TrulyProtect—Virtualization-Based Protection Against Reverse Engineering

Nezer Zaidenberg, Michael Kiperberg, Amit Resh

Research output: Contribution to journalArticlepeer-review

Abstract

This paper summarizes the ten-year development of virtualization-based copy protection by the TrulyProtect team. We survey the approaches used, the special problems in various operating systems and software types, and some research directions that have not been covered.

Original languageEnglish
Pages (from-to)353-366
Number of pages14
JournalComputational Methods in Applied Sciences
Volume56
DOIs
StatePublished - 2022
Externally publishedYes

Keywords

  • Reverse engineering
  • Virtualization

Fingerprint

Dive into the research topics of 'TrulyProtect—Virtualization-Based Protection Against Reverse Engineering'. Together they form a unique fingerprint.

Cite this