IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Designing programs that check their work
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
Obfuscated C and other mysteries
Obfuscated C and other mysteries
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Algorithm-Based Fault Tolerance for Matrix Operations
IEEE Transactions on Computers
The N-Version Approach to Fault-Tolerant Software
IEEE Transactions on Software Engineering
Hi-index | 0.00 |
In this paper, we are concerned with the detection software faults and tampering of the mobile application as well as the mobile device theft. We want to disable mobile device cryptographically once either of these problems are detected. Basically the device needs to receive a new cryptographic key after each pre-set period of time in order to continue function. The mobile application execution integrity is checked by the authority when deciding whether or not to give out a new key. The detection can be done via a run-time result checking when the device connects to the authority. The authority can also proactively examine whether or not software tampering is happening. This paper will show approaches that each standalone can improve the dependability and security of a mobile application. We will show how these approaches can work together seamlessly to form a stronger scheme.