A3 Book section, Chapters in research books
TrulyProtect : Virtualization-Based Protection Against Reverse Engineering (2022)


Zaidenberg, N., Kiperberg, M., & Resh, A. (2022). TrulyProtect : Virtualization-Based Protection Against Reverse Engineering. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 353-366). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_15


JYU authors or editors


Publication details

All authors or editorsZaidenberg, Nezer; Kiperberg, Michael; Resh, Amit

Parent publicationCyber Security : Critical Infrastructure Protection

Parent publication editorsLehto, Martti; Neittaanmäki, Pekka

ISBN978-3-030-91292-5

eISBN978-3-030-91293-2

Journal or seriesComputational Methods in Applied Sciences

ISSN1871-3033

eISSN2543-0203

Publication year2022

Number in series56

Pages range353-366

Number of pages in the book484

PublisherSpringer

Place of PublicationCham

Publication countrySwitzerland

Publication languageEnglish

DOIhttps://doi.org/10.1007/978-3-030-91293-2_15

Publication open accessNot open

Publication channel open access


Abstract

This paper summarizes the ten-year development of virtualization-based copy protection by the TrulyProtect team. We survey the approaches used, the special problems in various operating systems and software types, and some research directions that have not been covered.


Keywordsdata securityreverse engineeringcopy protectionvirtualisation

Free keywordsvirtualization; reverse engineering


Contributing organizations


Ministry reportingYes

Reporting Year2022

JUFO rating1


Last updated on 2024-03-04 at 18:36