Hypervisor-Based Protection of Code
@article{Kiperberg2019HypervisorBasedPO, title={Hypervisor-Based Protection of Code}, author={Michael Kiperberg and R. Leon and A. Resh and Asaf Algawi and N. Zaidenberg}, journal={IEEE Transactions on Information Forensics and Security}, year={2019}, volume={14}, pages={2203-2216} }
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The… CONTINUE READING
Figures, Tables, and Topics from this paper
4 Citations
Protection against reverse engineering in ARM
- Computer Science
- International Journal of Information Security
- 2019
- 4
- PDF
Information Systems Security and Privacy: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers
- Computer Science
- ICISSP
- 2020
Efficient Protection for VDI Workstations
- Computer Science
- 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
- 2019
References
SHOWING 1-10 OF 63 REFERENCES
Obfuscator-LLVM -- Software Protection for the Masses
- Computer Science
- 2015 IEEE/ACM 1st International Workshop on Software Protection
- 2015
- 136
- Highly Influential
- PDF
TrustVisor: Efficient TCB Reduction and Attestation
- Computer Science
- 2010 IEEE Symposium on Security and Privacy
- 2010
- 572
- PDF
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
- Computer Science
- 2010 IEEE Symposium on Security and Privacy
- 2010
- 386
- PDF
A Generic Approach to Automatic Deobfuscation of Executable Code
- Computer Science
- 2015 IEEE Symposium on Security and Privacy
- 2015
- 136
- PDF
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization
- Computer Science
- 2012 IEEE Symposium on Security and Privacy
- 2012
- 316
- PDF
The Superdiversifier: Peephole Individualization for Software Protection
- Computer Science
- IWSEC
- 2008
- 27
- PDF
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
- Computer Science
- SOSP
- 2007
- 658
- PDF
Remote attestation on legacy operating systems with trusted platform modules
- Computer Science
- Sci. Comput. Program.
- 2008
- 98
- PDF
Towards Static Analysis of Virtualization-Obfuscated Binaries
- Computer Science
- 2012 19th Working Conference on Reverse Engineering
- 2012
- 46
- PDF