2013
DOI: 10.1109/jsyst.2013.2260617
|View full text |Cite
|
Sign up to set email alerts
|

Truly-Protect: An Efficient VM-Based Software Protection

Abstract: Abstract-We present Truly-Protect that is a software protection method. Previously published protection methods relied solely on obscurity. Rolles proposed a general approach for breaking systems that are based on obscurity. We show that, under certain assumptions, Truly-Protect is resistant not only to Rolles' attack but also to any other attacks that do not violate the assumptions. Truly-Protect is based on a virtual machine that enables us to execute encrypted programs. Truly-Protect can serve as a platform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…As we can see, related factor(1), (4), (5), (8) are mentioned by stochastic optimization of program obfuscation [23], related factor(2), (9) are mentioned by the power of obfuscation techniques in malicious JavaScript code: A Measurement Study [34]. In addition, related factor(3), (6), (7) are customized by us where factor(3) means use encryption algorithm encrypts source code, factor(6) decomposition and the complexity of computing processes to reduce readability, and factor(7) add code that does not execute only reduces the readability of the code.…”
Section: ) Contrastive Results Of Reverse Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…As we can see, related factor(1), (4), (5), (8) are mentioned by stochastic optimization of program obfuscation [23], related factor(2), (9) are mentioned by the power of obfuscation techniques in malicious JavaScript code: A Measurement Study [34]. In addition, related factor(3), (6), (7) are customized by us where factor(3) means use encryption algorithm encrypts source code, factor(6) decomposition and the complexity of computing processes to reduce readability, and factor(7) add code that does not execute only reduces the readability of the code.…”
Section: ) Contrastive Results Of Reverse Analysismentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Chi- Yuan Chen . code reverse engineering [4], [5]. In recent years, code virtualization [6], [7] is emerging as a promising method for implementing code obfuscation. This technique translates the native instructions into bespoke virtual instructions to increase the strength of code obfuscation [8], [9].…”
Section: Introductionmentioning
confidence: 99%
“…TrulyProtect [3] for the ARM thin hypervisor offers an easy way to execute code in a secure environment in ARMv8-a, and does so in a way that does not require the user to modify the code. Unlike QSEE [20,21], the interaction with the secured area does not require any special preparations.…”
Section: Anti-reverse Engineeringmentioning
confidence: 99%
“…We measure malloc(3) [41] and free(3) [41], disk IO, file open(2) and close(2), memory access, and all these operations combined. It is important to note that the proposed system supports the use of any of these operations (malloc (3), open(2), write(2)) in an encrypted context; however, it does not offer to obfuscate them. This system localizes the obfuscation to some functions in a program.…”
Section: Predictabilitymentioning
confidence: 99%
See 1 more Smart Citation