期刊文献+

一种基于数据依赖关系的软件水印算法 被引量:3

Software Watermarking Algorithm Based on Dataflow Dependence
下载PDF
导出
摘要 提出了一种基于数据依赖关系的软件水印算法。算法将水印信息编码为数据依赖图,选取目标程序的部分数据作为数据依赖图节点,通过添加数据之间的依赖关系将水印嵌入到目标程序中。实验及分析表明该水印算法能够抵御多种非数据流攻击方式的攻击,具有较好的鲁棒性;并且水印嵌入时利用了目标程序的数据,所嵌入的代码与程序中原有代码类似,具有较好的隐蔽性。 A software watermarking algorithm is proposed based on dataflow dependence. The watermark is encoded as the data dependency graph, the data of the original program is selected as the node of the data dependency graph, and the watermark is embedded into the program by adding the data dependence. Experiments and analysis shows that the algorithm has good resilience of obfusca- tion attacks; because the watermark embedding uses the data of the original program, the code em- bedded into the program is similar to the original code, and the algorithm has good stealth.
出处 《信息工程大学学报》 2015年第2期245-250,共6页 Journal of Information Engineering University
关键词 软件水印 数据流 软件保护 software watermark dataflow software protection
  • 相关文献

参考文献12

  • 1Davidson R, Myhrvold N. Method and system for generating and auditing a signature for a computer program[ P]. US Patent 5,559,884, 1996. 被引量:1
  • 2Qu G, Potkonjak M. Analysis of watermarking techniques for graph coloring problem [ C ]//Proceedings of the 1998 IEEE/ ACM international conference on Computer-aided design. 1998: 190-193. 被引量:1
  • 3Stern J, Hachez G, Koeune F, et al. Robust object watermarking: application to code[ C]//Information Hiding. 1999: 368- 378. 被引量:1
  • 4Venkatesan R, Vazirani V, Sinha S. A graph theoretic approach to software watermarking [ C ]//Information Hiding. 2001: 157-168. 被引量:1
  • 5Collberg C, Carter E, Debray S, et al. Dynamic path-based software watermarking[ J]. ACM SIGPLAN Notices, 2004, 39 (6) : 107-118. 被引量:1
  • 6Collberg C, Huntwork A, Carter E, et al. More on graph theoretic software watermarks: Implementation, analysis, and at- tacks[ J]. Information and Software Technology, 2009, 51 ( 1 ) : 56-67. 被引量:1
  • 7M oskowitz S A, Cooperman M. Method for stega-cipherprotection of computer code[ Z]. The Dice Company, 1996. 被引量:1
  • 8Palsberg J, Krishnaswamy S, Kwon M, et al. Experience with Software Watermarking[ C ]//Annual Computer Security Appli- cations Conference. 2000: 308-316. 被引量:1
  • 9Feng B, Zhang M, Xu G, et al. Dynamic data flow graph-based software watermarking[ C]//2009 IEEE international Confer- ence on Network Infrastructure and Digital Content. 2009: 1029-1033. 被引量:1
  • 10Collberg C, Nagra J. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection[ D ]. Addison Wesley Professional, 2010. 被引量:1

同被引文献12

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部