{"title":"A tamper-proof software watermark using code encryption","authors":"Zhanyong Tang, Dingyi Fang","doi":"10.1109/ISI.2011.5983991","DOIUrl":null,"url":null,"abstract":"Utilizing a modified PPCT structure, a tamper-proof software watermark solution with code-based encryption is proposed. The General Chinese Remainder Theorem is exploited to split the watermark which is represented as a big number into pieces to enhance stealth. Changes to the source and object code are made to embed the watermark, and according to certain policies some parts of object code are encrypted with an en/decryption key which is highly coupled with object code to increase robustness and tamper-proof capability.","PeriodicalId":220165,"journal":{"name":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2011.5983991","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Utilizing a modified PPCT structure, a tamper-proof software watermark solution with code-based encryption is proposed. The General Chinese Remainder Theorem is exploited to split the watermark which is represented as a big number into pieces to enhance stealth. Changes to the source and object code are made to embed the watermark, and according to certain policies some parts of object code are encrypted with an en/decryption key which is highly coupled with object code to increase robustness and tamper-proof capability.