A Software Watermarking based on PE File with Tamper-proof Function

نویسندگان

  • Shengbing Che
  • Yemao Wang
چکیده

After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure’s nodes, and hid the watermark information in the rearranged resource structure. At the same time it recorded the exchanged node information of each layer, and encoded these exchanged nodes’ information. Then it constructed corresponding MPPCT and DPPCT according to the encoding results to achieve the purpose of anti-tamper. Experiment shows that it realizes a blind detection, resists multiple common attacks effectively, and has strong robustness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Watermarking as a Proof of Identity: A Study of Zero Knowledge Proof Based Software Watermarking

Software watermarking has been proposed as a way to prove ownership of software intellectual property in order to contain software piracy. In this paper, we propose a novel watermarking technique based on Zero Knowledge Proofs. The advantages are multi-fold. The watermark recognizer can now be distributed publicly. This helps in watermark being used as a proof for both authorship and authentica...

متن کامل

Self-validating Branch-Based Software Watermarking

Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, code obfuscation, and tamper detection. In this paper we present a novel dynamic software watermarking algorithm which incorporates ideas from code obfuscation and tamper detection. Our technique simultaneously provid...

متن کامل

A Scheme of PE Virus Detection Using Fragile Software Watermarking Technique

It is a difficult issue in the anti-virus field about how to detect unknown and packed PE (Portable Executable) viruses effectively, and existing schemes for anti-virus detection are dissatisfactory. Based on an analysis of the logical structures of Windows PE file and PE virus, a new method of PE virus detection is presented here, which exploits fragile software watermarking technique for viru...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

Perturbated Functions: a new approach to Obfuscation and Diversity

This paper presents a method for transforming a function into a combination of correlated perturbated functions by splitting its input space into sub-spaces, assigning each to a different function in such a way that a majority vote on their outputs will always yield the correct initial functions output. This novel technique allows function obfuscation and implementation diversication. Applicati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013