PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES

<p><strong><em>Purpose:</em></strong><em> One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks coul...

Full description

Bibliographic Details
Main Author: Denys Samoilenko
Format: Article
Language:English
Published: National Aviation University 2016-06-01
Series:Vìsnik Nacìonalʹnogo Avìacìjnogo Unìversitetu
Subjects:
Online Access:http://jrnl.nau.edu.ua/index.php/visnik/article/view/10431
id doaj-484bffeb4bb64796a70bbc29dd07eaa3
record_format Article
spelling doaj-484bffeb4bb64796a70bbc29dd07eaa32020-11-25T03:17:43ZengNational Aviation UniversityVìsnik Nacìonalʹnogo Avìacìjnogo Unìversitetu1813-11662306-14722016-06-01672445110.18372/2306-1472.67.1043110071PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODESDenys Samoilenko0National University of Shipbuilding after Admiral Makarov, Mykolaiv, Ukraine<p><strong><em>Purpose:</em></strong><em> One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks could be useful for authority protection, for code copies numbering, for program propagation monitoring, for information security proposes in client-server communication processes. <strong>Methods:</strong> We used the methods of digital steganography adopted for program codes as text objects. The same-shape symbols method was transformed to same-semantic element method due to codes features which makes them different from ordinary texts. We use dynamic principle of marks forming making codes similar to be polymorphic. <strong>Results:</strong> We examined the combinatorial capacity of permutations possible in program codes. As a result it was shown that the set of 5-7 polymorphic variables is suitable for the most modern network applications. Marks creation and restoration algorithms where proposed and discussed. The main algorithm is based on full and partial permutations in variables names and its declaration order. Algorithm for partial permutation enumeration was optimized for calculation complexity. PHP code fragments which realize the algorithms were listed. <strong>Discussion:</strong> Methodic proposed in the work allows distinguishing of each client-server connection. In a case if a clone of some network resource was found the methodic could give information about included marks and thereby data on IP, date and time, authentication information of client copied the resource. Usage of polymorphic stego-watermarks should improve information security indexes in network communications.</em> <em></em></p>http://jrnl.nau.edu.ua/index.php/visnik/article/view/10431data protectiondigital watermarksinformation securityprogram codesteganography
collection DOAJ
language English
format Article
sources DOAJ
author Denys Samoilenko
spellingShingle Denys Samoilenko
PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES
Vìsnik Nacìonalʹnogo Avìacìjnogo Unìversitetu
data protection
digital watermarks
information security
program code
steganography
author_facet Denys Samoilenko
author_sort Denys Samoilenko
title PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES
title_short PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES
title_full PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES
title_fullStr PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES
title_full_unstemmed PERMUTATION-BASED POLYMORPHIC STEGO-WATERMARKS FOR PROGRAM CODES
title_sort permutation-based polymorphic stego-watermarks for program codes
publisher National Aviation University
series Vìsnik Nacìonalʹnogo Avìacìjnogo Unìversitetu
issn 1813-1166
2306-1472
publishDate 2016-06-01
description <p><strong><em>Purpose:</em></strong><em> One of the most actual trends in program code protection is code marking. The problem consists in creation of some digital “watermarks” which allow distinguishing different copies of the same program codes. Such marks could be useful for authority protection, for code copies numbering, for program propagation monitoring, for information security proposes in client-server communication processes. <strong>Methods:</strong> We used the methods of digital steganography adopted for program codes as text objects. The same-shape symbols method was transformed to same-semantic element method due to codes features which makes them different from ordinary texts. We use dynamic principle of marks forming making codes similar to be polymorphic. <strong>Results:</strong> We examined the combinatorial capacity of permutations possible in program codes. As a result it was shown that the set of 5-7 polymorphic variables is suitable for the most modern network applications. Marks creation and restoration algorithms where proposed and discussed. The main algorithm is based on full and partial permutations in variables names and its declaration order. Algorithm for partial permutation enumeration was optimized for calculation complexity. PHP code fragments which realize the algorithms were listed. <strong>Discussion:</strong> Methodic proposed in the work allows distinguishing of each client-server connection. In a case if a clone of some network resource was found the methodic could give information about included marks and thereby data on IP, date and time, authentication information of client copied the resource. Usage of polymorphic stego-watermarks should improve information security indexes in network communications.</em> <em></em></p>
topic data protection
digital watermarks
information security
program code
steganography
url http://jrnl.nau.edu.ua/index.php/visnik/article/view/10431
work_keys_str_mv AT denyssamoilenko permutationbasedpolymorphicstegowatermarksforprogramcodes
_version_ 1724630494560124928