2018
DOI: 10.3390/app8050771
|View full text |Cite
|
Sign up to set email alerts
|

VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern

Abstract: Process-level virtual machine (PVM) based code obfuscation is a viable means for protecting software against runtime code tampering and unauthorized code reverse engineering. PVM-based approaches rely on a VM to determine how instructions of the protected code region are scheduled and executed. Therefore, it is crucial to protect the VM against runtime code tampering that alters the instructions and behavior of the VM. This paper presents VMGuards, a novel PVM-based code protection system that puts the securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Furthermore, there is a virtualization technique introduced by [17][18] [19] where this technique secures the code by extracting the ARM instruction key and then mapping the instruction into virtual instructions which are then encoded into the SO file. [20] added mapped key protection to the virtualization process to make it difficult to restore so that the code is very difficult to crack. [2] implemented this virtualization method at the binary level making it more difficult to crack and extending the hacking time.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, there is a virtualization technique introduced by [17][18] [19] where this technique secures the code by extracting the ARM instruction key and then mapping the instruction into virtual instructions which are then encoded into the SO file. [20] added mapped key protection to the virtualization process to make it difficult to restore so that the code is very difficult to crack. [2] implemented this virtualization method at the binary level making it more difficult to crack and extending the hacking time.…”
Section: Related Workmentioning
confidence: 99%
“…Amongst these, the execution time of bcrypt increases by the most than original program. 7 For the key instructions in bcrypt is frequently executed than others (as shown in the bottom row of the table 6). In addition, execution time does not change much with the increase of partition number.…”
Section: Effectiveness Evaluationmentioning
confidence: 99%
“…This could bring up various attacks, taking out advertisements from the application, including removing copyright protection of software or injecting malicious code into the program. Code obfuscation could make it difficult to trace and analyze the program, protect the software from unauthorized code modification [1]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, community has considered using the idea of code virtualization to protect programs. VMGuards [40] is a process-level VM-based code protection system. It designs two new instruction sets to protect the critical code segments and the host runtime environment where the VM runs in.…”
Section: Related Workmentioning
confidence: 99%