Hypervisor-Based Protection of Code

  title={Hypervisor-Based Protection of Code},
  author={Michael Kiperberg and R. Leon and A. Resh and Asaf Algawi and N. Zaidenberg},
  journal={IEEE Transactions on Information Forensics and Security},
  • Michael Kiperberg, R. Leon, +2 authors N. Zaidenberg
  • Published 2019
  • Computer Science
  • IEEE Transactions on Information Forensics and Security
  • The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The… CONTINUE READING
    4 Citations
    Protection against reverse engineering in ARM
    • 4
    • PDF
    Efficient Protection for VDI Workstations


    Obfuscator-LLVM -- Software Protection for the Masses
    • 136
    • Highly Influential
    • PDF
    TrustVisor: Efficient TCB Reduction and Attestation
    • 572
    • PDF
    A Taxonomy of Obfuscating Transformations
    • 950
    HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
    • Zhi Wang, X. Jiang
    • Computer Science
    • 2010 IEEE Symposium on Security and Privacy
    • 2010
    • 386
    • PDF
    A Generic Approach to Automatic Deobfuscation of Executable Code
    • 136
    • PDF
    Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization
    • 316
    • PDF
    The Superdiversifier: Peephole Individualization for Software Protection
    • 27
    • PDF
    SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
    • 658
    • PDF
    Remote attestation on legacy operating systems with trusted platform modules
    • 98
    • PDF
    Towards Static Analysis of Virtualization-Obfuscated Binaries
    • J. Kinder
    • Computer Science
    • 2012 19th Working Conference on Reverse Engineering
    • 2012
    • 46
    • PDF