Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transf...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2016-09-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850111416071094272 |
|---|---|
| author | Guang SUN Xiao-ping FAN Wang-dong JIANG Hang-jun ZHOU Sheng-zong LIU Chun-hong GONG Jing ZHU |
| author_facet | Guang SUN Xiao-ping FAN Wang-dong JIANG Hang-jun ZHOU Sheng-zong LIU Chun-hong GONG Jing ZHU |
| author_sort | Guang SUN |
| collection | DOAJ |
| description | A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust. |
| format | Article |
| id | doaj-art-035959a705a744dfa3a980e95d6d3cb1 |
| institution | OA Journals |
| issn | 2096-109X |
| language | English |
| publishDate | 2016-09-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-035959a705a744dfa3a980e95d6d3cb12025-08-20T02:37:38ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-09-012122159548009Software watermarking scheme with cloud computing constraintsGuang SUNXiao-ping FANWang-dong JIANGHang-jun ZHOUSheng-zong LIUChun-hong GONGJing ZHUA non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083cloud computingsoftware watermarkingnon-equivalent semantic obfuscationrobustness |
| spellingShingle | Guang SUN Xiao-ping FAN Wang-dong JIANG Hang-jun ZHOU Sheng-zong LIU Chun-hong GONG Jing ZHU Software watermarking scheme with cloud computing constraints 网络与信息安全学报 cloud computing software watermarking non-equivalent semantic obfuscation robustness |
| title | Software watermarking scheme with cloud computing constraints |
| title_full | Software watermarking scheme with cloud computing constraints |
| title_fullStr | Software watermarking scheme with cloud computing constraints |
| title_full_unstemmed | Software watermarking scheme with cloud computing constraints |
| title_short | Software watermarking scheme with cloud computing constraints |
| title_sort | software watermarking scheme with cloud computing constraints |
| topic | cloud computing software watermarking non-equivalent semantic obfuscation robustness |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00083 |
| work_keys_str_mv | AT guangsun softwarewatermarkingschemewithcloudcomputingconstraints AT xiaopingfan softwarewatermarkingschemewithcloudcomputingconstraints AT wangdongjiang softwarewatermarkingschemewithcloudcomputingconstraints AT hangjunzhou softwarewatermarkingschemewithcloudcomputingconstraints AT shengzongliu softwarewatermarkingschemewithcloudcomputingconstraints AT chunhonggong softwarewatermarkingschemewithcloudcomputingconstraints AT jingzhu softwarewatermarkingschemewithcloudcomputingconstraints |