KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks
Celestine Iwendi,Zunera Jalil,Abdul Rehman Javed,G. Thippa Reddy,Rajesh Kaluri,Gautam Srivastava,Ohyun Jo +6 more
Reads0
Chats0
TLDR
This paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks, and shows that the proposed approach reports promising results against Cyber-attacks that are powerful and viable.Abstract:
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, crypto-jacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering. When tampering increases to a certain user-defined threshold, the original software code is restored making it resilient against attacks. KeySplitWatermark is evaluated on tampering attacks on three unique samples with two distinct watermarks. The outcomes show that the proposed approach reports promising results against cyber-attacks that are powerful and viable. We compared the performance of our proposal with state-of-the-art works using two different software codes. Our results depict that KeySplitWatermark correctly detects watermarks, resulting in up to 15.95 and 17.43 percent reduction in execution time on given code samples with no increase in program size and independent of watermark size.read more
Citations
More filters
Journal ArticleDOI
Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review
Mamoona Majid,Shaista Habib,Abdul Rehman Javed,Muhammad Rizwan,Gautam Srivastava,Thippa Reddy Gadekallu,Chun-Wei Lin +6 more
TL;DR: This systematic literature review offers a wide range of information on Industry 4.0 from the designing phase to security needs, from the deployment stage to the classification of the network, the difficulties, challenges, and future directions.
Journal ArticleDOI
A comprehensive survey of AI-enabled phishing attacks detection techniques.
TL;DR: A literature review of Artificial Intelligence techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection for each AI technique is presented and the qualities and shortcomings of these methodologies are examined.
Journal ArticleDOI
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network
Syed Ibrahim Imtiaz,Saif ur Rehman,Abdul Rehman Javed,Zunera Jalil,Xuan Liu,Waleed S. Alnumay +5 more
TL;DR: A novel approach DeepAMD to defend against real-world Android malware using deep Artificial Neural Network (ANN) has been adopted including an efficiency comparison of DeepAMD with conventional machine learning classifiers and state-of-the-art studies based on performance measures such as accuracy, recall, f-score, and precision.
Journal ArticleDOI
Security and privacy of UAV data using blockchain technology
Rupa Ch,Gautam Srivastava,Gautam Srivastava,Thippa Reddy Gadekallu,Praveen Kumar Reddy Maddikunta,Sweta Bhattacharya +5 more
TL;DR: A Blockchain Technology (BCT) based solution to improve the security and privacy of VC based device data by implementing an IoT based application in a virtual vehicle monitoring system and the results justify the efficiency and security aspects of the proposed approach.
Journal ArticleDOI
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
Saif ur Rehman,Mubashir Khaliq,Syed Ibrahim Imtiaz,Aamir Rasool,Muhammad Shafiq,Abdul Rehman Javed,Zunera Jalil,Ali Kashif Bashir +7 more
TL;DR: A novel high-efficient approach is proposed named DIDDOS to protect against real-world new type DDoS attacks using Gated Recurrent Unit (GRU) a type of Recurrent Neural Network (RNN).
References
More filters
Journal ArticleDOI
Watermarking, tamper-proofing, and obfuscation - tools for software protection
TL;DR: Three types of attack on the intellectual property contained in software and three corresponding technical defenses are identified, including obfuscation, watermarking, and tamper-proofing.
Proceedings ArticleDOI
Manufacturing cheap, resilient, and stealthy opaque constructs
TL;DR: The design of a Java code obfuscator is described, a tool which - through the application of code transformations - converts a Java program into an equivalent one that is more difficult to reverse engineer.
Book ChapterDOI
A Secure, Robust Watermark for Multimedia
TL;DR: A digital watermarking method for use in audio, image, video and multimedia data that is robust to common signal distortions and malicious attack, and can be constructed to make counterfeiting almost impossible.
Proceedings ArticleDOI
Software watermarking: models and dynamic embeddings
TL;DR: A new software watermarking technique in which a dynamic graphic watermark is stored in the execution state of a program.
Proceedings ArticleDOI
Dynamic path-based software watermarking
Christian Collberg,Edward Carter,Saumya K. Debray,A. Huntwork,John Kececioglu,Cullen Linn,Michael Stepp +6 more
TL;DR: Results indicate that even relatively large watermarks can be embedded into programs at modest cost and error-correcting and tamper-proofing techniques can be used to make path-based watermarks resilient against a wide variety of attacks.