• Publications
  • Influence
An efficient VM-based software protection
TLDR
This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Expand
  • 17
Truly-Protect: An Efficient VM-Based Software Protection
TLDR
We present Truly-Protect that is a software protection method that is resistant not only to Rolles' attack but also to any other attacks that do not violate the assumptions. Expand
  • 16
  • PDF
Remote Attestation of Software and Execution-Environment in Modern Machines
TLDR
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Expand
  • 11
Preventing Execution of Unauthorized Native-Code Software
TLDR
The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Expand
  • 5
Hypervisor-Based Protection of Code
TLDR
We propose a method that is based on cryptography and virtualization. Expand
  • 4
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
TLDR
We propose a hypervisor-based memory acquisition method that solves the two aforementioned deficiencies. Expand
  • 5
  • PDF
Modern Blue Pills and Red Pills
TLDR
The red pill and blue pill situation on Intel and AMD virtualizations circa 2018 and the eighth generation of core iX CPUs. Expand
  • 3
Trusted Computing and DRM
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that areExpand
  • 3
  • PDF
System for Executing Encrypted Native Programs
TLDR
This paper presents and compares two methodologies that perform just-in-time decryption: in-place and buffered execution. Expand
  • 2
Hypervisor-Based White Listing of Executables
TLDR
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. Expand
  • 1