An efficient VM-based software protection

@article{Averbuch2011AnEV,
  title={An efficient VM-based software protection},
  author={A. Averbuch and Michael Kiperberg and N. Zaidenberg},
  journal={2011 5th International Conference on Network and System Security},
  year={2011},
  pages={121-128}
}
  • A. Averbuch, Michael Kiperberg, N. Zaidenberg
  • Published 2011
  • Computer Science
  • 2011 5th International Conference on Network and System Security
  • This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system. 
    17 Citations

    Figures and Topics from this paper

    Towards a Cloud-based System for Software Protection and Licensing
    • 2
    • PDF
    NISLVMP: Improved Virtual Machine-Based Software Protection
    • 11
    Hypervisor-Based Protection of Code
    • 4
    • PDF
    Authentication and Secured Execution for the Infrastructure-as-a-Service Layer of the Cloud Computing Model
    • L. Hubert, R. Sirdey
    • Computer Science
    • 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
    • 2013
    • 4
    • PDF
    System for Executing Encrypted Java Programs
    • 1
    • PDF
    Preventing Execution of Unauthorized Native-Code Software
    • 5
    Exploiting Dynamic Scheduling for VM-Based Code Obfuscation
    • 8
    • PDF
    Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
    • 13
    • PDF

    References

    SHOWING 1-10 OF 30 REFERENCES
    Secure in-VM monitoring using hardware virtualization
    • 272
    • PDF
    Unpacking virtualization obfuscators
    • 119
    • PDF
    Remus: High Availability via Asynchronous Virtual Machine Replication. (Best Paper)
    • 634
    • PDF
    Towards a Theory of Software Protection
    • 47
    • PDF
    Establishing the Genuinity of Remote Computer Systems
    • 196
    • PDF
    QEMU, a Fast and Portable Dynamic Translator
    • F. Bellard
    • Computer Science
    • USENIX Annual Technical Conference, FREENIX Track
    • 2005
    • 2,296
    • PDF
    The Java Virtual Machine Specification
    • 3,412
    • PDF
    Automatic Reverse Engineering of Malware Emulators
    • 192
    • PDF
    KVM (Kernel-based Virtual Machine) - 仮想化
    • 91
    • PDF
    Mistakes Microsoft Made in the Xbox Security System
    • 33
    • PDF