2011 5th International Conference on Network and System Security 2011
DOI: 10.1109/icnss.2011.6059968
|View full text |Cite
|
Sign up to set email alerts
|

An efficient VM-based software protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…At present, we can divide the existing structure into three categories: centralized model [4,31], Chained model [32] and Hybrid model [32,33]. In this paper, we prefer to use the third one.…”
Section: Dispatchermentioning
confidence: 99%
See 1 more Smart Citation
“…At present, we can divide the existing structure into three categories: centralized model [4,31], Chained model [32] and Hybrid model [32,33]. In this paper, we prefer to use the third one.…”
Section: Dispatchermentioning
confidence: 99%
“…Code obfuscation technique based on process-level virtual machines (PVMs) is becoming a viable means to protect software systems from malicious tampering. Recent studies have shown that such techniques are effective in managing digital copy rights [2], code protection [3], and tamper-proofing [4].…”
Section: Introductionmentioning
confidence: 99%
“…Barrantes [5] proposed the concept of instruction-set randomization to improve program's resistance to code-injection attacks. Amir [4] proposed a more efficient VM-based software protection. They don't rely on obscurity but rely on the system itself and cryptographic measures to develop VMCbased conditional access and trusted computing environment.…”
Section: Introductionmentioning
confidence: 99%
“…Barrantes [4] proposed the concept of instruction-set randomization to improve program's resistance to code-injection attacks. Amir [5] proposed an efficient VM-based software protection. They avoid relying on obscurity and rely only on the assumptions about the system itself and on cryptographic measures to develop VM-based conditional access/trusted computing environment.…”
Section: Introductionmentioning
confidence: 99%