Matryoshka: strengthening software protection via nested virtual machines
Abstract
References
Index Terms
- Matryoshka: strengthening software protection via nested virtual machines
Recommendations
Matryoshka: Strengthening Software Protection via Nested Virtual Machines
SPRO '15: Proceedings of the 2015 IEEE/ACM 1st International Workshop on Software ProtectionThe use of virtual machine technology has become a popular approach for defending software applications from attacks by adversaries that wish to compromise the integrity and confidentiality of an application. In addition to providing some inherent ...
Generalized Matryoshka: Computational Design of Nesting Objects
This paper generalizes the self-similar nesting of Matryoshka dolls "Russian nesting dolls" to arbitrary solid objects. We introduce the problem of finding the largest scale replica of an object that nests inside itself. Not only should the nesting ...
Matryoshka: Fuzzing Deeply Nested Branches
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityGreybox fuzzing has made impressive progress in recent years, evolving from heuristics-based random mutation to approaches for solving individual branch constraints. However, they have difficulty solving path constraints that involve deeply nested ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- ACM: Association for Computing Machinery
- SIGSOFT: ACM Special Interest Group on Software Engineering
- IEEE-CS\DATC: IEEE Computer Society
- TCSE: IEEE Computer Society's Tech. Council on Software Engin.
Publisher
IEEE Press
Publication History
Check for updates
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 77Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in