Loading...
Please wait, while we are loading the content...
Similar Documents
Extending execution tracing for mobile code security
| Content Provider | Semantic Scholar |
|---|---|
| Author | Tan, Hock Kim Moreau, Luc |
| Copyright Year | 2002 |
| Abstract | The problem of protecting mobile code from both denial-of-service and state tampering attacks by malicious hosts are not well addressed in existing techniques for mobile code security. We propose a possible approach based on extending an existing mobile code security technique: cryptographic tracing. This is achieved through the introduction of a trusted third party, the verification server, which undertakes the verification of execution traces on behalf of the agent owner. The interaction between the verification servers and host platforms in the new protocol is outlined. Security properties of the protocol are verified by modelling the system in CSP and checking the resulting state transitions using the model checker FDR. Limitations of this approach to verification are then briefly discussed. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.dfki.de/~kuf/semas/semas-2002/WorkingNotes/HKTan.pdf |
| Alternate Webpage(s) | https://eprints.soton.ac.uk/257602/1/semas02.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |