Sciweavers

Share
MATA
2004
Springer

Detecting and Proving Manipulation Attacks in Mobile Agent Systems

10 years 5 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict the use of mobile agents despite its benefits. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In a previous work, the Mobile Agent Watermarking approach (MAW) was presented as a new attack detection technique based on embedding a fixed watermark into the agent’s code. In this paper, some improvements are introduced in MAW. Instead of a fixed watermark, the origin host embeds a watermark that can change dynamically during execution. In each host, the marked code creates a data container where the watermark will be transferred and the results will be hidden. When the agent returns home, the origin host applies a set of integrity rules that the containers must fulfill. These rules can be inferred fr...
Oscar Esparza, Miguel Soriano, Jose L. Muño
Added 02 Jul 2010
Updated 02 Jul 2010
Type Conference
Year 2004
Where MATA
Authors Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
Comments (0)
books