用户名: 密码: 验证码:
基于Petri网编码的动态图水印技术研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Study on Dynamic-graph Watermarking Based on Petri Net Coding
  • 作者:苏庆 ; 林昊 ; 黄剑锋 ; 何凡 ; 林志毅
  • 英文作者:SU Qing;LIN Hao;HUANG Jian-feng;HE Fan;LIN Zhi-yi;School of Computers,Guangdong University of Technology;
  • 关键词:软件保护 ; 软件水印 ; 动态图水印 ; Petri网编码 ; 数据嵌入率
  • 英文关键词:Software protection;;Software watermarking;;Dynamic-graph watermarking;;Petri net coding;;Data embedding rate
  • 中文刊名:JSJA
  • 英文刊名:Computer Science
  • 机构:广东工业大学计算机学院;
  • 出版日期:2019-07-15
  • 出版单位:计算机科学
  • 年:2019
  • 期:v.46
  • 基金:国家自然科学基金(61572142);; 广东省自然科学基金(2017A030310013,2018A030313389);; 广州市科技计划(201604016041)资助
  • 语种:中文;
  • 页:JSJA201907019
  • 页数:6
  • CN:07
  • ISSN:50-1075/TP
  • 分类号:126-131
摘要
针对动态水印数据嵌入率低的问题,提出一种基于Petri网编码的动态图水印算法。首先,将水印信息进行数列转换,然后将其编码至Petri网的运行状态序列中,最后将生成该Petri网结构的代码嵌入至受保护软件的源代码中。利用Petri网中变迁的发生会产生不同标识的特点,应用同一个Petri网结构表达多个数值,使得该水印编码方案在具有较高的数据嵌入率的同时还具有一定的检错能力,能够成功抵抗包括添加结点、删除部分变迁、删除部分库所和删除部分弧等多种典型的攻击。最后通过实验验证了相关算法的可行性和有效性,并进行了扭曲攻击测试,结果表明基于Petri网编码的动态图软件水印技术具有很强的抗扭曲攻击能力以及鲁棒性。
        Aiming at the problem of low data embedding rate of dynamic watermarking,this paper proposed a dynamic-graph watermarking algorithm based on Petri net coding.First,the watermark information is converted into a sequence,and then it is encoded into a running state sequence of Petri net.Finally,the code that generates the Petri net structure is embedded into the source code of the protected software.Since the Petri net transitions will produce different marks,the multiple values are expressed in the same Petri network structure,which means that the watermarking scheme has high data embedding rate and error detection ability,and can successfully resist multiple and typical attacks such as the insertion of nodes,the deletion of transitions,the deletion of places and the deletion of arcs.Finally,the feasibility and effectiveness of the algorithm were verified in the experiment,and the distortion attack test was carried out.The result shows that the dynamic map software watermark based on Petri net coding is robust,and it has a strong ability to resist distortion.
引文
[1] MYLES G,COLLBERG C.Software watermarking via opaque predicates:Implementation,analysis,and attacks[J].Electronic Commerce Research,2006,6(2):155-171.
    [2] KO W H,SATCHIDANANDAN B,KUMAR P R.Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems[C]∥Communications and Network Security.IEEE,2017:416-420.
    [3] COLLBERG C.Software watermarking:models and dynamic embeddings[C]//ACM Sigplan-Sigact Symposium on Principles of Programming Languages.ACM,1999:311-324.
    [4] COLLBERG C S,THOMBORSON C,TOWNSEND G M.Dynamic graph-based software fingerprinting[J].Acm Transactions on Programming Languages & Systems,2007,29(6):35.
    [5] TANG Z Y,FANG D Y,SU L.A tamper-proof software watermark using code-based encryption[J].Journal of University of Science and Technology of China,2011,41(7):599-606.(in Chinese)汤战勇,房鼎益,苏琳.一种基于代码加密的防篡改软件水印方案[J].中国科学技术大学学报,2011,41(7):599-606.
    [6] NAGRA J,THOMBORSON C.Threading software watermarks[C]//International Conference on Information Hiding.Springer-Verlag,2004:208-223.
    [7] XU J C,ZENG G S.A Software Watermarking Algorithm Based on Threads Relation[J].Acta Electronica Sinica,2012,40(5):891-896.(in Chinese)许金超,曾国荪.一种基于线程关系的软件水印算法[J].电子学报,2012,40(5):891-896.
    [8] LI B.Research on dynamic graph software watermarking algorithm based on tamper-proofing[D].Zhengzhou:Zhengzhou University,2013.(in Chinese)李斌.基于防篡改的动态图软件水印算法研究[D].郑州:郑州大学,2013.
    [9] ZHANG D.Research of dynamic graph software watermarking and related technology[D].Zhengzhou:Zhengzhou University,2014.(in Chinese)张迪.动态图软件水印相关技术研究[D].郑州:郑州大学,2014.
    [10] ASHWAG A,VIJEY T.Software Watermarking based on Re- turn-Oriented Programming for Computer Security[J].International Journal of Computer Applications,2017,166(8):21-28.
    [11] JIANG Z,LI Z,WU N,et al.A Petri Net Approach to Fault Diagnosis and Restoration for Power Transmission Systems to Avoid the Output Interruption of Substations[J].IEEE Systems Journal,2017,PP(99):1-11.
    [12] 吴哲辉.Pteri网导论[M].北京:机械工业出版社,2006:6-12.
    [13] SU Q,HE F,WU N,et al.A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs[J].IEEE Access,2018,6(99):11988-12000.
    [14] KNUTH D E.The Art of Computer Programming,Volume I:Fundamental Algorithms (3rd Edition) [M].China Machine Press,1998.
    [15] COLLBERG C.A Tool for the Study of Software Protection Algorithms[EB/OL].[2012-05-24].http://sandmark.cs.arizona.edu.
    [16] SEBASTIAN B,CHRISTIAN C,VIJAY G,et al.Code obfuscation against symbolic execution attacks[C]//Conference on Computer Security Applications.ACM,2016:189-200.
    [17] LUO Y X.Research on Software Protection Technology Based on Watermark and Feature[D].Xi’an:Northwest University,2013.(in Chinese)罗养霞.基于水印和特征的软件保护技术研究[D].西安:西北大学,2013.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700