dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Leon, Roee | |
dc.contributor.author | Resh, Amit | |
dc.contributor.author | Algawi, Asaf | |
dc.contributor.author | Zaidenberg, Nezer J. | |
dc.date.accessioned | 2019-05-27T08:13:02Z | |
dc.date.available | 2019-05-27T08:13:02Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Kiperberg, M., Leon, R., Resh, A., Algawi, A., & Zaidenberg, N. J. (2019). Hypervisor-based Protection of Code. <i>IEEE Transactions on Information Forensics and Security</i>, <i>14</i>(8), 2203-2216. <a href="https://doi.org/10.1109/TIFS.2019.2894577" target="_blank">https://doi.org/10.1109/TIFS.2019.2894577</a> | |
dc.identifier.other | CONVID_28884986 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/64199 | |
dc.description.abstract | The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, and protection of the encrypted functions. We claim that the system can provide protection even if the attacker: 1) has access to the operating system kernel and 2) can intercept communication over the system bus. The evaluation of the system’s efficiency suggests that it can compete with and outperform obfuscation-based methods. | fi |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.relation.ispartofseries | IEEE Transactions on Information Forensics and Security | |
dc.rights | In Copyright | |
dc.subject.other | security | |
dc.subject.other | code protection | |
dc.subject.other | virtual machine monitors | |
dc.subject.other | trusted platform module | |
dc.title | Hypervisor-based Protection of Code | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-201905222732 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.date.updated | 2019-05-22T12:15:19Z | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 2203-2216 | |
dc.relation.issn | 1556-6013 | |
dc.relation.numberinseries | 8 | |
dc.relation.volume | 14 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2019 IEEE. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | tietoturva | |
dc.subject.yso | kryptografia | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5480 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1109/TIFS.2019.2894577 | |
dc.type.okm | A1 | |