Font Size: a A A

A Research On Tamper-proofing Software Watermarking Techniques Based On Dynamic Graph

Posted on:2011-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhouFull Text:PDF
GTID:2178360308958004Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The traditional protection methods of software are mostly based on encryption techniques. The security of software is largely determined by the security of the encryption scheme involved. Although the traditional encryption techniques may provide software with limited protection to copyright, once the encryption schemes adopted are decrypted by attackers, it is difficult to further protect the date and code of software. Under these circumstances, the software watermarking technique is introduced as a new method to protect software.Among various software watermarking techniques, being of greater invisibility and robustness, the dynamic graph software watermarking technique has the greatest prospect in practical applications. So, the paper takes tamper-proof technique used to guarantee the security of the dynamic graph software watermarking as primary researching subject. Because there are various programming languages used in the developing of software, it is of important signification to design universal software watermarking for all these programming language. Based on the existing tamper-proof techniques, this dissert studies tamper-proof dynamic graph software watermarking, which is independent of specific program language. The main contributions of this dissert are as follows:1) Shortcomings of the tamper-proof technique based on multi-constant encoding are analyzed.2) A linear hashing algorithm, which is used to verify the topology integrity of sub-graph, is proposed.3) Verification of the topology integrity of sub-graphs is associated with the variables and functions of software, which can improve the invisibility of the verification functions.4) A feasible recovery scheme is presented for the topology of sub-graphs which is subject to tampering, which achieves the secure storage of parameters used to recover the topology of sub-graphs.5) Programming and implementing the critical parts of the improved scheme.The analysis and simulations show that the present scheme has the high ability to resist various attacks and provides a strong protection for software.
Keywords/Search Tags:Dynamic Graph Software Watermarking, Tamper-Proof, Variable, Proofing Function, Linear Hashing Calculating
PDF Full Text Request
Related items