4.6 Article

Exception Handling-Based Dynamic Software Watermarking

Journal

IEEE ACCESS
Volume 6, Issue -, Pages 8882-8889

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2810058

Keywords

Software watermarking; dynamic software watermarking; exception handling; watermark encoding

Funding

  1. National Natural Science Foundation of China [61401512, 61602508, 61772549, 6141512, U1636219]
  2. National Key Research and Development Program of China [2016YFB0801303, 2016QY01W0105]
  3. Key Technologies Research and Development Program of Henan Province [162102210032]
  4. Key Science and Technology Research Project of Henan Province [152102210005]

Ask authors/readers for more resources

Existing algorithms experience difficulty resisting additive and subtractive attacks because the embedded watermarks are independent of the carrier programs. A dynamic software watermarking algorithm based on exception handling is proposed in this paper. The algorithm considers the fact that exception handling, which is difficult to remove, commonly exists in the programs to ensure the normal program operation. First, an exception type table is constructed, and the binary watermark to be embedded is mapped to a sequence of exception types by scrambling encoding. Second, corresponding trigger conditions and exception handlers are constructed, and watermark embeddable points are acquired in execution paths under secret inputs. Finally, the code segment of the constructed trigger conditions and exception handlers are inserted into the program with several meticulously designed identifiers. For watermark extraction, the triggered exception types can be obtained with the identifiers by executing the watermarked executable program under secret inputs. The mapping relationship between the exception type and watermark is utilized to decode the binary watermark. The algorithm analysis and experimental results show that the proposed algorithm can embed a watermark in the source code and extract it in an executable program. The algorithm demonstrates good performance against additive and subtractive attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available