University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Artikkelit
  • Informaatioteknologian tiedekunta
  • View Item
JYX > Artikkelit > Informaatioteknologian tiedekunta > View Item

System for Executing Encrypted Native Programs

ThumbnailPublisher's PDF
View/Open
1.5Mb

Downloads:  
Show download detailsHide download details  
Resh, A., Kiperberg, M., Leon, R., & Zaidenberg, N. (2017). System for Executing Encrypted Native Programs. International Journal of Digital Content Technology and its Applications, 11 (3), 56-71. Retrieved from http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf
Published in
International Journal of Digital Content Technology and its Applications
Authors
Resh, Amit |
Kiperberg, Michael |
Leon, Roee |
Zaidenberg, Nezer
Date
2017
Discipline
Tietotekniikka
Copyright
© the Authors & Convergence Information Society, 2017. This is an open access article published by Convergence Information Society.

 
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system that manages just-in-time decryption, inside the CPU, where decrypted instructions are then executed and finally discarded, while keeping the secret key and the decrypted instructions absolutely safe. The paper presents and compares two methodologies that perform just-in-time decryption: in-place and buffered execution. The former being safer, while the latter boasts better performance. ...
Publisher
Convergence Information Society (GlobalCIS)
ISSN Search the Publication Forum
1975-9339
Keywords
hypervisor trusted computing attestation cyber-security

Original source
http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf

URI

http://urn.fi/URN:NBN:fi:jyu-201801181268

Metadata
Show full item record
Collections
  • Informaatioteknologian tiedekunta [1279]
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement
Open Science Centre