Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Method of security against computer attacks based on an analysis of executable machine code

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The paper presents method of securing executable software code based on executing computations in an environment of virtual machines with pseudo-random architecture, the interpreter of which is protected by obfuscation transformations using Petri nets with initial states defined based on solutions of Diophantus equations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Boiko, V., Method of the virtual processor in software protection, Trudy Instituta Sistemnogo programmirovaniya RAN (Proceedings of the Institute for System Programming of the Russian Academy of Sciences), 2005.

    Google Scholar 

  2. Aranov, V.Yu., Protection of the executable machine code from reverse engineering by means of multi-level virtualization, IBRR-2013, Materialy konferentsii (Proc. Conf. IBRR-2013), 2013, pp. 76–77.

    Google Scholar 

  3. Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O., and Konoplev, A.S., Security modeling of grid systems using Petri nets, Lect. Notes Comput. Sci., 2012, vol. 7531, pp. 299–308.

    Article  Google Scholar 

  4. Peterson, J.L., Petri Net Theory and the Modeling of Systems, Upper Saddle River, NJ: Prentice Hall PTR, 1984.

    Google Scholar 

  5. Avdoshin, S.M. and Savel’eva, A.A., of linear equations in ring residues, Inf. Tekhnol., 2006, no. 2, pp. 50–54.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Yu. Aranov.

Additional information

Original Russian Text © V.Yu. Aranov, V.S. Zaborovsky, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aranov, V.Y., Zaborovsky, V.S. Method of security against computer attacks based on an analysis of executable machine code. Aut. Control Comp. Sci. 49, 705–708 (2015). https://doi.org/10.3103/S0146411615080039

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080039

Keywords