Implementing Remote Evaluation
IEEE Transactions on Software Engineering
Programming perl
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Designing distributed applications with mobile code paradigms
ICSE '97 Proceedings of the 19th international conference on Software engineering
IEEE Transactions on Software Engineering
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Aglets: Programming Mobile Agents in Java
WWCA '97 Proceedings of the International Conference on Worldwide Computing and Its Applications
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Analyzing Mobile Code Languages
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Mobile Agent Security and Telescript
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
The Safe-Tcl Security Model
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
First international workshop, AOSE 2000 on Agent-oriented software engineering
Secure Internet programming
Mutual protection of co-operating agents
Secure Internet programming
Secure Client Agent Environment (SCAE) for World Wide Web
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Secure Communication for Secure Agent-Based Electronic Commerce Applications
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
The Illegal Copy Protection Using Hidden Agent
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Mobile Agent Route Protection through Hash-Based Mechanisms
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study
MA '01 Proceedings of the 5th International Conference on Mobile Agents
An Intrusion Detection System for Aglets
MA '02 Proceedings of the 6th International Conference on Mobile Agents
A Method for Protecting Mobile Agents against Denial of Service Attacks
CIA '02 Proceedings of the 6th International Workshop on Cooperative Information Agents VI
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Hardening Functions for Large Scale Distributed Computations
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A Secure Mobile Agent System Model Based on Extended Elementary Object System
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
SMASH: Modular Security for Mobile Agents
Software Engineering for Multi-Agent Systems V
A Property-Dependent Agent Transfer Protocol
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Mobile agent watermarking (MAW): security properties and attacks revisited
Proceedings of the 7th International Conference on Frontiers of Information Technology
Live forensics framework for wireless sensor nodes using sandboxing
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
A design of the flexible mobile agents based on web
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
A secure protocol for mobile agents in hostile environment
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Higher dependability and security for mobile applications
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Hi-index | 0.00 |
Mobile code systems are technologies that allow applications to move their code, and possibly the corresponding state, among the nodes of a wide-area network. Code mobility is a flexible and powerful mechanism that can be exploited to build distributed applications in an Internet scale. At the same time, the ability to move code to and from remote hosts introduces serious security issues. These issues include authentication of the parties involved and protection of the hosts from malicious code. However, the most difficult task is to protect mobile code against attacks coming from hosts. This paper presents a mechanism based on execution tracing and cryptography that allows one to detect attacks against code, state, and execution flow of mobile software components.