计算机科学 ›› 2013, Vol. 40 ›› Issue (12): 211-214.

• 软件与数据库技术 • 上一篇    下一篇

一种Java软件水印植入虚方法的永假式构造

李奎,陈建平,施佺,李桂森   

  1. 南通大学计算机科学与技术学院 南通226019;南通大学计算机科学与技术学院 南通226019;南通大学计算机科学与技术学院 南通226019;南通大学计算机科学与技术学院 南通226019
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金面上项目(61171132),江苏省自然科学基金项目(BK2010280),南通市应用研究计划项目(BK2011026)资助

Design of Contradiction Structure for Dummy Method Insertion in Java Software Watermarking

LI Kui,CHEN Jian-ping,SHI Quan and LI Gui-sen   

  • Online:2018-11-16 Published:2018-11-16

摘要: 软件水印是近年来出现的软件版权保护技术,它通过在软件作品中嵌入版权信息(水印)来达到版权保护的目的。针对基于字节码的Java软件水印算法,提出一种永假式的构造设计方法,用于水印算法中虚方法的植入。利用Java语言的反射机制动态随机生成一个0、1字符串,对该字符串进行正反码编码和解码,得到一个始终全为0的字符串,以此作为永假式的条件,确保虚方法不被执行。永假式的构造具有良好的隐蔽性,能抵抗多种常见的水印攻击。

关键词: 软件水印,虚方法,永假式,Java反射机制,正反码

Abstract: Software watermarking is a software copyright protection technology appeared in recent years.It achieves the purpose of copyright protection by embedding copyright information (watermark) into a software product.This paper proposed a design method of the contradiction structure for the dummy method insertion used in the bytecode based Java software watermark algorithm.The Java reflection mechanism is used to dynamically generate a random string of 0and 1.The string is then encoded and decoded using the technique of the positive and inverse coding to obtain a string of all zeros.This string is used as the condition of the contradiction structure,which ensures that the dummy method will never be executed.The presented contradiction structure has good concealment and can resist various watermark attacks.

Key words: Software watermarking,Dummy method,Permanent false expression,Java reflection mechanism,Positive and inverse code

[1] Collberg C,Thomborson C.Watermarking,tamper-proofing,and Obfuscation-Tools for Software Protection[J].IEEE Transactions on Software Engineering,2002,28(8):735-746
[2] 张立和,杨义先,钮心析.软件水印综述[J].软件学报,2003,14(2):268-277
[3] Zhu W,Thomborson C,Wang F.A Survey of Software Watermarking[C]∥IEEE International Conference on Intelligence and Security Informatics.2005:454-458
[4] Hamilton J,Danicic S.A survey of static software watermarking [C]∥IEEE World Congress on Internet Security.2011:100-107
[5] 鲍福良,彭俊艳,方志刚.Java类文件保护方法综述[J].计算机系统应用,2007,6:124-126
[6] 周正虎,陈丹,周光霞,等.基于病毒多态性的Java软件水印技术[J].计算机与数字工程,2011,39(11):97-100
[7] Monden A,Iida H,Matsumoto K,et al.A Practical Method for Watermarking Java Programs[C]∥The 24th International Computer Software and Applications Conference.2000:191-197
[8] 王春红,陈建平,王杰华,等.基于字节码的Java软件水印的研究与实现[J].微电子学与计算机,2009,26(9):146-149
[9] 樊昌信,曹丽娜.通信原理[M].北京:国防工业出版社,2010

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!