Volume 18, no. 3Pages 61 - 72 Active Data Technology in Virtual Machines with Dynamic Command System
S.V. Kuleshov, A.A. Zaytseva, A.Y. AksenovIn some application tasks it may be necessary to protect executable code from reverse engineering by copying a memory area containing a fragment of executable code. This type of reverse engineering can be realized by physical interception of one of the nodes of a distributed system. The paper discusses a defense approach against this type of attack based on the use of active data in conjunction with virtual machines using a dynamic instruction system.
Full text- Keywords
- virtual machine; dynamic command system; active data.
- References
- 1. Kuleshov S., Tsvetkov O. Active Data in Digital Software Defined Systems. Information-Measuring and Control Systems, 2014, no. 6, pp. 12-19.
2. Alexandrov V.V., Kuleshov S.V., Zaytseva A.A. Active Data in Digital Software Defined Systems Based on SEMS Structures. Studies in Systems, Decision and Control, 2015, vol. 49, pp. 61-69. DOI: 10.1007/978-3-319-27547-5_6
3. Samodelov A. Creating Secure User Applications Based on Microsemi's SmartFusion2 SnC. Part 7. Trusted Chip Programming in an Untrusted Environment. General Provisions. Komponenty i Tekhnologii [Components and Technologies], 2018, vol. 199, no. 2, pp. 56-65. (in Russian)
4. Gladkiy P.V. Protecting the Project Code for Ultrasonic Medical Devices Built on FPGA Using Psp Generator. Vestnik of Astrakhan State Technical University. Series: Management, Computer Science and Informatics, 2009, no. 2, pp. 166-171.
5. Niranjana R. FPGA Security: Challenges and Best Practices. Available at: https://fpgainsights.com/fpga/fpga-security-challenges-and-best-practices/ (accessed on 17.10.2024)
6. Kokovin V.A., Krivtsov P.N., Sytin A.N., Uvaysov S.U. Hardware Methods of Cybersecurity in the Interaction of Distributed Devices of an Automated System. Innovative, Information and Communication Technologies: Proceedings of the XX International Scientific and Practical Conference, Makhachkala, 2023, pp. 226-231.
7. Baetoniu C. FPGA IFF Copy Protection Using Dallas Semiconductor/Maxim DS2432 Secure EEPROMs. Available at: https://docs.amd.com/v/u/en-US/xapp780 (accessed on 17.10.2024)
8. Paul S., Garcia A., Capellaro M. PGA Configuration Protection and Control Using Hardware Watchdog Timer. Patent U.S. no. 7971051B2, 28.06.2011.
9. Komolov D., Zolotukhov R. Using Special Memory Chips to Provide Copy Protection for FPGAs. Komponenty i Tekhnologii [Components and Technologies], 2008, vol. 89, no. 12, pp. 24-26. (in Russian)
10. Aleksandrov V.V., Kuleshov S.V. Etherification and Terminal Programs. Information-Measuring and Control Systems, 2008, vol. 6, no. 10, pp. 50-53. (in Russian)
11. Koppe P., Kollenda B, Fyrbiak M, et al. Reverse Engineering x86 Processor Microcode. Proceedings of the 26th USENIX Security Symposium, Vancouver, 2017, 19 p.
12. Kuleshov S., Zaytseva A., Shalnev I. Distributed System of Virtual Machines for Self-Organized Networks. Information and Control Systems, 2019, no. 5, pp. 30-37. DOI: 10.31799/1684-8853-2019-5-30-37.
13. Arkhipov P.A., Galkin A.S., Markin D.O. Distributed Web Application Testing Algorithm Based on Web Proxy and Active Data Technologies. Information Systems and Technologies, 2018, vol. 105, no. 1, pp. 93-101.
14. Shal'nev I.O. Building Distributed Systems Based on Balancing the Amount of Executable Code Between the Nodes. The 4th International Scientific and Practical Conference ``Technological Perspective: New Markets and Points of Economic Growth'', Saint-Petersburg, 2018, pp. 165-172.
15. Craig I.D. Virtual Machines. London, Springer, 2006. DOI: 10.1007/978-1-84628-246-1
16. Shi Yunhe, Gregg D., Beatty A., Ertl M. Virtual Machine Showdown. ACM Transactions on Architecture and Code Optimization, 2008, vol. 4, no. 4, pp. 1-36. DOI: 10.1145/1064979.1065001
17. Sinnathamby M. Stack Based vs Register Based Virtual Machine Architecture, and the Dalvik VM. Engineering The Code. Available at: https://markfaction.wordpress.com/2012/07/15/stack-based-vs-register-based-virtual-machine-architecture-and-the-dalvik-vm/ (accessed on 18.10.2024)
18. Kuleshov S.V., Aksenov A.Y., Viksnin I.I., Laskus E.O., Belyaev V.V. The Analysis of Cybersecurity Problems in Distributed Infocommunication Networks Based on the Active Data Conception. Lecture Notes in Networks and Systems, 2019, vol. 95, pp. 491-499. DOI: 10.1007/978-3-030-34983-7_48
19. Xiaojing Zhu, Mingyu Chen, Yangyang Zhao, Zonghui Hong, Yunge Guo. PULP: Inner-Process Isolation Based on the Program Counter and Data Memory Address. Arxiv: Cryptography and Security, 2018. Avialable at: https://doi.org/10.48550/arXiv.1804.03379. DOI: 10.48550/arXiv.1804.03379
20. Turing A.M. On Computable Numbers, with an Application to the Entscheidungsproblem. Proceedings of the London Mathematical Society, 1937, no. 1, pp. 230-265. DOI: 10.1112/plms/s2-42.1.230
21. Turing A.M. The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life Plus the Secrets of Enigma. Oxford, Oxford University Press, 2004.