KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

被引:101
|
作者
Iwendi, Celestine [1 ]
Jalil, Zunera [2 ]
Javed, Abdul Rehman [3 ]
Reddy, Thippa G. [4 ]
Kaluri, Rajesh [4 ]
Srivastava, Gautam [5 ,6 ]
Jo, Ohyun [7 ]
机构
[1] Cent South Univ Forestry & Technol, Dept Elect BCC, Changsha 410004, Peoples R China
[2] Air Univ, Dept Cyber Secur, Islamabad 44000, Pakistan
[3] Air Univ, Natl Ctr Cyber Secur, Islamabad 44000, Pakistan
[4] VIT, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[6] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[7] Chungbuk Natl Univ, Coll Elect & Comp Engn, Dept Comp Sci, Cheongju 28644, South Korea
基金
新加坡国家研究基金会;
关键词
Watermarking; Software algorithms; Heuristic algorithms; Malware; Software protection; Cyber-attacks; watermarking; software; algorithm; blind detection; attack models; security;
D O I
10.1109/ACCESS.2020.2988160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named <italic>KeySplitWatermark</italic>, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering. When tampering increases to a certain user-defined threshold, the original software code is restored making it resilient against attacks. <italic>KeySplitWatermark</italic> is evaluated on tampering attacks on three unique samples with two distinct watermarks. The outcomes show that the proposed approach reports promising results against cyber-attacks that are powerful and viable. We compared the performance of our proposal with state-of-the-art works using two different software codes. Our results depict that <italic>KeySplitWatermark</italic> correctly detects watermarks, resulting in up to 15.95 and 17.43 percent reduction in execution time on given code samples with no increase in program size and independent of watermark size.
引用
收藏
页码:72650 / 72660
页数:11
相关论文
共 50 条
  • [21] Models of reliability of fault-tolerant software under cyber-attacks
    Popov, Peter
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 228 - 239
  • [22] Effective Traffic Features Selection Algorithm for Cyber-Attacks Samples
    Li, Yihong
    Liu, Fangzheng
    Du, Zhenyu
    6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
  • [23] Framework for enhancing the operational resilience of cyber-manufacturing systems against cyber-attacks
    Espinoza-Zelaya, Carlos
    Moon, Young Bai
    MANUFACTURING LETTERS, 2023, 35 : 843 - 850
  • [24] Framework for enhancing the operational resilience of cyber-manufacturing systems against cyber-attacks
    Espinoza-Zelaya, Carlos
    Moon, Young Bai
    MANUFACTURING LETTERS, 2023, 35 : 843 - 850
  • [25] Resilience of multi-object density fusion against cyber-attacks
    Gao, Lin
    Battistelli, Giorgio
    Chisci, Luigi
    2022 11TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (ICCAIS), 2022, : 7 - 12
  • [26] A Control and Attack Detection Scheme for Fuzzy Systems against Cyber-attacks
    Zhang, Haili
    Li, Linlin
    Qiao, Liang
    2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ, 2023,
  • [27] Safety securing approach against cyber-attacks for process control system
    Hashimoto, Yoshihiro
    Toyoshima, Takeshi
    Yogo, Shuichi
    Koike, Masato
    Hamaguchi, Takashi
    Jing, Sun
    Koshijima, Ichiro
    COMPUTERS & CHEMICAL ENGINEERING, 2013, 57 : 181 - 186
  • [28] Resilient Design of Leader-Follower Consensus Against Cyber-Attacks
    Sadabadi, Mahdieh S.
    Atman, Made Widhi Surya
    Aynala, Anirudh
    Gusrialdi, Azwirman
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 1080 - 1092
  • [29] Cyber Resilience: Why Protection against Cyber Attacks is not enough
    Kahrau, Felix
    ATP MAGAZINE, 2021, (11-12): : 32 - 34
  • [30] On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
    Mahdi Taheri
    Khashayar Khorasani
    Nader Meskin
    IEEE/CAA Journal of Automatica Sinica, 2024, 11 (11) : 2191 - 2203