University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Artikkelit
  • Informaatioteknologian tiedekunta
  • View Item
JYX > Artikkelit > Informaatioteknologian tiedekunta > View Item

System for Executing Encrypted Native Programs

ThumbnailPublisher's PDF
View/Open
1.5 Mb

Downloads:  
Show download detailsHide download details  
Resh, A., Kiperberg, M., Leon, R., & Zaidenberg, N. (2017). System for Executing Encrypted Native Programs. International Journal of Digital Content Technology and its Applications, 11(3), 56-71. http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf
Published in
International Journal of Digital Content Technology and its Applications
Authors
Resh, Amit |
Kiperberg, Michael |
Leon, Roee |
Zaidenberg, Nezer
Date
2017
Discipline
TietotekniikkaMathematical Information Technology
Copyright
© the Authors & Convergence Information Society, 2017. This is an open access article published by Convergence Information Society.

 
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system that manages just-in-time decryption, inside the CPU, where decrypted instructions are then executed and finally discarded, while keeping the secret key and the decrypted instructions absolutely safe. The paper presents and compares two methodologies that perform just-in-time decryption: in-place and buffered execution. The former being safer, while the latter boasts better performance. ...
Publisher
Convergence Information Society (GlobalCIS)
ISSN Search the Publication Forum
1975-9339
Keywords
hypervisor trusted computing attestation cyber-security

Original source
http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf

URI

http://urn.fi/URN:NBN:fi:jyu-201801181268

Publication in research information system

https://converis.jyu.fi/converis/portal/detail/Publication/26511013

Metadata
Show full item record
Collections
  • Informaatioteknologian tiedekunta [1859]

Related items

Showing items with similar title or keywords.

  • Preventing reverse engineering of native and managed programs 

    Kiperberg, Michael (University of Jyväskylä, 2015)
    One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these ...
  • Preventing Execution of Unauthorized Native-Code Software 

    Resh, Amit; Kiperberg, Michael; Leon, Roee; Zaidenberg, Nezer J. (Convergence Information Society (GlobalCIS), 2017)
    The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. ...
  • On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems 

    Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)
    Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology ...
  • Socially-aware Dynamic Computation Offloading Scheme for Fog Computing System with Energy Harvesting Devices 

    Liu, Liqing; Chang, Zheng; Guo, Xijuan (Institute of Electrical and Electronics Engineers, 2018)
    Fog computing is considered as a promising technology to meet the ever-increasing computation requests from a wide variety of mobile applications. By offloading the computation-intensive requests to the fog node or the ...
  • Enforcing trust for execution-protection in modern environments 

    Resh, Amit (University of Jyväskylä, 2016)
    The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre