Computer Science ›› 2019, Vol. 46 ›› Issue (7): 120-125.doi: 10.11896/j.issn.1002-137X.2019.07.019

• Information Security • Previous Articles     Next Articles

Study on Dynamic-graph Watermarking Based on Petri Net Coding

SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi   

  1. (School of Computers,Guangdong University of Technology,Guangzhou 510006,China)
  • Received:2018-06-26 Online:2019-07-15 Published:2019-07-15

Abstract: Aiming at the problem of low data embedding rate of dynamic watermarking,this paper proposed a dynamic-graph watermarking algorithm based on Petri net coding.First,the watermark information is converted into a sequence,and then it is encoded into a running state sequence of Petri net.Finally,the code that generates the Petri net structure is embedded into the source code of the protected software.Since the Petri net transitions will produce different marks,the multiple values are expressed in the same Petri network structure,which means that the watermarking scheme has high data embedding rate and error detection ability,and can successfully resist multiple and typical attacks such as the insertion of nodes,the deletion of transitions,the deletion of places and the deletion of arcs.Finally,the feasibility and effectiveness of the algorithm were verified in the experiment,and the distortion attack test was carried out.The result shows that the dynamic map software watermark based on Petri net coding is robust,and it has a strong ability to resist distortion.

Key words: Software protection, Software watermarking, Dynamic-graph watermarking, Petri net coding, Data embedding rate

CLC Number: 

  • TP309.7
[1] MYLES G,COLLBERG C.Software watermarking via opaque predicates:Implementation,analysis,and attacks[J].Electronic Commerce Research,2006,6(2):155-171.
[2] KO W H,SATCHIDANANDAN B,KUMAR P R.Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems[C]∥Communications and Network Security.IEEE,2017:416-420.
[3] COLLBERG C.Software watermarking:models and dynamic embeddings[C]∥ACM Sigplan-Sigact Symposium on Principles of Programming Languages.ACM,1999:311-324.
[4] COLLBERG C S,THOMBORSON C,TOWNSEND G M.Dynamic graph-based software fingerprinting[J].Acm Transactions on Programming Languages & Systems,2007,29(6):35.
[5] TANG Z Y,FANG D Y,SU L.A tamper-proof software watermark using code-based encryption[J].Journal of University of Science and Technology of China,2011,41(7):599-606.(in Chinese)汤战勇,房鼎益,苏琳.一种基于代码加密的防篡改软件水印方案[J].中国科学技术大学学报,2011,41(7):599-606.
[6] NAGRA J,THOMBORSON C.Threading software watermarks[C]∥International Conference on Information Hiding.Springer-Verlag,2004:208-223.
[7] XU J C,ZENG G S.A Software Watermarking Algorithm Based on Threads Relation[J].Acta Electronica Sinica,2012,40(5):891-896.(in Chinese)许金超,曾国荪.一种基于线程关系的软件水印算法[J].电子学报,2012,40(5):891-896.
[8] LI B.Research on dynamic graph software watermarking algorithm based on tamper-proofing[D].Zhengzhou:Zhengzhou University,2013.(in Chinese)李斌.基于防篡改的动态图软件水印算法研究[D].郑州:郑州大学,2013.
[9] ZHANG D.Research of dynamic graph software watermarking and related technology[D].Zhengzhou:Zhengzhou University,2014.(in Chinese)张迪.动态图软件水印相关技术研究[D].郑州:郑州大学,2014.
[10] ASHWAG A,VIJEY T.Software Watermarking based on Re- turn-Oriented Programming for Computer Security[J].International Journal of Computer Applications,2017,166(8):21-28.
[11] JIANG Z,LI Z,WU N,et al.A Petri Net Approach to Fault Diagnosis and Restoration for Power Transmission Systems to Avoid the Output Interruption of Substations[J].IEEE Systems Journal,2017,PP(99):1-11.
[12] 吴哲辉.Pteri网导论[M].北京:机械工业出版社,2006:6-12.
[13] SU Q,HE F,WU N,et al.A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs[J].IEEE Access,2018,6(99):11988-12000.
[14] KNUTH D E.The Art of Computer Programming,Volume I:Fundamental Algorithms (3rd Edition) [M].China Machine Press,1998.
[15] COLLBERG C.A Tool for the Study of Software Protection Algorithms[EB/OL].[2012-05-24].http://sandmark.cs.arizona.edu.
[16] SEBASTIAN B,CHRISTIAN C,VIJAY G,et al.Code obfuscation against symbolic execution attacks[C]∥Conference on Computer Security Applications.ACM,2016:189-200.
[17] LUO Y X.Research on Software Protection Technology Based on Watermark and Feature[D].Xi’an:Northwest University,2013.(in Chinese)罗养霞.基于水印和特征的软件保护技术研究[D].西安:西北大学,2013.
[1] SU Qing,WU Wei-min,LI Zhong-liang,LI Jing-liang and CHEN Wei-de. Research and Application of Chaos Opaque Predicate in Code Obfuscation [J]. Computer Science, 2013, 40(6): 155-159.
[2] LI Kui,CHEN Jian-ping,SHI Quan and LI Gui-sen. Design of Contradiction Structure for Dummy Method Insertion in Java Software Watermarking [J]. Computer Science, 2013, 40(12): 211-214.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .