2008
DOI: 10.1007/978-3-540-79104-1_7
|View full text |Cite
|
Sign up to set email alerts
|

Towards Tamper Resistant Code Encryption: Practice and Experience

Abstract: Abstract. In recent years, many have suggested to apply encryption in the domain of software protection against malicious hosts. However, little information seems to be available on the implementation aspects or cost of the different schemes. This paper tries to fill the gap by presenting our experience with several encryption techniques: bulk encryption, an ondemand decryption scheme, and a combination of both techniques. Our scheme offers maximal protection against both static and dynamic code analysis and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
49
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(49 citation statements)
references
References 15 publications
0
49
0
Order By: Relevance
“…The code can be decrypted by hardware (i.e., a secure co-processor) [56], which can add substantially to the costs. Software decryption is less expensive solution [9], but is vulnerable to dynamic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…The code can be decrypted by hardware (i.e., a secure co-processor) [56], which can add substantially to the costs. Software decryption is less expensive solution [9], but is vulnerable to dynamic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Cappaert [8] improved this idea and proposed a new tamper-proof scheme based on cryptography. A part of code is encrypted, and the left parts are used to get the key.…”
Section: Related Workmentioning
confidence: 99%
“…These constructs are utilized in obfuscating control-flow information. Code encryption is another useful technique against static analysis [9]. Figure 2 illustrates the creation of the virtualized application which is protected by such techniques.…”
Section: Software Protection Modelmentioning
confidence: 99%
“…Because the encrypted code cannot be run directly on commodity processors, the software decryption of the application code becomes a point of vulnerability. For example, schemes which decrypt the application in bulk are susceptible to dynamic analysis techniques [5], whereas decryption at a lower granularity (e.g., functions) can suffer from high overhead [9,29]. In contrast, executing encrypted applications under the control of a PVM has been shown to have a better performance-security tradeoff [27].…”
Section: Introductionmentioning
confidence: 99%