Software watermarking scheme with cloud computing constraints

A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transf...

Full description

Bibliographic Details
Main Authors: Guang SUN, Xiao-ping FAN, Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-09-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00083
_version_ 1811233375574294528
author Guang SUN
Xiao-ping FAN
Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU
author_facet Guang SUN
Xiao-ping FAN
Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU
author_sort Guang SUN
collection DOAJ
description A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.
first_indexed 2024-04-12T11:19:38Z
format Article
id doaj.art-0b8bcfc4774b4235a994cd4a19b3b7f0
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-04-12T11:19:38Z
publishDate 2016-09-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-0b8bcfc4774b4235a994cd4a19b3b7f02022-12-22T03:35:24ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-09-0129122110.11959/j.issn.2096-109x.2016.00083Software watermarking scheme with cloud computing constraintsGuang SUN0Xiao-ping FAN1Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU2Computer Science and Technology Postdoctoral Station,Central South University,Changsha 410083,China ; Computer Science Department,University of Alabama,Tuscaloosa 35401,USA; Institute of Big Data,Hunan University of Finance & Economics,Changsha 410205,China Computer Science and Technology Postdoctoral Station,Central South University,Changsha 410083,China; Institute of Big Data,Hunan University of Finance & Economics,Changsha 410205,ChinaInstitute of Big Data,Hunan University of Finance & Economics,Changsha 410205,ChinaA non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00083cloud computingsoftware watermarkingnon-equivalent semantic obfuscationrobustness
spellingShingle Guang SUN
Xiao-ping FAN
Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU
Software watermarking scheme with cloud computing constraints
网络与信息安全学报
cloud computing
software watermarking
non-equivalent semantic obfuscation
robustness
title Software watermarking scheme with cloud computing constraints
title_full Software watermarking scheme with cloud computing constraints
title_fullStr Software watermarking scheme with cloud computing constraints
title_full_unstemmed Software watermarking scheme with cloud computing constraints
title_short Software watermarking scheme with cloud computing constraints
title_sort software watermarking scheme with cloud computing constraints
topic cloud computing
software watermarking
non-equivalent semantic obfuscation
robustness
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00083
work_keys_str_mv AT guangsun softwarewatermarkingschemewithcloudcomputingconstraints
AT xiaopingfan softwarewatermarkingschemewithcloudcomputingconstraints
AT wangdongjianghangjunzhoushengzongliuchunhonggongjingzhu softwarewatermarkingschemewithcloudcomputingconstraints