DocumentCode
3378238
Title
Matryoshka: Strengthening Software Protection via Nested Virtual Machines
Author
Ghosh, Sudeep ; Hiser, Jason D. ; Davidson, Jack W.
Author_Institution
Microsoft Corp., Redmond, WA, USA
fYear
2015
fDate
19-19 May 2015
Firstpage
10
Lastpage
16
Abstract
The use of virtual machine technology has become a popular approach for defending software applications from attacks by adversaries that wish to compromise the integrity and confidentiality of an application. In addition to providing some inherent obfuscation of the execution of the software application, the use of virtual machine technology can make both static and dynamic analysis more difficult for the adversary. However, a major point of concern is the protection of the virtual machine itself. The major weakness is that the virtual machine presents a inviting target for the adversary. If an adversary can render the virtual machine ineffective, they can focus their energy and attention on the software application. One possible approach is to protect the virtual machine by composing or nesting virtualization layers to impart virtual machine protection techniques to the inner virtual machines "closest" to the software application. This paper explores the concept and feasibility of nested virtualization for software protection using a high-performance software dynamic translation system. Using two metrics for measuring the strength of protection, the preliminary results show that nesting virtual machines can strengthen protection of the software application. While the nesting of virtual machines does increase run-time overhead, initial results indicate that with careful application of the technique, run-time overhead could be reduced to reasonable levels.
Keywords
parallel processing; program diagnostics; security of data; virtual machines; virtualisation; Matryoshka; application confidentiality; application integrity; dynamic analysis; high-performance software dynamic translation system; nested virtual machines; nested virtualization; software protection; static analysis; virtual machine protection techniques; virtualization layers; Benchmark testing; Complexity theory; Hardware; Software; Software protection; Virtual machining; Virtualization; Obfuscation; Software Protection; Virtual Machines;
fLanguage
English
Publisher
ieee
Conference_Titel
Software Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on
Conference_Location
Florence
Type
conf
DOI
10.1109/SPRO.2015.11
Filename
7174805
Link To Document