TY - JOUR
T1 - Truly-protect
T2 - An efficient VM-based software protection
AU - Averbuch, Amir
AU - Kiperberg, Michael
AU - Zaidenberg, Nezer Jacob
PY - 2013
Y1 - 2013
N2 - We present Truly-Protect that is a software protection method. Previously published protection methods relied solely on obscurity. Rolles proposed a general approach for breaking systems that are based on obscurity. We show that, under certain assumptions, Truly-Protect is resistant not only to Rolles' attack but also to any other attacks that do not violate the assumptions. Truly-Protect is based on a virtual machine that enables us to execute encrypted programs. Truly-Protect can serve as a platform for preventing software piracy of obtaining unlicensed copies. Truly-Protect by itself is not a digital rights management system but can form a basis for such a system. We discuss several scenarios and implementations and validate the performance penalty of our protection. A preliminary version of this paper appeared in the 5th International Conference on Network and System Security (NSS2011). It was extended by expanding the system's description, adding more efficient parallel implementation, just-in-time decryption, and a comprehensive performance analysis. It also contains all the necessary proofs.
AB - We present Truly-Protect that is a software protection method. Previously published protection methods relied solely on obscurity. Rolles proposed a general approach for breaking systems that are based on obscurity. We show that, under certain assumptions, Truly-Protect is resistant not only to Rolles' attack but also to any other attacks that do not violate the assumptions. Truly-Protect is based on a virtual machine that enables us to execute encrypted programs. Truly-Protect can serve as a platform for preventing software piracy of obtaining unlicensed copies. Truly-Protect by itself is not a digital rights management system but can form a basis for such a system. We discuss several scenarios and implementations and validate the performance penalty of our protection. A preliminary version of this paper appeared in the 5th International Conference on Network and System Security (NSS2011). It was extended by expanding the system's description, adding more efficient parallel implementation, just-in-time decryption, and a comprehensive performance analysis. It also contains all the necessary proofs.
KW - Copy-protection
KW - DRM
KW - process virtual machine
UR - http://www.scopus.com/inward/record.url?scp=84880542579&partnerID=8YFLogxK
U2 - 10.1109/JSYST.2013.2260617
DO - 10.1109/JSYST.2013.2260617
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:84880542579
SN - 1932-8184
VL - 7
SP - 455
EP - 466
JO - IEEE Systems Journal
JF - IEEE Systems Journal
IS - 3
M1 - 6553406
ER -