Protecting mobile agents by using traceability techniques

被引:1
作者
Esparza, O [1 ]
Fernandez, M [1 ]
Soriano, M [1 ]
机构
[1] Tech Univ Catalonia, Barcelona 08034, Spain
来源
ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION | 2003年
关键词
mobile agent; malicious host; watermarking; fingerprinting;
D O I
10.1109/ITRE.2003.1270618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. The approach that is presented here detects manipulation attacks performed during the agent's execution. This approach also traces the malicious hosts responsible for the manipulation attacks. Software watermarking techniques are used in order to embed a mark into the agent. The agent's execution creates marked results. When the agent returns to the origin host, these results are examined in order to find the embedded mark. If the mark has changed, this means that the executing host has modified the agent.
引用
收藏
页码:264 / 268
页数:5
相关论文
共 14 条
[1]  
ALGESHEIMER J, 2001, IEEE S SEC PRIV
[2]  
CACHIN C, 2000, LNCS, V1853
[3]  
COLLBERG C, 1999, PRINC PROGR LANG 199
[4]  
HACHEZ G, 2000, 3 INT WORKSH INF SEC
[5]  
HOHL F, 1998, LNCS, V1419
[6]  
MINSKY Y, 1996, 7 ACM SIGOPS EUR WOR
[7]  
ORDILLE J, 1996, AGENTS ROAM CAN YOU
[8]  
RIORDAN J, 1998, LNCS, V1419
[9]  
ROTH V, 1999, LNCS, V1906
[10]  
SANDER T, 1998, LNCS, V1419