• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð

Á¤º¸°úÇÐȸ ³í¹®Áö A : ½Ã½ºÅÛ ¹× ÀÌ·Ð

Current Result Document : 3 / 4 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ÇÔ¼öÈ£Ãâ±Ô¾à¿¡ ±â¹ÝÇÑ »õ·Î¿î ¼ÒÇÁÆ®¿þ¾î ¿öÅ͸¶Å· ±â¹ý
¿µ¹®Á¦¸ñ(English Title) A Novel Software Watermarking Scheme Based on Calling Convention
ÀúÀÚ(Author) Àü ö   Á¤Áø¸¸   ±èºÀÀç   ÀåÁØÇõ   Á¶À¯±Ù   È«Áö¸¸   Cheol Jeon   Jinman Jung   Bongjae Kim   Joonhyouk Jang   Yookun Cho   Jiman Hong  
¿ø¹®¼ö·Ïó(Citation) VOL 39 NO. 04 PP. 0243 ~ 0249 (2012. 08)
Çѱ۳»¿ë
(Korean Abstract)
Åë½Å¸ÁÀÇ ¹ßÀü°ú ½º¸¶Æ®ÆùÀÇ ´ëÁßÈ­·Î ÀÎÇØ ¼ÒÇÁÆ®¿þ¾îÀÇ ¹èÆ÷¿Í À¯ÅëÀº Áö¼ÓÀûÀ¸·Î Áõ°¡ÇØ¿Ô´Ù. ÇÏÁö¸¸ ¼ÒÇÁÆ®¿þ¾î ºÒ¹ýº¹Á¦°¡ ¸¸¿¬ÇÑ »óȲ¿¡¼­ °³¹ßÀÚÀÇ ±Ç¸®¿Í ¼öÀÍÀº º¸È£¹ÞÁö ¸øÇÏ°í ÀÖ´Ù. ÀÌ·¯ÇÑ »óȲÀ» ±Øº¹Çϱâ À§ÇØ ¼ÒÇÁÆ®¿þ¾î °³¹ßÀÚÀÇ ÁöÀûÀç»ê±ÇÀ» º¸È£Çϱâ À§ÇÑ ¼ÒÇÁÆ®¿þ¾î ¿öÅ͸¶Å· ±â¹ýÀÌ Á¦¾ÈµÇ¾úÁö¸¸ ´ëºÎºÐÀÇ Á¦¾ÈµÈ ±â¹ýÀÌ ÄÚµå ÃÖÀûÈ­, ÄÚµå ³­µ¶È­ ±â¹ý¿¡ ÀÇÇØ ½±°Ô ¹«·ÂÈ­ µÇ¾úÀ» »Ó¸¸¾Æ´Ï¶ó º¹ÀâÇÑ ·ÎÁ÷À¸·Î ±¸¼ºµÇ¾î ±âÁ¸ ÇÁ·Î±×·¥°úÀÇ °áÇÕÀÌ ¾î·Á¿ü´Ù. ÀÌ ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇØ º» ³í¹®¿¡¼­´Â ÇÔ¼ö È£Ãâ ¼ø¼­¸¦ »ç¿ëÇØ ¿öÅ͸¶Å© °ªÀ» ºñÆ®-½ºÆ®¸µ(bit-string) ÇüÅ·ΠÀÎÄÚµùÇÏ°í Áß±¹ÀÎÀÇ ³ª¸ÓÁö Á¤¸®¸¦ ÀÌ¿ëÇÏ¿© °ø°Ý¿¡ ÀÇÇØ ÀϺΠ¿öÅ͸¶Å© °ªÀÌ º¯°æµÇ¾úÀ»Áö¶óµµ ¿ø·¡ÀÇ ¿öÅ͸¶Å© °ªÀ» ÃßÃâÇÒ ¼ö ÀÖ´Â ½ºÅ×°¡³ë±×·¡ÇÇ(steganography)¿Í ¿À·ùÁ¤Á¤(error-correction)±â¹ýÀ» °áÇÕÇÑ ÇüÅÂÀÇ »õ·Î¿î ¿öÅ͸¶Å· ±â¹ýÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Software market has steadily increased with the expansion of network infrastructure and the popularization of smartphone. However, software piracy is common such that the rights and the profits of developers are not protected. In order to overcome this situation software watermarking schemes have been proposed. However, these schemes have the shortcomings such that not only the watermarks can be destroyed via straightforward semantics-preserving code transformations, but also the mark that consists of complex logic can be difficult to be combined with existing programs. In order to solve the problems the proposed scheme combines steganography and error-correction scheme. It enhances the resilience of watermarks with the chinese remainder theorem, where the watermark is encoded as bit-string based on function call sequence. In the case that the watermark can be defeated by attacks, we employ the chinese remainder theorem as error-correction scheme.
Å°¿öµå(Keyword) ¼ÒÇÁÆ®¿þ¾î ¿öÅ͸¶Å·   ½ºÅ×°¡³ë±×·¡ÇÇ   Software watermarking   Steganography  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå