Back to Search
Start Over
Hypervisor-based Protection of Code
- Source :
- IEEE Transactions on Information Forensics and Security. 14(8):2203-2216
- Publication Year :
- 2019
-
Abstract
- The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, and protection of the encrypted functions. We claim that the system can provide protection even if the attacker: 1) has access to the operating system kernel and 2) can intercept communication over the system bus. The evaluation of the system’s efficiency suggests that it can compete with and outperform obfuscation-based methods. peerReviewed
- Subjects :
- Computer Networks and Communications
Computer science
0211 other engineering and technologies
Cryptography
02 engineering and technology
security
Computer security
computer.software_genre
Encryption
kryptografia
Obfuscation
Code (cryptography)
tietoturva
virtual machine monitors
Safety, Risk, Reliability and Quality
System bus
trusted platform module
ta113
021110 strategic, defence & security studies
code protection
cryptography
business.industry
Hypervisor
Virtualization
Obfuscation (software)
business
computer
Subjects
Details
- Language :
- English
- ISSN :
- 15566013
- Volume :
- 14
- Issue :
- 8
- Database :
- OpenAIRE
- Journal :
- IEEE Transactions on Information Forensics and Security
- Accession number :
- edsair.doi.dedup.....45f1a88439baa5ec3bd344df057b4b6f