
  • 7[6]http://wwvw.cl.cam.ac.uk/users/fapp2/.
  • 8[7]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Can invisible watermarks resolve rightful ownerships? Proceedings of IS&T/SPIE Electronic Imaging-Storage and Retrieval of Image and VideoDatabases, San Jose. S, CA: SPIE, Feb. 13-14, 1997, 310-321.
  • 9[8]S. Craver, N. Memon, B. L. Yeo, M. Yeung, On the invertibility of invisible watermarking techniques, Proceedings of the IEEE International Conf. on Image Processing, Santa Barbata, CA,IEEE Press, 1997, 540-543.
  • 10[9]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Resolving rightful ownerships with invisible wa-termarking techniques: limitations, attacks, and implications, IEEE J. on Selected Areas inComnunications, 1998, SAC-16(4), 573-586.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部