Secure execution of computations in untrusted hosts

  • Authors:
  • S. H. K. Narayanan;M. T. Kandemir;R. R. Brooks;I. Kolcu

  • Affiliations:
  • Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA;Department of Electrical and Computer Engineering, Clemson University, Clemson, SC;Computation Department, UMIST, Manchester, UK

  • Venue:
  • Ada-Europe'06 Proceedings of the 11th Ada-Europe international conference on Reliable Software Technologies
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Proliferation of distributed computing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remote hosts. This paper proposes and evaluates a solution to the latter problem for applications based on linear computations that involve scalar as well as array arithmetic. We demonstrate that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.