Virtual Machine for Encrypted Code Execution

被引:0
|
作者
Togan, Mihai [1 ,2 ]
Feraru, Alin [1 ]
Popescu, Adrian [1 ]
机构
[1] Mil Tech Acad, Dept Comp Sci, Bucharest, Romania
[2] CertSIGN, Res & Dev, Bucharest, Romania
关键词
code encryption; obfuscation; executable security; virtual machine;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we present an encryption-based obfuscation technique aiming to address a common and current issue that regards software theft intelligence and malicious attacks. Our approach involves executable code encryption and advanced code management that allows us to decrypt and execute only small parts of the program at a time. This will make the process of reverse engineering much harder than it would normally be with an ordinary executable.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A secure virtual execution environment for untrusted code
    Wen, Yan
    Wang, Huaimin
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 156 - 167
  • [2] CryptVMI: Encrypted Virtual Machine Introspection in the Cloud
    Yao, Fangzhou
    Campbell, Roy H.
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 977 - 978
  • [3] SEVerity: Code Injection Attacks against Encrypted Virtual Machines
    Morbitzer, Mathias
    Proskurin, Sergej
    Radev, Martin
    Dorfhuber, Marko
    Salas, Erick Quintanar
    [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 444 - 455
  • [4] Encrypted Program Execution
    Zhuravlev, Dmytro
    Samoilovych, Ihor
    Orlovskyi, Roman
    Bondarenko, Ievgen
    Lavrenyuk, Yaroslav
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 817 - 822
  • [5] Virtual machine code for embedded systems
    Yun, SL
    Nam, DK
    Oh, SM
    Kim, JS
    [J]. ESA'04 & VLSI'04, PROCEEDINGS, 2004, : 206 - 212
  • [6] CryptVMI: A Flexible and Encrypted Virtual Machine Introspection System in the Cloud
    Yao, Fangzhou
    Sprabery, Read
    Campbell, Roy H.
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 11 - 17
  • [7] The case for distributed execution replay using a virtual machine
    Loriant, Nicolas
    Menaud, Jean-Marc
    [J]. 15TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2006, : 181 - +
  • [8] Efficient execution of UML state machines on a virtual machine
    Schattkowsky, T
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTING TECHNIQUES, 2004, : 209 - 213
  • [9] Avoiding Hardware Aliasing Verifying RISC Machine and Assembly Code for Encrypted Computing
    Breuer, Peter T.
    Bowen, Jonathan P.
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2014, : 365 - 370
  • [10] OVM: Out-of-order execution parallel virtual machine
    Bosilca, G
    Fedak, G
    Cappello, F
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2002, 18 (04): : 525 - 537