One-time machine binding. The driver generates an asymmetric keypair derived from
hardware identifiers. The public key becomes the machine identity; the private key
never leaves kernel memory.
The developer provides the machine's public key to the compiler.
For each protected function, the compiler:
1. Generates a random key share and XORs it into the function's root encryption key.
Without this share, the VM produces garbage output.
2. Encrypts the share to the machine's public key using ephemeral authenticated key exchange.
Only the matching private key can recover it.
3. Embeds the encrypted share and ephemeral public key into the binary as per-function data.
4. Generates a unique build identity and binary integrity hash, embedded as a marker
the driver uses to identify and verify the binary at launch.
The resulting binary is permanently bound to the target machine.
It contains everything needed to request its shares at runtime, but nothing
that allows recovering them without the driver's private key.
Initiate Connection
Generate fresh nonce, present build identity embedded at compile time
Validate Binary
Verify build identity, check binary integrity, confirm system security posture
Verify Driver
Authenticate the driver's challenge using the derived handshake key
Issue Challenge
Generate server nonce, derive handshake key, produce authenticated challenge
Complete Handshake
Derive session key, wipe ephemeral material
Activate Session
Derive matching session key, activate all kernel-side defense mechanisms
each protected function
Request Key Share
Present compile-time encrypted share material with authenticated request
Decrypt Share
Use private key to recover per-function share, re-encrypt for transit
Apply Share
Decrypt transit layer, XOR share into VM key derivation – function becomes executable
Transit Encrypt
Apply authenticated session-bound encryption before returning share
periodic
Heartbeat
Transmit runtime integrity signals and execution proofs as authenticated message
Validate & Monitor
Verify proof, run detection checks, reset watchdog timer, periodically re-verify binary
Any trust violation – binary tampering, debugger attachment, instrumentation injection,
expired watchdog, or failed authentication – results in immediate process termination
from kernel privilege. No user-mode bypass is possible.