Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transf...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-09-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530341988237312 |
---|---|
author | Guang SUN Xiao-ping FAN Wang-dong JIANG Hang-jun ZHOU Sheng-zong LIU Chun-hong GONG Jing ZHU |
author_facet | Guang SUN Xiao-ping FAN Wang-dong JIANG Hang-jun ZHOU Sheng-zong LIU Chun-hong GONG Jing ZHU |
author_sort | Guang SUN |
collection | DOAJ |
description | A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust. |
format | Article |
id | doaj-art-035959a705a744dfa3a980e95d6d3cb1 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2016-09-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-035959a705a744dfa3a980e95d6d3cb12025-01-15T03:04:53ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-09-012122159548009Software watermarking scheme with cloud computing constraintsGuang SUNXiao-ping FANWang-dong JIANGHang-jun ZHOUSheng-zong LIUChun-hong GONGJing ZHUA non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083cloud computingsoftware watermarkingnon-equivalent semantic obfuscationrobustness |
spellingShingle | Guang SUN Xiao-ping FAN Wang-dong JIANG Hang-jun ZHOU Sheng-zong LIU Chun-hong GONG Jing ZHU Software watermarking scheme with cloud computing constraints 网络与信息安全学报 cloud computing software watermarking non-equivalent semantic obfuscation robustness |
title | Software watermarking scheme with cloud computing constraints |
title_full | Software watermarking scheme with cloud computing constraints |
title_fullStr | Software watermarking scheme with cloud computing constraints |
title_full_unstemmed | Software watermarking scheme with cloud computing constraints |
title_short | Software watermarking scheme with cloud computing constraints |
title_sort | software watermarking scheme with cloud computing constraints |
topic | cloud computing software watermarking non-equivalent semantic obfuscation robustness |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083 |
work_keys_str_mv | AT guangsun softwarewatermarkingschemewithcloudcomputingconstraints AT xiaopingfan softwarewatermarkingschemewithcloudcomputingconstraints AT wangdongjiang softwarewatermarkingschemewithcloudcomputingconstraints AT hangjunzhou softwarewatermarkingschemewithcloudcomputingconstraints AT shengzongliu softwarewatermarkingschemewithcloudcomputingconstraints AT chunhonggong softwarewatermarkingschemewithcloudcomputingconstraints AT jingzhu softwarewatermarkingschemewithcloudcomputingconstraints |