A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs

被引:6
作者
Su, Qing [1 ]
He, Fan [1 ]
Wu, Naiqi [2 ]
Lin, Zhiyi [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Macau Univ Sci & Technol, Inst Syst Engn, Macau 999078, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Code obfuscation; Petri nets; software protection; software protection technology; CRUDE-OIL OPERATIONS;
D O I
10.1109/ACCESS.2018.2812764
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect. When applying these technologies in a random way as the traditional methods do, an unexpected consequence may be produced, such as weakening the software protection effect and causing the protected software malfunction. To solve this problem, in this paper, a Petri net model is developed to describe the dependence behavior of applying multiple protection technologies. Then, algorithm is proposed to generate the reachable marking graph for the obtained Petri model. In considering different user requirements, based on the reachable marking graph, a method is presented to obtain a user-required and correct sequence of applying multiple protection technologies. The correctness of the obtained sequence is verified by a finite state automaton model. Experimental results show that the proposed method outperforms the traditional ones.
引用
收藏
页码:11988 / 12000
页数:13
相关论文
共 50 条
  • [1] Anckaert B., 2013, U.S. Patent, Patent No. [8 584 109 B2, 8]
  • [2] Optimal One-Wafer Cyclic Scheduling and Buffer Space Configuration for Single-Arm Multicluster Tools With Linear Topology
    Bai, Liping
    Wu, Naiqi
    Li, Zhiwu
    Zhou, MengChu
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2016, 46 (10): : 1456 - 1467
  • [3] Code Obfuscation Against Symbolic Execution Attacks
    Banescu, Sebastian
    Collberg, Christian
    Ganesh, Vijay
    Newsham, Zack
    Pretschner, Alexander
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 189 - 200
  • [4] On the (Im)possibility of Obfuscating Programs
    Barak, Boaz
    Goldreich, Oded
    Impagliazzo, Russell
    Rudich, Steven
    Sahai, Amit
    Vadhan, Salil
    Yang, Ke
    [J]. JOURNAL OF THE ACM, 2012, 59 (02)
  • [5] Becchi M., 2008, INT C ARCHITECTURES, P50, DOI DOI 10.1145/1477942.1477950
  • [6] Chaussade N., 2013, U. S. Patent, Patent No. [8 578 139 B2, 8]
  • [7] A novel method for deadlock prevention of AMS by using resource-oriented Petri nets
    Chen, Hefeng
    Wu, NaiQi
    Zhou, MengChu
    [J]. INFORMATION SCIENCES, 2016, 363 : 178 - 189
  • [8] A METRICS SUITE FOR OBJECT-ORIENTED DESIGN
    CHIDAMBER, SR
    KEMERER, CF
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1994, 20 (06) : 476 - 493
  • [9] Collberg C., 1997, A Taxonomy of Obfuscating Transformations
  • [10] Collberg C., 2012, TOOL STUDY SOFTWARE