Software Tampering Detection using AOP and mobile code

نویسندگان

  • Paolo Falcarin
  • Mario Baldi
  • Daniele Mazzocchi
چکیده

Assuring that a given code is faithfully executed with defined parameters and constraints on an un-trusted host is an open problem, which is especially important in the context of computing over communications networks. This work evaluates applicability of Aspect-Oriented Programming (AOP) to the problem of remotely authenticating code during execution, which aims at assuring that the software is not maliciously tampered prior to and during execution. A flow of idiosyncratic signatures is continuously generated and associated to data transmitted by a function that is encapsulated in an aspect and whose execution is subordinated to the proper execution of the software being authenticated. The flow of signatures is validated by a remote component.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using AOP to Ease Evolution

This paper describes our experience in using Aspect Oriented Programming to greatly ease maintenance and evolution tasks in industrial software evolution. We have discovered that AOP can be effectively used to add unpluggable features to an existing code base. AOP has allowed us to place code related to certain features into separate modules, which eases evolution when requirements change. Furt...

متن کامل

Optimized Aspect Execution Mechanisms inside Virtual Machines for Embedded Systems

The rapidly growing mobile market has stimulated the demand for more and more complex custom applications for embedded mobile devices, for example, smart phones. To manage this complexity and, at the same time, to keep the time to market small, advanced software engineering methods have to be applied. Aspect-oriented programming (AOP) provides advanced modularization and abstraction mechanisms....

متن کامل

Automatic Speech Codec Identification with Applications to Tampering Detection of Speech Recordings

In this paper we explored many versions of CELP codecs and studied different codebooks they use to encode noisy part of residual. Taking advantage of noise patterns they generated, an algorithm was proposed to detect GSM-AMR,EFR,HR and SILK codecs. Then it’s extended to identify subframe offset to do tampering detection of cellphone speech recordings.

متن کامل

XP + AOP = Better Software?

Aspect Oriented Programming (AOP) [5] is a paradigm that enables clean modularization of crosscutting concerns. AOP facilitates extensible architectures without requiring major refactoring of code. This paper presents a theoretical study about the influence of AOP on eXtreme Programming (XP) [3]. The paper analyzes the effect of AOP on the XP programming principles, values, and practices, and w...

متن کامل

Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004