Search results for "virtual machine monitors"
showing 3 items of 3 documents
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…
SAGECELL: Software-Defined Space-Air-Ground Integrated Moving Cells
2018
Ultra-dense networks (UDNs) provide an effective solution to accommodate the explosively growing data traffic of multimedia services and real-time applications. However, the densification of large numbers of static small cells faces many fundamental challenges, including deployment cost, energy consumption and control, and so on. This motivates us to develop software-defined space-air-ground integrated moving cells (SAGECELL), a programmable, scalable, and flexible framework to integrate space, air, and ground resources for matching dynamic traffic demands with network capacity supplies. First, we provide a comprehensive review of state-of-the-art literature. Then the conceptual architectur…
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed