Abstract:
In some application tasks it may be necessary to protect executable code from reverse engineering by copying a memory area containing a fragment of executable code. This type of reverse engineering can be realized by physical interception of one of the nodes of a distributed system. The paper discusses a defense approach against this type of attack based on the use of active data in conjunction with virtual machines using a dynamic instruction system.
Keywords:virtual machine, dynamic command system, active data.