4.6 Article

Exception Handling-Based Dynamic Software Watermarking

期刊

IEEE ACCESS
卷 6, 期 -, 页码 8882-8889

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2018.2810058

关键词

Software watermarking; dynamic software watermarking; exception handling; watermark encoding

资金

  1. National Natural Science Foundation of China [61401512, 61602508, 61772549, 6141512, U1636219]
  2. National Key Research and Development Program of China [2016YFB0801303, 2016QY01W0105]
  3. Key Technologies Research and Development Program of Henan Province [162102210032]
  4. Key Science and Technology Research Project of Henan Province [152102210005]

向作者/读者索取更多资源

Existing algorithms experience difficulty resisting additive and subtractive attacks because the embedded watermarks are independent of the carrier programs. A dynamic software watermarking algorithm based on exception handling is proposed in this paper. The algorithm considers the fact that exception handling, which is difficult to remove, commonly exists in the programs to ensure the normal program operation. First, an exception type table is constructed, and the binary watermark to be embedded is mapped to a sequence of exception types by scrambling encoding. Second, corresponding trigger conditions and exception handlers are constructed, and watermark embeddable points are acquired in execution paths under secret inputs. Finally, the code segment of the constructed trigger conditions and exception handlers are inserted into the program with several meticulously designed identifiers. For watermark extraction, the triggered exception types can be obtained with the identifiers by executing the watermarked executable program under secret inputs. The mapping relationship between the exception type and watermark is utilized to decode the binary watermark. The algorithm analysis and experimental results show that the proposed algorithm can embed a watermark in the source code and extract it in an executable program. The algorithm demonstrates good performance against additive and subtractive attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据