KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

被引:101
|
作者
Iwendi, Celestine [1 ]
Jalil, Zunera [2 ]
Javed, Abdul Rehman [3 ]
Reddy, Thippa G. [4 ]
Kaluri, Rajesh [4 ]
Srivastava, Gautam [5 ,6 ]
Jo, Ohyun [7 ]
机构
[1] Cent South Univ Forestry & Technol, Dept Elect BCC, Changsha 410004, Peoples R China
[2] Air Univ, Dept Cyber Secur, Islamabad 44000, Pakistan
[3] Air Univ, Natl Ctr Cyber Secur, Islamabad 44000, Pakistan
[4] VIT, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
[5] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[6] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[7] Chungbuk Natl Univ, Coll Elect & Comp Engn, Dept Comp Sci, Cheongju 28644, South Korea
基金
新加坡国家研究基金会;
关键词
Watermarking; Software algorithms; Heuristic algorithms; Malware; Software protection; Cyber-attacks; watermarking; software; algorithm; blind detection; attack models; security;
D O I
10.1109/ACCESS.2020.2988160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named <italic>KeySplitWatermark</italic>, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering. When tampering increases to a certain user-defined threshold, the original software code is restored making it resilient against attacks. <italic>KeySplitWatermark</italic> is evaluated on tampering attacks on three unique samples with two distinct watermarks. The outcomes show that the proposed approach reports promising results against cyber-attacks that are powerful and viable. We compared the performance of our proposal with state-of-the-art works using two different software codes. Our results depict that <italic>KeySplitWatermark</italic> correctly detects watermarks, resulting in up to 15.95 and 17.43 percent reduction in execution time on given code samples with no increase in program size and independent of watermark size.
引用
收藏
页码:72650 / 72660
页数:11
相关论文
共 50 条
  • [31] On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
    Taheri, Mahdi
    Khorasani, Khashayar
    Meskin, Nader
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2024, 11 (11) : 2191 - 2203
  • [32] Stealthy Software: Next-generation Cyber-attacks and Defenses (Invited Paper)
    Hamlen, Kevin W.
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 109 - 112
  • [33] Multivariable secure guidance for interceptors against cyber-attacks in guidance commands
    Wang, Yu
    Wang, Zhihui
    Wang, Chenliang
    Bai, Linling
    Qiao, Jianzhong
    Guo, Lei
    AEROSPACE SCIENCE AND TECHNOLOGY, 2023, 139
  • [34] Enhanced robust frequency stabilization of a microgrid against simultaneous cyber-attacks
    Kerdphol, Thongchart
    Ngamroo, Issarachai
    Surinkaew, Tossaporn
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 228
  • [35] Supervised Learning for DC-link Protection of Dual-Active Bridge Converter Against Cyber-Attacks
    Ryan, Joshua T.
    Mehrasa, Majid
    Selvaraj, Daisy Flora
    2023 NORTH AMERICAN POWER SYMPOSIUM, NAPS, 2023,
  • [36] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [37] Integrated protection of industrial control systems from cyber-attacks: the ATENA approach
    Adamsky, F.
    Aubigny, M.
    Battisti, F.
    Carli, M.
    Cimorelli, F.
    Cruz, T.
    Di Giorgio, A.
    Foglietta, C.
    Galli, A.
    Giuseppi, A.
    Liberati, F.
    Neri, A.
    Panzieri, S.
    Pascucci, F.
    Proenca, J.
    Pucci, P.
    Rosa, L.
    Soua, R.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 21 : 72 - 82
  • [38] A Review on Research of Cyber-attacks and Defense in Cyber Physical Power Systems Part Two Detection and Protection
    Tang Y.
    Li M.
    Wang Q.
    Ni M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (10): : 1 - 9and18
  • [39] A Special Class of Zero Dynamics Cyber-Attacks for SISO Time-Delay Systems
    Baniamerian, Amir
    Khorasani, Khashayar
    Meskin, Nader
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4182 - 4187
  • [40] Optimal defense resource allocation against cyber-attacks in distributed generation systems
    Mo, Huadong
    Xiao, Xun
    Sansavini, Giovanni
    Dong, Daoyi
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2024, 238 (06) : 1302 - 1329