Corpus ID: 54210388

Preventing Execution of Unauthorized Native-Code Software

  title={Preventing Execution of Unauthorized Native-Code Software},
  author={A. Resh and Michael Kiperberg and R. Leon and N. Zaidenberg},
  journal={International Journal of Digital Content Technology and Its Applications},
  • A. Resh, Michael Kiperberg, +1 author N. Zaidenberg
  • Published 2017
  • Computer Science
  • International Journal of Digital Content Technology and Its Applications
  • The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor… CONTINUE READING
    5 Citations
    Protection against reverse engineering in ARM
    • 4
    • PDF
    Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
    • 5
    • PDF
    Efficient Protection for VDI Workstations


    TrustVisor: Efficient TCB Reduction and Attestation
    • 572
    • PDF
    Remote Attestation of Software and Execution-Environment in Modern Machines
    • 11
    Truly-Protect: An Efficient VM-Based Software Protection
    • 16
    • PDF
    On the difficulty of software-based attestation of embedded devices
    • 181
    • PDF
    Hypervisor-based prevention of persistent rootkits
    • 20
    Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
    • 419
    • PDF
    Practical Techniques for Operating System Attestation
    • 36
    Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
    • Y. Yang, X. Wang, S. Zhu, G. Cao
    • Computer Science
    • 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007)
    • 2007
    • 147
    • PDF
    Establishing the Genuinity of Remote Computer Systems
    • 196
    • PDF