An efficient VM-based software protection

This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system. We avoid relying on obscurity and rely only on assumptions about the system itse...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Averbuch, A., Kiperberg, M., Zaidenberg, N. J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 128
container_issue
container_start_page 121
container_title
container_volume
creator Averbuch, A.
Kiperberg, M.
Zaidenberg, N. J.
description This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system. We avoid relying on obscurity and rely only on assumptions about the system itself and on cryptographic measures to develop VM-based conditional access/trusted computing environment. Rolles in [18], proposes a general way of breaking systems of type described herein. We claim that Rolles' method fails to defeat our system.
doi_str_mv 10.1109/ICNSS.2011.6059968
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6059968</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6059968</ieee_id><sourcerecordid>6059968</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1348-70df9b6ed4a554655a403cac7344a70fa2a38501fa4dc8e3ab8fb41001b5e9053</originalsourceid><addsrcrecordid>eNotj81Kw1AQRq-IoLZ5Ad1k6yJxpnfu37IErYVqF1W3ZZLMhSualCQgvr2C-TaHsznwKXWDUCJCuN9WL4dDuQLE0oIJwfozdY1knAOyEM5VFpyf3Xi8VNk4fsDfrA0E4UrdrbtcYkxNkm7K35-Lmkdp87GP0zcPkp-GfpJmSn23VBeRP0fJZi7U2-PDa_VU7PabbbXeFQk1-cJBG0NtpSU2hqwxTKAbbpwmYgeRV6y9AYxMbeNFc-1jTQiAtZEARi_U7X83icjxNKQvHn6O8zv9C2G7Qdo</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An efficient VM-based software protection</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Averbuch, A. ; Kiperberg, M. ; Zaidenberg, N. J.</creator><creatorcontrib>Averbuch, A. ; Kiperberg, M. ; Zaidenberg, N. J.</creatorcontrib><description>This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system. We avoid relying on obscurity and rely only on assumptions about the system itself and on cryptographic measures to develop VM-based conditional access/trusted computing environment. Rolles in [18], proposes a general way of breaking systems of type described herein. We claim that Rolles' method fails to defeat our system.</description><identifier>ISBN: 9781457704581</identifier><identifier>ISBN: 1457704587</identifier><identifier>EISBN: 1457704609</identifier><identifier>EISBN: 9781457704604</identifier><identifier>EISBN: 1457704595</identifier><identifier>EISBN: 9781457704598</identifier><identifier>DOI: 10.1109/ICNSS.2011.6059968</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography ; Games ; Hardware ; Registers ; Software ; Switches ; Virtual machining</subject><ispartof>2011 5th International Conference on Network and System Security, 2011, p.121-128</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6059968$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6059968$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Averbuch, A.</creatorcontrib><creatorcontrib>Kiperberg, M.</creatorcontrib><creatorcontrib>Zaidenberg, N. J.</creatorcontrib><title>An efficient VM-based software protection</title><title>2011 5th International Conference on Network and System Security</title><addtitle>ICNSS</addtitle><description>This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system. We avoid relying on obscurity and rely only on assumptions about the system itself and on cryptographic measures to develop VM-based conditional access/trusted computing environment. Rolles in [18], proposes a general way of breaking systems of type described herein. We claim that Rolles' method fails to defeat our system.</description><subject>Cryptography</subject><subject>Games</subject><subject>Hardware</subject><subject>Registers</subject><subject>Software</subject><subject>Switches</subject><subject>Virtual machining</subject><isbn>9781457704581</isbn><isbn>1457704587</isbn><isbn>1457704609</isbn><isbn>9781457704604</isbn><isbn>1457704595</isbn><isbn>9781457704598</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81Kw1AQRq-IoLZ5Ad1k6yJxpnfu37IErYVqF1W3ZZLMhSualCQgvr2C-TaHsznwKXWDUCJCuN9WL4dDuQLE0oIJwfozdY1knAOyEM5VFpyf3Xi8VNk4fsDfrA0E4UrdrbtcYkxNkm7K35-Lmkdp87GP0zcPkp-GfpJmSn23VBeRP0fJZi7U2-PDa_VU7PabbbXeFQk1-cJBG0NtpSU2hqwxTKAbbpwmYgeRV6y9AYxMbeNFc-1jTQiAtZEARi_U7X83icjxNKQvHn6O8zv9C2G7Qdo</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Averbuch, A.</creator><creator>Kiperberg, M.</creator><creator>Zaidenberg, N. J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>An efficient VM-based software protection</title><author>Averbuch, A. ; Kiperberg, M. ; Zaidenberg, N. J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1348-70df9b6ed4a554655a403cac7344a70fa2a38501fa4dc8e3ab8fb41001b5e9053</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Cryptography</topic><topic>Games</topic><topic>Hardware</topic><topic>Registers</topic><topic>Software</topic><topic>Switches</topic><topic>Virtual machining</topic><toplevel>online_resources</toplevel><creatorcontrib>Averbuch, A.</creatorcontrib><creatorcontrib>Kiperberg, M.</creatorcontrib><creatorcontrib>Zaidenberg, N. J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Averbuch, A.</au><au>Kiperberg, M.</au><au>Zaidenberg, N. J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An efficient VM-based software protection</atitle><btitle>2011 5th International Conference on Network and System Security</btitle><stitle>ICNSS</stitle><date>2011-09</date><risdate>2011</risdate><spage>121</spage><epage>128</epage><pages>121-128</pages><isbn>9781457704581</isbn><isbn>1457704587</isbn><eisbn>1457704609</eisbn><eisbn>9781457704604</eisbn><eisbn>1457704595</eisbn><eisbn>9781457704598</eisbn><abstract>This paper presents Truly-protect, a system, incorporating a virtual machine, that enables execution of encrypted programs. Our intention is to form a framework for a conditional access/digital rights management system. We avoid relying on obscurity and rely only on assumptions about the system itself and on cryptographic measures to develop VM-based conditional access/trusted computing environment. Rolles in [18], proposes a general way of breaking systems of type described herein. We claim that Rolles' method fails to defeat our system.</abstract><pub>IEEE</pub><doi>10.1109/ICNSS.2011.6059968</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457704581
ispartof 2011 5th International Conference on Network and System Security, 2011, p.121-128
issn
language eng
recordid cdi_ieee_primary_6059968
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Cryptography
Games
Hardware
Registers
Software
Switches
Virtual machining
title An efficient VM-based software protection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T17%3A43%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20efficient%20VM-based%20software%20protection&rft.btitle=2011%205th%20International%20Conference%20on%20Network%20and%20System%20Security&rft.au=Averbuch,%20A.&rft.date=2011-09&rft.spage=121&rft.epage=128&rft.pages=121-128&rft.isbn=9781457704581&rft.isbn_list=1457704587&rft_id=info:doi/10.1109/ICNSS.2011.6059968&rft_dat=%3Cieee_6IE%3E6059968%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1457704609&rft.eisbn_list=9781457704604&rft.eisbn_list=1457704595&rft.eisbn_list=9781457704598&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6059968&rfr_iscdi=true