Abstract
The paper presents method of securing executable software code based on executing computations in an environment of virtual machines with pseudo-random architecture, the interpreter of which is protected by obfuscation transformations using Petri nets with initial states defined based on solutions of Diophantus equations.
Similar content being viewed by others
References
Boiko, V., Method of the virtual processor in software protection, Trudy Instituta Sistemnogo programmirovaniya RAN (Proceedings of the Institute for System Programming of the Russian Academy of Sciences), 2005.
Aranov, V.Yu., Protection of the executable machine code from reverse engineering by means of multi-level virtualization, IBRR-2013, Materialy konferentsii (Proc. Conf. IBRR-2013), 2013, pp. 76–77.
Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O., and Konoplev, A.S., Security modeling of grid systems using Petri nets, Lect. Notes Comput. Sci., 2012, vol. 7531, pp. 299–308.
Peterson, J.L., Petri Net Theory and the Modeling of Systems, Upper Saddle River, NJ: Prentice Hall PTR, 1984.
Avdoshin, S.M. and Savel’eva, A.A., of linear equations in ring residues, Inf. Tekhnol., 2006, no. 2, pp. 50–54.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © V.Yu. Aranov, V.S. Zaborovsky, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Aranov, V.Y., Zaborovsky, V.S. Method of security against computer attacks based on an analysis of executable machine code. Aut. Control Comp. Sci. 49, 705–708 (2015). https://doi.org/10.3103/S0146411615080039
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080039