【24h】

Hypervisor-Based Protection of Code

机译:基于管理程序的代码保护

获取原文
获取原文并翻译 | 示例
           

摘要

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may he reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. .A specially crafted hypervisor is responsible for decryption, execution, and protection of the encrypted functions. We claim that the system can provide protection even if the attacker: 1) has access to the operating system kernel and 2) can intercept communication over the system bus. The evaluation of the system's efficiency suggests that it can compete with and outperform obfuscation-based methods.
机译:编译程序的代码容易受到对代码中包含的算法和业务逻辑的逆向工程攻击。逆向工程存在的主要对策是混淆。通常,混淆方法存在两个主要缺陷:1)混淆后的代码效率不及原始代码; 2)付出了足够的努力后,原始代码才可以重建。我们提出了一种基于加密和虚拟化的方法。对最有价值的功能进行了加密,即使在执行过程中也无法访问,因此无法进行重构。 。特制的管理程序负责解密,执行和保护加密功能。我们声称,即使攻击者:1)可以访问操作系统内核,并且2)可以拦截系统总线上的通信,该系统也可以提供保护。对系统效率的评估表明,它可以与基于混淆的方法竞争并胜过基于混淆的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号