dc.contributor.author | Ben Yehuda, Raz | |
dc.contributor.author | Zaidenberg, Jacob | |
dc.date.accessioned | 2020-01-31T09:33:48Z | |
dc.date.available | 2020-01-31T09:33:48Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Ben Yehuda, R., & Zaidenberg, J. (2020). Protection against reverse engineering in ARM. <i>International Journal of Information Security</i>, <i>19</i>(1), 39-51. <a href="https://doi.org/10.1007/s10207-019-00450-1" target="_blank">https://doi.org/10.1007/s10207-019-00450-1</a> | |
dc.identifier.other | CONVID_32424084 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/67650 | |
dc.description.abstract | With the advent of the mobile industry, we face new security challenges. ARM architecture is deployed in most mobile phones, homeland security, IoT, autonomous cars and other industries, providing a hypervisor API (via virtualization extension technology). To research the applicability of this virtualization technology for security in this platform is an interesting endeavor. The hypervisor API is an addition available for some ARMv7-a and is available with any ARMv8-a processor. Some ARM platforms also offer TrustZone, which is a separate exception level designed for trusted computing. However, TrustZone may not be available to engineers as some vendors lock it. We present a method of applying a thin hypervisor technology as a generic security solution for the most common operating system on the ARM architecture. Furthermore, we discuss implementation alternatives and differences, especially in comparison with the Intel architecture and hypervisor with TrustZone approaches. We provide performance benchmarks for using hypervisors for reverse engineering protection. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartofseries | International Journal of Information Security | |
dc.rights | In Copyright | |
dc.subject.other | security | |
dc.subject.other | ARM | |
dc.subject.other | mobile | |
dc.subject.other | IoT | |
dc.subject.other | hypervisor | |
dc.title | Protection against reverse engineering in ARM | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202001311915 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 39-51 | |
dc.relation.issn | 1615-5262 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 19 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Springer-Verlag GmbH Germany, part of Springer Nature 2019 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | esineiden internet | |
dc.subject.yso | langaton tekniikka | |
dc.subject.yso | mikroprosessorit | |
dc.subject.yso | mobiililaitteet | |
dc.subject.yso | takaisinmallinnus | |
dc.subject.yso | tietoturva | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p23070 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p13435 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4834 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p28853 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/s10207-019-00450-1 | |
dc.type.okm | A1 | |