scispace - formally typeset
Open AccessJournal ArticleDOI

KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

Reads0
Chats0
TLDR
This paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks, and shows that the proposed approach reports promising results against Cyber-attacks that are powerful and viable.
Abstract
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering. When tampering increases to a certain user-defined threshold, the original software code is restored making it resilient against attacks. KeySplitWatermark is evaluated on tampering attacks on three unique samples with two distinct watermarks. The outcomes show that the proposed approach reports promising results against cyber-attacks that are powerful and viable. We compared the performance of our proposal with state-of-the-art works using two different software codes. Our results depict that KeySplitWatermark correctly detects watermarks, resulting in up to 15.95 and 17.43 percent reduction in execution time on given code samples with no increase in program size and independent of watermark size.

read more

Citations
More filters
Journal ArticleDOI

Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review

TL;DR: This systematic literature review offers a wide range of information on Industry 4.0 from the designing phase to security needs, from the deployment stage to the classification of the network, the difficulties, challenges, and future directions.
Journal ArticleDOI

A comprehensive survey of AI-enabled phishing attacks detection techniques.

TL;DR: A literature review of Artificial Intelligence techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection for each AI technique is presented and the qualities and shortcomings of these methodologies are examined.
Journal ArticleDOI

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

TL;DR: A novel approach DeepAMD to defend against real-world Android malware using deep Artificial Neural Network (ANN) has been adopted including an efficiency comparison of DeepAMD with conventional machine learning classifiers and state-of-the-art studies based on performance measures such as accuracy, recall, f-score, and precision.
Journal ArticleDOI

Security and privacy of UAV data using blockchain technology

TL;DR: A Blockchain Technology (BCT) based solution to improve the security and privacy of VC based device data by implementing an IoT based application in a virtual vehicle monitoring system and the results justify the efficiency and security aspects of the proposed approach.
Journal ArticleDOI

DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)

TL;DR: A novel high-efficient approach is proposed named DIDDOS to protect against real-world new type DDoS attacks using Gated Recurrent Unit (GRU) a type of Recurrent Neural Network (RNN).
References
More filters
Journal ArticleDOI

Watermarking, tamper-proofing, and obfuscation - tools for software protection

TL;DR: Three types of attack on the intellectual property contained in software and three corresponding technical defenses are identified, including obfuscation, watermarking, and tamper-proofing.
Proceedings ArticleDOI

Manufacturing cheap, resilient, and stealthy opaque constructs

TL;DR: The design of a Java code obfuscator is described, a tool which - through the application of code transformations - converts a Java program into an equivalent one that is more difficult to reverse engineer.
Book ChapterDOI

A Secure, Robust Watermark for Multimedia

TL;DR: A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.
Proceedings ArticleDOI

Software watermarking: models and dynamic embeddings

TL;DR: A new software watermarking technique in which a dynamic graphic watermark is stored in the execution state of a program.
Proceedings ArticleDOI

Dynamic path-based software watermarking

TL;DR: Results indicate that even relatively large watermarks can be embedded into programs at modest cost and error-correcting and tamper-proofing techniques can be used to make path-based watermarks resilient against a wide variety of attacks.
Related Papers (5)