Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transf...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-09-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00083 |
_version_ | 1811233375574294528 |
---|---|
author | Guang SUN Xiao-ping FAN Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU |
author_facet | Guang SUN Xiao-ping FAN Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU |
author_sort | Guang SUN |
collection | DOAJ |
description | A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust. |
first_indexed | 2024-04-12T11:19:38Z |
format | Article |
id | doaj.art-0b8bcfc4774b4235a994cd4a19b3b7f0 |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-04-12T11:19:38Z |
publishDate | 2016-09-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-0b8bcfc4774b4235a994cd4a19b3b7f02022-12-22T03:35:24ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-09-0129122110.11959/j.issn.2096-109x.2016.00083Software watermarking scheme with cloud computing constraintsGuang SUN0Xiao-ping FAN1Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU2Computer Science and Technology Postdoctoral Station,Central South University,Changsha 410083,China ; Computer Science Department,University of Alabama,Tuscaloosa 35401,USA; Institute of Big Data,Hunan University of Finance & Economics,Changsha 410205,China Computer Science and Technology Postdoctoral Station,Central South University,Changsha 410083,China; Institute of Big Data,Hunan University of Finance & Economics,Changsha 410205,ChinaInstitute of Big Data,Hunan University of Finance & Economics,Changsha 410205,ChinaA non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00083cloud computingsoftware watermarkingnon-equivalent semantic obfuscationrobustness |
spellingShingle | Guang SUN Xiao-ping FAN Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU Software watermarking scheme with cloud computing constraints 网络与信息安全学报 cloud computing software watermarking non-equivalent semantic obfuscation robustness |
title | Software watermarking scheme with cloud computing constraints |
title_full | Software watermarking scheme with cloud computing constraints |
title_fullStr | Software watermarking scheme with cloud computing constraints |
title_full_unstemmed | Software watermarking scheme with cloud computing constraints |
title_short | Software watermarking scheme with cloud computing constraints |
title_sort | software watermarking scheme with cloud computing constraints |
topic | cloud computing software watermarking non-equivalent semantic obfuscation robustness |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00083 |
work_keys_str_mv | AT guangsun softwarewatermarkingschemewithcloudcomputingconstraints AT xiaopingfan softwarewatermarkingschemewithcloudcomputingconstraints AT wangdongjianghangjunzhoushengzongliuchunhonggongjingzhu softwarewatermarkingschemewithcloudcomputingconstraints |