Computer Science ›› 2019, Vol. 46 ›› Issue (7): 120-125.doi: 10.11896/j.issn.1002-137X.2019.07.019
• Information Security • Previous Articles Next Articles
SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi
CLC Number:
[1]MYLES G,COLLBERG C.Software watermarking via opaque predicates:Implementation,analysis,and attacks[J].Electronic Commerce Research,2006,6(2):155-171. [2]KO W H,SATCHIDANANDAN B,KUMAR P R.Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems[C]∥Communications and Network Security.IEEE,2017:416-420. [3]COLLBERG C.Software watermarking:models and dynamic embeddings[C]∥ACM Sigplan-Sigact Symposium on Principles of Programming Languages.ACM,1999:311-324. [4]COLLBERG C S,THOMBORSON C,TOWNSEND G M.Dynamic graph-based software fingerprinting[J].Acm Transactions on Programming Languages & Systems,2007,29(6):35. [5]TANG Z Y,FANG D Y,SU L.A tamper-proof software watermark using code-based encryption[J].Journal of University of Science and Technology of China,2011,41(7):599-606.(in Chinese) 汤战勇,房鼎益,苏琳.一种基于代码加密的防篡改软件水印方案[J].中国科学技术大学学报,2011,41(7):599-606. [6]NAGRA J,THOMBORSON C.Threading software watermarks[C]∥International Conference on Information Hiding.Springer-Verlag,2004:208-223. [7]XU J C,ZENG G S.A Software Watermarking Algorithm Based on Threads Relation[J].Acta Electronica Sinica,2012,40(5):891-896.(in Chinese) 许金超,曾国荪.一种基于线程关系的软件水印算法[J].电子学报,2012,40(5):891-896. [8]LI B.Research on dynamic graph software watermarking algorithm based on tamper-proofing[D].Zhengzhou:Zhengzhou University,2013.(in Chinese) 李斌.基于防篡改的动态图软件水印算法研究[D].郑州:郑州大学,2013. [9]ZHANG D.Research of dynamic graph software watermarking and related technology[D].Zhengzhou:Zhengzhou University,2014.(in Chinese) 张迪.动态图软件水印相关技术研究[D].郑州:郑州大学,2014. [10]ASHWAG A,VIJEY T.Software Watermarking based on Re- turn-Oriented Programming for Computer Security[J].International Journal of Computer Applications,2017,166(8):21-28. [11]JIANG Z,LI Z,WU N,et al.A Petri Net Approach to Fault Diagnosis and Restoration for Power Transmission Systems to Avoid the Output Interruption of Substations[J].IEEE Systems Journal,2017,PP(99):1-11. [12]吴哲辉.Pteri网导论[M].北京:机械工业出版社,2006:6-12. [13]SU Q,HE F,WU N,et al.A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs[J].IEEE Access,2018,6(99):11988-12000. [14]KNUTH D E.The Art of Computer Programming,Volume I:Fundamental Algorithms (3rd Edition) [M].China Machine Press,1998. [15]COLLBERG C.A Tool for the Study of Software Protection Algorithms[EB/OL].[2012-05-24].http://sandmark.cs.arizona.edu. [16]SEBASTIAN B,CHRISTIAN C,VIJAY G,et al.Code obfuscation against symbolic execution attacks[C]∥Conference on Computer Security Applications.ACM,2016:189-200. [17]LUO Y X.Research on Software Protection Technology Based on Watermark and Feature[D].Xi’an:Northwest University,2013.(in Chinese) 罗养霞.基于水印和特征的软件保护技术研究[D].西安:西北大学,2013. |
[1] | SU Qing,WU Wei-min,LI Zhong-liang,LI Jing-liang and CHEN Wei-de. Research and Application of Chaos Opaque Predicate in Code Obfuscation [J]. Computer Science, 2013, 40(6): 155-159. |
[2] | LI Kui,CHEN Jian-ping,SHI Quan and LI Gui-sen. Design of Contradiction Structure for Dummy Method Insertion in Java Software Watermarking [J]. Computer Science, 2013, 40(12): 211-214. |
|