Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (9): 12-21.doi: 10.11959/j.issn.2096-109x.2016.00083

• academic paper • Previous Articles     Next Articles

Software watermarking scheme with cloud computing constraints

Guang SUN1,2,3(),Xiao-ping FAN1,3,Wang-dong JIANG3,Hang-jun ZHOU3,Sheng-zong LIU3,Chun-hong GONG3,Jing ZHU3   

  1. 1 Computer Science and Technology Postdoctoral Station,Central South University,Changsha 410083,China
    2 Computer Science Department,University of Alabama,Tuscaloosa 35401,USA
    3 Institute of Big Data,Hunan University of Finance & Economics,Changsha 410205,China
  • Revised:2016-09-02 Online:2016-09-15 Published:2020-03-26
  • Supported by:
    Computer Science Research Center of China and The United States Open Fund(KJR16046);China Scholarship Council of the Ministry of Education(201408430218);Open Innovation Platform Fund Projects in Hunan Prov-ince(16k013)

Abstract:

A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.

Key words: cloud computing, software watermarking, non-equivalent semantic obfuscation, robustness

CLC Number: 

No Suggested Reading articles found!