2016 IEEE Trustcom/BigDataSE/Ispa 2016
DOI: 10.1109/trustcom.2016.0101
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Dynamic Scheduling for VM-Based Code Obfuscation

Abstract: Code virtualization built upon virtual machine (VM) technologies is emerging as a viable method for implementing code obfuscation to protect programs against unauthorized analysis. State-of-the-art VM-based protection approaches use a fixed scheduling structure where the program follows a single, static execution path for the same input. Such approaches, however, are vulnerable to certain scenarios where the attacker can reuse knowledge extracted from previously seen software to crack applications using simila… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 12 publications
(12 reference statements)
0
3
0
Order By: Relevance
“…In this work, we use the following three tools. Tigress [49], [14] is a source- [34] on the arm instruction set.…”
Section: Stealthmentioning
confidence: 99%
“…In this work, we use the following three tools. Tigress [49], [14] is a source- [34] on the arm instruction set.…”
Section: Stealthmentioning
confidence: 99%
“…In this paper, we implement the virtualization process by stack virtual machine [24]. If we utilize VM to simulate the normal execution of the program, it is necessary to build the structure of the stack and register in the WebAssembly environment.…”
Section: Implementation Detailsmentioning
confidence: 99%
“…At present, we can divide the existing structure into three categories: centralized model [4,31], Chained model [32] and Hybrid model [32,33]. In this paper, we prefer to use the third one.…”
Section: Dispatchermentioning
confidence: 99%