International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
Conferences Published ↓
DePaul-2026
IC-AIRCM-T3-2026
SPHERE-2025
AIMAR-2025
SVGASCA-2025
ICCE-2025
Chinai-2023
PIPRDA-2023
ICMRS'23
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 8 Issue 3
May-June 2026
Indexing Partners
Software Protection Against Cyber Attack through Watermarking Technology
| Author(s) | Ms. Bharati Devidas Patil, Prof. Dr. Rohita Yamaganti |
|---|---|
| Country | India |
| Abstract | Cyber-attacks targeting software integrity, such as code tampering and malware injection, increasingly exploit vulnerabilities in static watermarking techniques that rely on fixed code locations, making them susceptible to pattern analysis and obfuscation. To address this, we propose DynMark, a dynamic graph-based watermarking algorithm enhanced with Reinforcement Learning (RL), which embeds and verifies watermarks in Control Flow Graphs (CFGs) at runtime. DynMark employs an RL agent (PPO algorithm) to dynamically select optimal CFG nodes for watermark insertion, maximizing tamper resistance while minimizing overhead, and utilizes a Graph Neural Network (GNN) to detect anomalies in execution traces. If tampering exceeds a threshold, the system self-heals by restoring the original CFG using a CA-registered signature. Key innovations include adaptability to execution context, blind detection without prior watermark location knowledge, and low overhead. This work bridges software watermarking with runtime integrity, offering a proactive defense against evolving threats. |
| Keywords | Dynamic Software Watermarking, Control Flow Graphs (CFGs), Reinforcement Learning (RL), Graph Neural Networks (GNNs), Tamper Detection, Code Obfuscation Resilience, Runtime Integrity Verification, Self-Healing Systems. |
| Field | Engineering |
| Published In | Volume 8, Issue 3, May-June 2026 |
| Published On | 2026-05-09 |
| DOI | https://doi.org/10.36948/ijfmr.2026.v08i03.77036 |
Share this

E-ISSN 2582-2160
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
Powered by Sky Research Publication and Journals