System for Executing Encrypted Native Programs
Resh, A., Kiperberg, M., Leon, R., & Zaidenberg, N. (2017). System for Executing Encrypted Native Programs. International Journal of Digital Content Technology and its Applications, 11(3), 56-71. http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf
© the Authors & Convergence Information Society, 2017. This is an open access article published by Convergence Information Society.
An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is eliminating the possibility of performing reverse engineering. One common method to deal with these issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a secret key available to none but the permissible users. The authors propose a new and innovative solution. Critical functions in protected software are encrypted using well-known encryption algorithms. Following verification by external attestation, a thin hypervisor is used as the basis of an eco-system that manages just-in-time decryption, inside the CPU, where decrypted instructions are then executed and finally discarded, while keeping the secret key and the decrypted instructions absolutely safe. The paper presents and compares two methodologies that perform just-in-time decryption: in-place and buffered execution. The former being safer, while the latter boasts better performance. ...
PublisherConvergence Information Society (GlobalCIS)
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Kiperberg, Michael (University of Jyväskylä, 2015)One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these ...
Resh, Amit; Kiperberg, Michael; Leon, Roee; Zaidenberg, Nezer J. (Convergence Information Society (GlobalCIS), 2017)The business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. ...
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems Khandker, Syed; Turtiainen, Hannu; Costin, Andrei; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology ...
Socially-aware Dynamic Computation Offloading Scheme for Fog Computing System with Energy Harvesting Devices Liu, Liqing; Chang, Zheng; Guo, Xijuan (Institute of Electrical and Electronics Engineers, 2018)Fog computing is considered as a promising technology to meet the ever-increasing computation requests from a wide variety of mobile applications. By offloading the computation-intensive requests to the fog node or the ...
Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach Rathod, Paresh; Hämäläinen, Timo (Academic Conferences International, 2020)In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On ...