Computer Science ›› 2019, Vol. 46 ›› Issue (7): 120-125.doi: 10.11896/j.issn.1002-137X.2019.07.019
• Information Security • Previous Articles Next Articles
SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi
CLC Number:
[1] | MYLES G,COLLBERG C.Software watermarking via opaque predicates:Implementation,analysis,and attacks[J].Electronic Commerce Research,2006,6(2):155-171. |
[2] | KO W H,SATCHIDANANDAN B,KUMAR P R.Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems[C]∥Communications and Network Security.IEEE,2017:416-420. |
[3] | COLLBERG C.Software watermarking:models and dynamic embeddings[C]∥ACM Sigplan-Sigact Symposium on Principles of Programming Languages.ACM,1999:311-324. |
[4] | COLLBERG C S,THOMBORSON C,TOWNSEND G M.Dynamic graph-based software fingerprinting[J].Acm Transactions on Programming Languages & Systems,2007,29(6):35. |
[5] | TANG Z Y,FANG D Y,SU L.A tamper-proof software watermark using code-based encryption[J].Journal of University of Science and Technology of China,2011,41(7):599-606.(in Chinese)汤战勇,房鼎益,苏琳.一种基于代码加密的防篡改软件水印方案[J].中国科学技术大学学报,2011,41(7):599-606. |
[6] | NAGRA J,THOMBORSON C.Threading software watermarks[C]∥International Conference on Information Hiding.Springer-Verlag,2004:208-223. |
[7] | XU J C,ZENG G S.A Software Watermarking Algorithm Based on Threads Relation[J].Acta Electronica Sinica,2012,40(5):891-896.(in Chinese)许金超,曾国荪.一种基于线程关系的软件水印算法[J].电子学报,2012,40(5):891-896. |
[8] | LI B.Research on dynamic graph software watermarking algorithm based on tamper-proofing[D].Zhengzhou:Zhengzhou University,2013.(in Chinese)李斌.基于防篡改的动态图软件水印算法研究[D].郑州:郑州大学,2013. |
[9] | ZHANG D.Research of dynamic graph software watermarking and related technology[D].Zhengzhou:Zhengzhou University,2014.(in Chinese)张迪.动态图软件水印相关技术研究[D].郑州:郑州大学,2014. |
[10] | ASHWAG A,VIJEY T.Software Watermarking based on Re- turn-Oriented Programming for Computer Security[J].International Journal of Computer Applications,2017,166(8):21-28. |
[11] | JIANG Z,LI Z,WU N,et al.A Petri Net Approach to Fault Diagnosis and Restoration for Power Transmission Systems to Avoid the Output Interruption of Substations[J].IEEE Systems Journal,2017,PP(99):1-11. |
[12] | 吴哲辉.Pteri网导论[M].北京:机械工业出版社,2006:6-12. |
[13] | SU Q,HE F,WU N,et al.A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs[J].IEEE Access,2018,6(99):11988-12000. |
[14] | KNUTH D E.The Art of Computer Programming,Volume I:Fundamental Algorithms (3rd Edition) [M].China Machine Press,1998. |
[15] | COLLBERG C.A Tool for the Study of Software Protection Algorithms[EB/OL].[2012-05-24].http://sandmark.cs.arizona.edu. |
[16] | SEBASTIAN B,CHRISTIAN C,VIJAY G,et al.Code obfuscation against symbolic execution attacks[C]∥Conference on Computer Security Applications.ACM,2016:189-200. |
[17] | LUO Y X.Research on Software Protection Technology Based on Watermark and Feature[D].Xi’an:Northwest University,2013.(in Chinese)罗养霞.基于水印和特征的软件保护技术研究[D].西安:西北大学,2013. |
[1] | SU Qing,WU Wei-min,LI Zhong-liang,LI Jing-liang and CHEN Wei-de. Research and Application of Chaos Opaque Predicate in Code Obfuscation [J]. Computer Science, 2013, 40(6): 155-159. |
[2] | LI Kui,CHEN Jian-ping,SHI Quan and LI Gui-sen. Design of Contradiction Structure for Dummy Method Insertion in Java Software Watermarking [J]. Computer Science, 2013, 40(12): 211-214. |
|