A Method for Construction of Software Protection Technology Application Sequence Based on Petri Net With Inhibitor Arcs

被引:6
|
作者
Su, Qing [1 ]
He, Fan [1 ]
Wu, Naiqi [2 ]
Lin, Zhiyi [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Macau Univ Sci & Technol, Inst Syst Engn, Macau 999078, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Code obfuscation; Petri nets; software protection; software protection technology; CRUDE-OIL OPERATIONS;
D O I
10.1109/ACCESS.2018.2812764
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the field of software protection, when there is a dependence between the various software protection technologies, the application order of these technologies must be arranged in a correct way in order to maximize the protection effect. When applying these technologies in a random way as the traditional methods do, an unexpected consequence may be produced, such as weakening the software protection effect and causing the protected software malfunction. To solve this problem, in this paper, a Petri net model is developed to describe the dependence behavior of applying multiple protection technologies. Then, algorithm is proposed to generate the reachable marking graph for the obtained Petri model. In considering different user requirements, based on the reachable marking graph, a method is presented to obtain a user-required and correct sequence of applying multiple protection technologies. The correctness of the obtained sequence is verified by a finite state automaton model. Experimental results show that the proposed method outperforms the traditional ones.
引用
收藏
页码:11988 / 12000
页数:13
相关论文
共 50 条
  • [1] The Refinement of Petri Net with Inhibitor Arcs Based Representation for Embedded Systems
    Xia, Chuanliang
    Wang, Zhuangzhuang
    Wang, Zhong
    ELECTRONICS, 2022, 11 (09)
  • [2] New Petri Net Structure and Its Application to Optimal Supervisory Control: Interval Inhibitor Arcs
    Chen, YuFeng
    Li, Zhiwu
    Barkaoui, Kamel
    Uzam, Murat
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2014, 44 (10): : 1384 - 1400
  • [3] Weak (approximate) detectability of labeled Petri net systems with inhibitor arcs
    Zhang, Kuize
    Giva, Alessandro
    IFAC PAPERSONLINE, 2018, 51 (07): : 167 - 171
  • [4] A construction method for the process expression of petri net based on decomposition
    Department of Computer Science and Technology, Shandong University of Science and Technology, Qingdao 266510, China
    Inf. Technol. J., 2008, 3 (420-429):
  • [5] Research on Service Model of Protection relay Based on Occurrence Sequence of Petri Net
    Yang Guosheng
    Li Yanfei
    Zhan Rongrong
    Wang Wenhuan
    Guo Peng
    Wang Limin
    2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2018,
  • [6] A Petri-Net Based Reliability Prediction Method for SOA Software
    Zhang, Hao
    Lu, Minyan
    Gu, Tingyang
    ICAIP 2018: 2018 THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN IMAGE PROCESSING, 2018, : 165 - 172
  • [7] Integrity Check Method of Relay Protection Data Based on Petri Net
    Shen Hua
    Liu Dan
    Hu Haiyan
    Guo Peng
    Wang Wenhuan
    Kang Yiqun
    2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, : 64 - 68
  • [8] Petri Net Automatic Modeling Method Based on System Behavior Sequence
    Fan Hao
    Shu De-qin
    Zhang Liang
    MECHANICAL COMPONENTS AND CONTROL ENGINEERING III, 2014, 668-669 : 499 - 507
  • [9] Construction method for the process expression of a Petri net based on synchronization composition
    Zeng, Qing-Tian
    Jisuanji Xuebao/Chinese Journal of Computers, 2008, 31 (03): : 381 - 390
  • [10] 基于Petri net with inhibitor arcs的Python多线程程序分析
    冯英华
    赤峰学院学报(自然科学版), 2012, 28 (23) : 43 - 44