System for Executing Encrypted Java Programs

@inproceedings{Kiperberg2017SystemFE,
  title={System for Executing Encrypted Java Programs},
  author={Michael Kiperberg and A. Resh and Asaf Algawi and N. Zaidenberg},
  booktitle={ICISSP},
  year={2017}
}
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. Adequate systems for managing secret keys in a protected trust… Expand
1 Citations
Efficient Protection for VDI Workstations

References

SHOWING 1-10 OF 25 REFERENCES
Remote attestation on legacy operating systems with trusted platform modules
  • 98
  • PDF
Truly-Protect: An Efficient VM-Based Software Protection
  • 16
  • PDF
Trusted Computing and DRM
  • 3
  • PDF
Mobile code security by Java bytecode instrumentation
  • 55
  • PDF
Remote Attestation of Software and Execution-Environment in Modern Machines
  • 11
BIT: A Tool for Instrumenting Java Bytecodes
  • H. Lee, B. Zorn
  • Computer Science
  • USENIX Symposium on Internet Technologies and Systems
  • 1997
  • 134
  • PDF
Unpacking virtualization obfuscators
  • 120
  • PDF
Hypervisor-based prevention of persistent rootkits
  • 20
Trusted Computing Platforms: TCPA Technology in Context
  • 333
SWATT: softWare-based attestation for embedded devices
  • 660
  • PDF
...
1
2
3
...