Mobile Code Protection with Smartcards Position Paper

نویسندگان

  • Sergio Loureiro
  • Refik Molva
چکیده

This paper addresses mobile code security with respect to potential integrity and privacy violations originating from the runtime environment. The suggested solution requires a trusted hardware with limited capacity like a smartcard and assures the security of a program executed on untrusted runtime environments by means of some interactions between the program and the trusted hardware. The security of this scheme is based on an extension of function hiding using error correcting codes. Unlike prior function hiding schemes, the proposed technique allows multi-step execution and the delivery of cleartext output at the remote site.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Code Protection with Smartcards

This paper addresses mobile code security with respect to potential integrity and privacy violations originating from the runtime environment. The suggested solution requires a trusted hardware with limited capacity like a smartcard and assures the security of a program executed on untrusted runtime environments by means of some interactions between the program and the trusted hardware. The sec...

متن کامل

Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware

Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety of tasks such as authentication, management of personal profiles, and other kinds of secure information processing. Integration of smartcards into networked environments though, has not been achieved yet in a transparen...

متن کامل

Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols

This paper deals with a description of wireless sensor networks at the beginning. Further follows the introduction to the agent platform suitable for wireless networks. Mobile code and sensor networks suffer from considerable security problems. Our proposal of countermeasure is based on combination of smartcards with sensor nodes. Smartcards as a tamper resistant devices offer solution for the ...

متن کامل

Malicious Code on Java Card Smartcards: Attacks and Countermeasures

When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens up the possibility of malicious, ill-typed code as an avenue of attack, though the Java Card platform offers some protection against this, notably by code signing. This paper gives an extensive overview of vulnerabilit...

متن کامل

Applications of smartcards for anonymous and verifiable databases

In this paper we describe a practical solution towards anonymous and verifiable databases based on the use of smartcards and the recent Improved Leighton-Micali protocol for the distribution of keys. The scheme is addressed particularly to public data held in separate government databases with the aim of preventing unauthorized government institutions from gathering and merging private data con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999