Proceedings of the 8th ACM SIGPLAN/SIGOPS Conference on Virtual Execution Environments 2012
DOI: 10.1145/2151024.2151051
|View full text |Cite
|
Sign up to set email alerts
|

Replacement attacks against VM-protected applications

Abstract: Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software protection). Processlevel virtual machines (PVMs) can safeguard the application code at run time and hamper the adversary's ability to launch dynamic attacks on the application. This dynamic protection, combined with its flexibility, ease in handling legacy systems and low performance overhead, has made process-level virtualization a po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
13
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 48 publications
1
13
0
Order By: Relevance
“…In this section, we first analyze DIVILAR's robustness against existing static and dynamic analysis, and countermeasures specific to VM-based protection in particular [11,20,57,59]. We also evaluate the performance overhead introduced by DIVILAR.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…In this section, we first analyze DIVILAR's robustness against existing static and dynamic analysis, and countermeasures specific to VM-based protection in particular [11,20,57,59]. We also evaluate the performance overhead introduced by DIVILAR.…”
Section: Discussionmentioning
confidence: 99%
“…Ghosh et al propose to replace the protecting VM with an attacking VM in order to render the application amicable to analysis and modification [20]. Frequency analysis [68] is often used to break classical ciphers by studying the frequency of letters or groups of letters to disclose the mapping between plaintext and ciphertext.…”
Section: Virtualization Specific Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…An adversary can attempt to alter key functionalities of the PVM itself, thereby invalidating protection features such as knots. Ghosh et al proposed a replacement attack on PVMs, which involves replacing a PVM applying protections with a benign VM [16]. Knots do not protect the PVM from such attacks.…”
Section: Effectiveness Against Pvm Attacksmentioning
confidence: 99%