Self - Protecting Mobile Agents Obfuscation Report

نویسندگان

  • Larry D'Anna
  • Brian Matt
  • Andrew Reisse
  • Tom Van Vleck
  • Steve Schwab
  • Patrick LeBlanc
چکیده

This document describes our investigation into software obfuscation for building SelfProtecting Mobile Agents (SPMA). The original goal of the SPMA project was to develop automated tools to protect mobile agents from attacks by malicious hosts. In development of those tools, we realized obfuscation could not be relied upon to give a reasonable amount of security. Because of this, we redirected the SPMA project to studying obfuscation. Our conclusions include theoretical results about obfuscation and evidence that supports those results. Our most important conclusion is that there is no general obfuscation problem (i.e. a definition and theory of obfuscation that will always apply). We believe that all automated obfuscation is merely emulation; this will certainly be an area of future research. We conclude that if software obfuscation is to be useful, it must be employed for a specific purpose (not “obfuscate any program protecting all information”), and use fundamentally new ideas. Future theoretical work on obfuscation will have to define it clearly, and use a restricted set of programs, so that the result of Barak et al. [BGI+01] does not apply. In the course of developing obfuscation tools, we evaluated the properties of programming languages under several obfuscating transforms, concluding that strict typesafe programming languages were the best for obfuscation. In addition, programs specifically designed to be obfuscated will give better results, as the programmers will avoid implementing unobfuscatable constructs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-Protecting Mobile Agents Obfuscation Techniques Evaluation Report

This document presents an analysis of various program obfuscation techniques performed as part of the Self-Protecting Mobile Agents (SPMA) project. We have developed the Java Binary Enhancement Tool (JBET) to explore the real-world tradeoffs in translating and obfuscating Java bytecodes. We consider methods for obfuscating long-term data values, temporary data values, control flow, memory manag...

متن کامل

Turing Functional Ciphertext

Current research literature for protecting mobile agents from malicious execution environments, such as homomorphic encryption schemes, Boolean circuits, obfuscation and computing with encrypted functions, provide building blocks for the possibility of secure remote encrypted computations. However, existing solutions are only partial and additional research is needed to reach the ideal conditio...

متن کامل

Securing Mobile Code

If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be “mobile.” There are two general areas of security problems associated with mobile code. The “secure host” problem involves protecting the host from malicious mobile code. The “secure mobile code” problem, on the other hand, involve...

متن کامل

Computing Science INTELLECTUAL PROPERTY PROTECTION USING OBFUSCATION

In this technical report, we discuss the use of code obfuscation as means of protecting the intellectual property of software. An obfuscation is a behaviour preserving program transformation which aims to make a program harder to understand (which can mean it becomes unintelligible to automated program comprehension tools or that the result of program analyses become less useful to a human adve...

متن کامل

Constructing Secure Mobile-Agent-Based Consumer Electronic Applications

This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003