Avoid Powerful Tampering by Malicious Host

نویسندگان

  • Fangyong Hou
  • Zhiying Wang
  • Zhen Liu
  • Yun Liu
چکیده

This paper indicates a potential security threat which may do harm to distributed computing security. As the program is distributed to run in the remote nodes, adversary may use simulator to produce false results to do tampering. Some sophisticated simulator can give powerful tampering ability to adversary, with the reason explained in this paper. In order to solve this security problem, Real Processor Proving algorithm is applied. This algorithm use some special behavior characteristics of real processor to determine whether the program is running on a real processor in the remote node or just running on a simulator, so that it can detect the using of simulator to avoid this kind of powerful tampering.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Code Obfuscation Techniques for Software Protection

An important security problem is to protect software against malicious host attacks. Since the malicious hosts are responsible for the program’s execution, there seems little the program can do to protect itself from disclosure, tampering and incorrect execution [7]. This paper will review some existing code obfuscation techniques for protecting software against those attacks. We will focus our...

متن کامل

Path-Based Security for Mobile Agents

As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...

متن کامل

Defend mobile agent against malicious hosts in migration itineraries

Agent integrity verification and fault-tolerance are the two prevalent methods among the solutions to the Problem of Malicious Hosts in Mobile agent system. Agent integrity verification enables the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent based on agent integrity verification [6]. A known drawback of such method is that i...

متن کامل

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts

Mobile agents have been considered a promising technology to develop e-commerce applications, however the security concerns about the technology have stopped its widespread use. The identified security areas comprise protecting hosts against malicious agents, protecting the agent’s transmission and protecting agents against malicious hosts. The first two security issues and the protection of th...

متن کامل

Secure Distributed Data Aggregation

We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithmic features of each approach, and provide an overview of a family of secure aggregation protocols which use resilient distributed estimation to retrieve an approximate query result that is guaranteed to be resistant ag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003