dc.contributor.author | Resh, Amit | |
dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Leon, Roee | |
dc.contributor.author | Zaidenberg, Nezer | |
dc.date.accessioned | 2018-01-19T08:44:57Z | |
dc.date.available | 2018-01-19T08:44:57Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Resh, A., Kiperberg, M., Leon, R., & Zaidenberg, N. (2017). System for Executing Encrypted Native Programs. <i>International Journal of Digital Content Technology and its Applications</i>, <i>11</i>(3), 56-71. <a href="http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf" target="_blank">http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf</a> | |
dc.identifier.other | CONVID_26511013 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/56805 | |
dc.description.abstract | An important aspect of protecting software from attack, theft of algorithms, or illegal software use, is
eliminating the possibility of performing reverse engineering. One common method to deal with these
issues is code obfuscation. However, in most case it was shown to be ineffective. Code encryption is a
much more effective means of defying reverse engineering, but it requires managing a secret key
available to none but the permissible users. The authors propose a new and innovative solution. Critical
functions in protected software are encrypted using well-known encryption algorithms. Following
verification by external attestation, a thin hypervisor is used as the basis of an eco-system that manages
just-in-time decryption, inside the CPU, where decrypted instructions are then executed and finally
discarded, while keeping the secret key and the decrypted instructions absolutely safe. The paper
presents and compares two methodologies that perform just-in-time decryption: in-place and buffered
execution. The former being safer, while the latter boasts better performance. | |
dc.language.iso | eng | |
dc.publisher | Convergence Information Society (GlobalCIS) | |
dc.relation.ispartofseries | International Journal of Digital Content Technology and its Applications | |
dc.relation.uri | http://www.globalcis.org/jdcta/ppl/JDCTA3803PPL.pdf | |
dc.subject.other | hypervisor | |
dc.subject.other | trusted computing | |
dc.subject.other | attestation | |
dc.subject.other | cyber-security | |
dc.title | System for Executing Encrypted Native Programs | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-201801181268 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.date.updated | 2018-01-18T13:15:26Z | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 56-71 | |
dc.relation.issn | 1975-9339 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 11 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © the Authors & Convergence Information Society, 2017. This is an open access article published by Convergence Information Society. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.type.okm | A1 | |