Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
An efficient VM-based software protection
- A. Averbuch, Michael Kiperberg, N. Zaidenberg
- Computer Science
- 5th International Conference on Network and…
- 27 October 2011
TLDR
Truly-Protect: An Efficient VM-Based Software Protection
- A. Averbuch, Michael Kiperberg, N. Zaidenberg
- Computer Science
- IEEE Systems Journal
- 8 July 2013
TLDR
Remote Attestation of Software and Execution-Environment in Modern Machines
- Michael Kiperberg, A. Resh, N. Zaidenberg
- Computer Science
- IEEE 2nd International Conference on Cyber…
- 3 November 2015
TLDR
Preventing Execution of Unauthorized Native-Code Software
- A. Resh, Michael Kiperberg, R. Leon, N. Zaidenberg
- Computer Science
- 2017
TLDR
- 5
Hypervisor-Based Protection of Code
- Michael Kiperberg, R. Leon, A. Resh, Asaf Algawi, N. Zaidenberg
- Computer Science
- IEEE Transactions on Information Forensics and…
- 23 January 2019
TLDR
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
- Michael Kiperberg, R. Leon, A. Resh, Asaf Algawi, N. Zaidenberg
- Computer Science
- ICISSP
- 2019
TLDR
Modern Blue Pills and Red Pills
- Asaf Algawi, Michael Kiperberg, R. Leon, A. Resh, N. Zaidenberg
- Computer Science
- 2020
TLDR
Trusted Computing and DRM
- N. Zaidenberg, P. Neittaanmäki, Michael Kiperberg, A. Resh
- Computer Science
- 2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are… Expand
System for Executing Encrypted Native Programs
- A. Resh, Michael Kiperberg, R. Leon, N. Zaidenberg
- Computer Science
- 2017
TLDR
- 2
Hypervisor-Based White Listing of Executables
- R. Leon, Michael Kiperberg, Anat Anatey Leon Zabag, A. Resh, Asaf Algawi, N. Zaidenberg
- Computer Science
- IEEE Security & Privacy
- 7 May 2019
TLDR