details left ambiguous to prevent pre-analysis
Architecture · Mode 3 of 3

Ring-0 Enforced
Binary Protection

A signed kernel driver binds protected binaries to a specific machine at the hardware level. The binary cannot execute on any other machine, even if both the binary and the driver itself are exfiltrated. All Mode 1 protections are included by default. Ring-0 and DRM are mutually exclusive – choose one or the other on top of the standalone foundation.

01

Why Ring-0?

Ring-0 enforcement is supplemental. All standalone Witness protections (virtualization, encrypted bytecode, anti-tamper, integrity chaining) are included by default. The kernel driver adds a hardware-bound layer on top that prevents exfiltration even by sophisticated attackers with full access to the binary.

The Binary (Ring 3)
  • Contains encrypted bytecode and the VM interpreter
  • Holds per-function encrypted key shares embedded at compile time
  • Cannot derive decryption keys without the driver's private key
  • Reports integrity proofs to the driver during execution
The Driver (Ring 0)
  • Holds an asymmetric private key derived from hardware fingerprints
  • Decrypts per-function shares that unlock VM execution
  • Private key is non-exportable and bound to physical hardware
  • Verifies binary integrity and system security posture continuously
The binary and driver communicate through a covert channel with no user-visible endpoints.
02

Attack Surface

What happens when an attacker exfiltrates parts of the system? Every scenario results in a non-functional binary.

Binary Only
Attacker copies the protected executable to another machine.
Cannot execute
Each protected function requires a cryptographic share that only the original machine's driver can provide. Without the share, the VM's key derivation produces garbage. Every function call returns wrong results or crashes.
Binary + Driver
Attacker copies both the executable and the kernel driver to another machine.
Cannot execute
The driver's private key is derived from hardware fingerprints unique to the original machine. On different hardware, the driver generates a different keypair. The encrypted shares in the binary were sealed to the original public key and cannot be decrypted by a different private key.
Binary + Driver + Disk Clone
Attacker clones the entire disk (OS, registry, driver state) to new hardware.
Cannot execute
The private key is never persisted to disk. It is derived at driver load time from CPU, motherboard, and storage identifiers that cannot be cloned. New hardware produces a new identity. The embedded shares remain undecryptable.
Binary + Patched Driver
Attacker modifies the driver to return fake shares.
Cannot execute
Shares are encrypted with authenticated key exchange at compile time. The driver must possess the correct private key to decrypt them. A fake share produces the wrong VM decryption keys. Additionally, modified drivers fail code signing enforcement and will not load on systems with Secure Boot enabled.
Memory Dump
Attacker dumps process memory to extract decrypted bytecode or keys.
Detected and prevented
The driver strips memory read/write access from external processes at the kernel level. Bytecode is re-encrypted between invocations. Anti-dump tripwires detect memory scanning. Attaching a debugger triggers immediate termination from Ring 0.
Kernel Debugger
Attacker boots with a kernel debugger to intercept driver operations.
Refused at load
The driver detects kernel debugging and degraded code integrity at boot time. Sessions are refused before any key material is exchanged. Disabling system security policies is also detected and blocks execution.
03

Protocol Lifecycle

A multi-phase protocol establishes and maintains the trust relationship between the protected binary and the kernel driver.

Protected Binary
covert channel
Kernel Driver
Enrollment
One-time machine binding. The driver generates an asymmetric keypair derived from hardware identifiers. The public key becomes the machine identity; the private key never leaves kernel memory.
Build Pipeline
The developer provides the machine's public key to the compiler. For each protected function, the compiler:

1. Generates a random key share and XORs it into the function's root encryption key. Without this share, the VM produces garbage output.
2. Encrypts the share to the machine's public key using ephemeral authenticated key exchange. Only the matching private key can recover it.
3. Embeds the encrypted share and ephemeral public key into the binary as per-function data.
4. Generates a unique build identity and binary integrity hash, embedded as a marker the driver uses to identify and verify the binary at launch.

The resulting binary is permanently bound to the target machine. It contains everything needed to request its shares at runtime, but nothing that allows recovering them without the driver's private key.
Mutual Authentication
Initiate Connection
Generate fresh nonce, present build identity embedded at compile time
identity proof
Validate Binary
Verify build identity, check binary integrity, confirm system security posture
Verify Driver
Authenticate the driver's challenge using the derived handshake key
challenge
Issue Challenge
Generate server nonce, derive handshake key, produce authenticated challenge
Complete Handshake
Derive session key, wipe ephemeral material
response
Activate Session
Derive matching session key, activate all kernel-side defense mechanisms
Per-Function Key Exchange
each protected function
Request Key Share
Present compile-time encrypted share material with authenticated request
share request
Decrypt Share
Use private key to recover per-function share, re-encrypt for transit
Apply Share
Decrypt transit layer, XOR share into VM key derivation – function becomes executable
share response
Transit Encrypt
Apply authenticated session-bound encryption before returning share
Continuous Monitoring
periodic
Heartbeat
Transmit runtime integrity signals and execution proofs as authenticated message
integrity proof
Validate & Monitor
Verify proof, run detection checks, reset watchdog timer, periodically re-verify binary
Enforcement
Any trust violation – binary tampering, debugger attachment, instrumentation injection, expired watchdog, or failed authentication – results in immediate process termination from kernel privilege. No user-mode bypass is possible.
04

Defense Layers

Six independent protection layers operate concurrently across both privilege rings. Defeating one layer does not weaken the others.

Binary Integrity
The kernel continuously verifies the code section of the protected binary. Any modification – patches, hooks, or injected code – is detected and results in immediate termination.
Ring 0 Continuous
Anti-Debug
Multiple kernel-level checks detect attached debuggers, kernel debuggers, hardware breakpoints, and weakened system security policies. Checks run at intervals invisible to user-mode.
Ring 0 Periodic
Anti-Instrumentation
Detects and defeats dynamic binary instrumentation frameworks, hardware trace facilities, taint analysis, and memory access profiling. Operates through both kernel detection and user-mode countermeasures.
Ring 0 + Ring 3 Per-dispatch
Anti-Tamper
Integrity is woven into every operation. Execution path, control flow history, and bytecode state are continuously hashed into load-bearing cryptographic values. Tampering silently corrupts all future computation.
Ring 3 Every operation
Anti-Injection
The kernel strips dangerous access rights from any external process attempting to open handles to the protected process or its threads. Return addresses are cryptographically verified to guard against control flow hijacking.
Ring 0 On handle open
Anti-Dump
Memory scanning and process dumping are detected through integrity-verified memory regions. Environment fingerprinting detects VM and sandbox execution. Private keys are scrubbed from kernel memory on system failure before crash dumps are written.
Ring 0 + Ring 3 Passive
05

Security Properties

The combination of kernel-resident private key, per-function isolation, and continuous verification produces the following guarantees.

Per-Machine Binding
Each machine generates a unique asymmetric keypair from hardware identifiers. Binaries compiled for one machine cannot execute on another.
Per-Function Isolation
Every protected function receives an independent cryptographic share. Recovering one function's key material does not compromise any other function.
Forward Secrecy
Ephemeral key material is generated per function at compile time and wiped after use. Past sessions cannot be decrypted if the long-term key is compromised.
Continuous Verification
The driver periodically re-verifies binary integrity and system security posture. Protection is not a one-time check – it is maintained throughout execution.
Covert Communication
The user-kernel channel uses no named pipes, IOCTLs, or device objects. Standard monitoring tools cannot observe or intercept the protocol.
Kernel-Level Enforcement
All termination decisions execute at Ring 0 privilege. User-mode code cannot intercept, delay, or prevent enforcement actions.
Split-Secret Architecture
The VM's root key is split between the binary and the driver. Neither side holds enough material to derive decryption keys independently. Both must cooperate.
Mutual Authentication
Both the binary and driver prove their identity before any key material is exchanged. Neither a rogue binary nor a rogue driver can extract shares.
Dual Enforcement
User-mode anti-tamper silently corrupts computation, making the point of detection ambiguous. Kernel-level violations trigger immediate termination from Ring 0. Attackers face both strategies simultaneously.
Cross-Function Entanglement
Protected functions share persistent cryptographic state. Each function's execution feeds entropy into a shared accumulator. Breaking one function's protection corrupts the others.
Thread Safety
All VM state is thread-local. Protected functions are fully reentrant and can execute concurrently across any number of threads without synchronization.
Binary Impersonation
The binary's PE structure can be reshaped to match the forensic signatures of other commercial protectors, misdirecting automated classification tools.