DocumentCode :
3378238
Title :
Matryoshka: Strengthening Software Protection via Nested Virtual Machines
Author :
Ghosh, Sudeep ; Hiser, Jason D. ; Davidson, Jack W.
Author_Institution :
Microsoft Corp., Redmond, WA, USA
fYear :
2015
fDate :
19-19 May 2015
Firstpage :
10
Lastpage :
16
Abstract :
The use of virtual machine technology has become a popular approach for defending software applications from attacks by adversaries that wish to compromise the integrity and confidentiality of an application. In addition to providing some inherent obfuscation of the execution of the software application, the use of virtual machine technology can make both static and dynamic analysis more difficult for the adversary. However, a major point of concern is the protection of the virtual machine itself. The major weakness is that the virtual machine presents a inviting target for the adversary. If an adversary can render the virtual machine ineffective, they can focus their energy and attention on the software application. One possible approach is to protect the virtual machine by composing or nesting virtualization layers to impart virtual machine protection techniques to the inner virtual machines "closest" to the software application. This paper explores the concept and feasibility of nested virtualization for software protection using a high-performance software dynamic translation system. Using two metrics for measuring the strength of protection, the preliminary results show that nesting virtual machines can strengthen protection of the software application. While the nesting of virtual machines does increase run-time overhead, initial results indicate that with careful application of the technique, run-time overhead could be reduced to reasonable levels.
Keywords :
parallel processing; program diagnostics; security of data; virtual machines; virtualisation; Matryoshka; application confidentiality; application integrity; dynamic analysis; high-performance software dynamic translation system; nested virtual machines; nested virtualization; software protection; static analysis; virtual machine protection techniques; virtualization layers; Benchmark testing; Complexity theory; Hardware; Software; Software protection; Virtual machining; Virtualization; Obfuscation; Software Protection; Virtual Machines;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on
Conference_Location :
Florence
Type :
conf
DOI :
10.1109/SPRO.2015.11
Filename :
7174805
Link To Document :
بازگشت