University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Väitöskirjat
  • View Item
JYX > Opinnäytteet > Väitöskirjat > View Item

Preventing reverse engineering of native and managed programs

Thumbnail
View/Open
3.0 Mb

Downloads:  
Show download detailsHide download details  
Published in
Jyväskylä studies in computing
Authors
Kiperberg, Michael
Date
2015
Discipline
Tietotekniikka

 
One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target machine, but rather delivered to it from a remote server, upon a successful verification of its authenticity. The keys and the decrypted instructions are protected by a thin hy- pervisor at all times. The system allows the encryption and execution of both native and Java code. During native code execution, the decrypted instructions are inaccessible to a potentially malicious code. This is achieved by either preventing execution of any other code or by protecting the memory region containing the decrypted instructions during their execution. Java programs, unlike native programs, are not executed directly by the processor, but are interpreted (and sometimes compiled) by the Java Virtual Machine (JVM). Therefore, the JVM will require the cryptographic key to decrypt the encrypted portions of Java code, and there is no feasible way of securing the key inside the JVM. The thesis proposes to implement a Java bytecode interpreter inside the secure environment, governed by a thin hypervisor. This interpreter will run in parallel to the standard JVM, both cooperating to execute encrypted Java programs. ...
Publisher
University of Jyväskylä
ISBN
978-951-39-6437-5
ISSN Search the Publication Forum
1456-5390
Contains publications
  • Article I: Kiperberg, M.; Resh, A.; Zaidenberg, N.J. Remote Attestation of Software and Execution-Environment in Modern Machines. The 2nd IEEE International Conference on Cyber Security and Cloud Computing, 2015. DOI: 10.1109/CSCloud.2015.52
  • Article II: Zaidenberg, N.J.; Neittaanmäki, P.; Kiperberg, M.; Resh, A.. Trusted Computing and DRM. Cyber Security: Analytics, Technology and Automation, vol. 78, pp. 205-212, 2015. DOI: 10.1007/978-3-319-18302-2_13
  • Article III: Kiperberg, M.; Zaidenberg, N.J. Efficient Remote Authentication. The Journal of Information Warfare , vol.12, no.3, 2013.
  • Article IV: Averbuch, A.; Kiperberg, M.; Zaidenberg, N.J. Truly-Protect: An Efficient VM-Based Software Protection. Systems Journal, IEEE , vol.7, no.3, pp. 455- 466, 2013. DOI: 10.1109/JSYST.2013.2260617
  • Article V: Averbuch, A.; Kiperberg, M.; Zaidenberg, N.J. An efficient VM-based software protection. Network and System Security (NSS), 2011 5th International Conference, pp. 121-128, 2011. DOI: 10.1109/ICNSS.2011.6059968
  • Article VI: Kiperberg, M.; Resh, A.; Algawi, A.; Zaidenberg, N.J. System for Executing Encrypted Java Programs. IEEE Transactions on Dependable and Secure Computing, Submitted.
  • Article VII: Kiperberg, M.; Leon, R.; Resh, A.; Zaidenberg, N.J. System for Executing Encrypted Native Programs. IEEE Symposium on Security and Privacy, Submitted.
Keywords
takaisinmallinnus salausavaimet hypervisorit trusted computing virtualization hypervisor thin hypervisor remote attestation interpretation buffered execution tietoturva tietokoneohjelmat lähdekoodit Java salaus virtualisointi
URI

http://urn.fi/URN:ISBN:978-951-39-6437-5

Metadata
Show full item record
Collections
  • Väitöskirjat [3177]

Related items

Showing items with similar title or keywords.

  • Enforcing trust for execution-protection in modern environments 

    Resh, Amit (University of Jyväskylä, 2016)
    The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. ...
  • Protection against reverse engineering in ARM 

    Ben Yehuda, Raz; Zaidenberg, Jacob (Springer, 2020)
    With the advent of the mobile industry, we face new security challenges. ARM architecture is deployed in most mobile phones, homeland security, IoT, autonomous cars and other industries, providing a hypervisor API (via ...
  • Hypervisor-Based White Listing of Executables 

    Leon, Roee S; Kiperberg, Michael; Zabag, Anat Anatey Leon; Resh, Amit; Algawi, Asaf; Zaidenberg, Nezer J. (IEEE Computer Society Press, 2019)
    We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An ...
  • Hypervisor-assisted dynamic malware analysis 

    Leon, Roee S.; Kiperberg, Michael; Zabag, Anat Anatey Leon; Zaidenberg, Nezer Jacob (Springer, 2021)
    Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis ...
  • H-KPP : Hypervisor-Assisted Kernel Patch Protection 

    Kiperberg, Michael; Zaidenberg, Nezer Jacob (MDPI AG, 2022)
    We present H-KPP, hypervisor-based protection for kernel code and data structures. H-KPP prevents the execution of unauthorized code in kernel mode. In addition, H-KPP protects certain object fields from malicious ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre