2018
DOI: 10.1109/access.2018.2810058
|View full text |Cite
|
Sign up to set email alerts
|

Exception Handling-Based Dynamic Software Watermarking

Abstract: Existing algorithms experience difficulty resisting additive and subtractive attacks because the embedded watermarks are independent of the carrier programs. A dynamic software watermarking algorithm based on exception handling is proposed in this paper. The algorithm considers the fact that exception handling, which is difficult to remove, commonly exists in the programs to ensure the normal program operation. First, an exception type table is constructed, and the binary watermark to be embedded is mapped to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…To evaluate the performance of the proposed KeySplitWatermark, we used three different samples of software source codes and we name these as S1, S2, and S3. These samples are obtained from three independent sources of code written in the C++ programming language, a bus reservation system [39], a hospital management system [40] and a student information system [41]. These code samples include classes, public member functions, iteration, and decision structures.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…To evaluate the performance of the proposed KeySplitWatermark, we used three different samples of software source codes and we name these as S1, S2, and S3. These samples are obtained from three independent sources of code written in the C++ programming language, a bus reservation system [39], a hospital management system [40] and a student information system [41]. These code samples include classes, public member functions, iteration, and decision structures.…”
Section: Resultsmentioning
confidence: 99%
“…This section compares the performance of the KeySplitWatermark with the most recent relevant work on software watermarking Experiments are carried out on this two programs: CompressDemo and CryptoEncryption used in previous research work by [40], to facilitate comparison and used watermarks for 128, 256, 512, and 1024-bit random binary sequences. The experimental setup is kept the same as in [40] and the experiments are conducted in a system environment with Intel Core I5 CPU, 4GB of RAM, and Windows 10 operating system. To evaluate the watermarked program execution time objectively, two different inputs are selected for each program.…”
Section: Comparative Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Security problems involving digital images, such as leakage, malicious theft, and illegal dissemination, still frequently occur. In order to protect the data on the computer side, data encryption [1][2][3][4][5][6] and software watermarking [7,8] schemes are proposed. Similarly, some scholars have also investigated access control technology [9][10][11] to prevent illegal copying and transmission of data by restricting internal operations.…”
Section: Introductionmentioning
confidence: 99%