Truly-Protect: An Efficient VM-Based Software Protection

@article{Averbuch2013TrulyProtectAE,
  title={Truly-Protect: An Efficient VM-Based Software Protection},
  author={A. Averbuch and Michael Kiperberg and N. Zaidenberg},
  journal={IEEE Systems Journal},
  year={2013},
  volume={7},
  pages={455-466}
}
  • A. Averbuch, Michael Kiperberg, N. Zaidenberg
  • Published 2013
  • Computer Science
  • IEEE Systems Journal
  • We present Truly-Protect that is a software protection method. Previously published protection methods relied solely on obscurity. Rolles proposed a general approach for breaking systems that are based on obscurity. We show that, under certain assumptions, Truly-Protect is resistant not only to Rolles' attack but also to any other attacks that do not violate the assumptions. Truly-Protect is based on a virtual machine that enables us to execute encrypted programs. Truly-Protect can serve as a… CONTINUE READING
    16 Citations
    System for Executing Encrypted Native Programs
    • 2
    System for Executing Encrypted Java Programs
    • 1
    • PDF
    CloudProtect - A Cloud-based Software Protection Service
    CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
    • 9
    • PDF
    CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality
    • PDF
    Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
    • 13
    • PDF
    Protection against reverse engineering in ARM
    • 4
    • PDF
    Exploit dynamic data flows to protect software against semantic attacks
    • Kaiyuan Kuang, Z. Tang, +5 authors Zheng Wang
    • Computer Science
    • 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
    • 2017
    • 4
    • PDF

    References

    SHOWING 1-10 OF 36 REFERENCES
    Towards a Theory of Software Protection
    • 47
    • PDF
    Side Effects Are Not Sufficient to Authenticate Software
    • 94
    • PDF
    Establishing the Genuinity of Remote Computer Systems
    • 196
    • PDF
    Unpacking virtualization obfuscators
    • 120
    • PDF
    Attacks on Virtual Machine Emulators
    • 152
    • PDF
    Mistakes Microsoft Made in the Xbox Security System
    • 33
    • PDF
    Trust management for secure information flows
    • 39
    • PDF
    LLVM: a compilation framework for lifelong program analysis & transformation
    • 4,222
    • PDF
    The Java Virtual Machine Specification
    • 3,412
    • PDF