Reflection as a mechanism for software integrity verification
ACM Transactions on Information and System Security (TISSEC)
Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Hi-index | 0.00 |
Much of present day computer software is highly mobile, with a great amount of software being delivered to a client host via a network shortly before execution begins. The integrity of mobile code is one important aspect for the secure execution of the code on the client host. We describe a cryptographic-steganographic approach to embedding authentication data within executable object files. Our approach simplifies management of and requires no additional bandwidth to accommodate the authentication data. Initial experimental results show no runtime performance degradation for the execution of the protected program.