首页 | 官方网站   微博 | 高级检索  
     

基于指令统计分布的软件水印方案
引用本文:吴建军,高济.基于指令统计分布的软件水印方案[J].浙江大学学报(自然科学版 ),2005,39(2):225-228.
作者姓名:吴建军  高济
作者单位:吴建军(浙江大学,计算机科学与工程学系,浙江,杭州,310027) 
高济(浙江大学,计算机科学与工程学系,浙江,杭州,310027)
摘    要:提出了一种新的盲提取软件水印方案,水印信号分散在整个代码的指令统计分布上.在程序的指令集中随机抽取两个不相交的基数相等的子集,对特定子集的选取就是要嵌入的水印.改变程序使对应于某个子集的所有指令的出现次数都增加一个常数.检测时,分别计算相应两个子集指令出现次数的平均值,如果两个均值之差大于阈值,则认为包含水印.根据假设检验理论对方案的有效性进行了理论分析和证明.针对Java字节码实现了提出的方案,并通过实验进行了验证.结果表明新方案具有非常强的健壮性,能有效抵抗多种常用攻击.

关 键 词:软件水印  盲提取  Java字节码  软件保护
文章编号:1008-973X(2005)02-0225-04
修稿时间:2004年3月5日

Instruction statistic distribution based software watermark scheme
WU Jian-jun,GAO Ji.Instruction statistic distribution based software watermark scheme[J].Journal of Zhejiang University(Engineering Science),2005,39(2):225-228.
Authors:WU Jian-jun  GAO Ji
Abstract:A novel blind watermark scheme with the mark spread over the whole instruction distribution was proposed. Two disjoint subsets of equal size were randomly selected from among instruction set, and this selection was the watermark superimposed by changing the elements of one subset through adding a positive integer factor. The means of two subsets were computed for detecting mark. The mark was found if the difference of two means exceeded the threshold. The effectiveness of the scheme was derived from hypotheses test theory. The scheme was implemented treating Java bytecode as targets and was validated by the experiments. The experimental results show that it is very robust and is immune to most known (attacks).
Keywords:software watermark  blind detection  Java bytecode  software protection  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《浙江大学学报(自然科学版 )》浏览原始摘要信息
点击此处可从《浙江大学学报(自然科学版 )》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号