메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 189-200

Software integrity protection using timed executable agents

Author keywords

Attestation; Data integrity; Intrusion detection; Mobile code and agent security; Program analysis; Software based

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER PROGRAMMING LANGUAGES; DIGITAL LIBRARIES; PROBLEM SOLVING; SECURITY OF DATA; VIRTUAL REALITY;

EID: 34047170729     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128847     Document Type: Conference Paper
Times cited : (28)

References (20)
  • 1
    • 33846012075 scopus 로고
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers:, Addison-Wesley
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986.
    • (1986) Principles, Techniques, and Tools
  • 2
    • 79251578513 scopus 로고    scopus 로고
    • On the (Im)possibility of Obfuscating Programs
    • Proc. CRYPTO '02, Springer-Vorlag, August
    • B. Barak, O. Goldreich, R. Iinpagliazzo, S. Rudich, A. Shai, S. Vadhan, and K. Yang. On the (Im)possibility of Obfuscating Programs. In Proc. CRYPTO '02, LNCS(2139), pp. 1-18, Springer-Vorlag, August 2001.
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Iinpagliazzo, R.3    Rudich, S.4    Shai, A.5    Vadhan, S.6    Yang, K.7
  • 3
    • 84974588386 scopus 로고
    • Timed commitments (extended abstract)
    • Proc. CRYPTO '00, Springer-Verlag, August
    • D. Boneh and M. Naor. Timed commitments (extended abstract). In Proc. CRYPTO '00, LNCS(1880), pp. 236-254., Springer-Verlag, August 2000.
    • (1880) LNCS , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 4
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Plenum Press, New York and London, August
    • D. Chaum. Blind signatures for untraceable payments. In Proc. CRYPTO '82, pp. 199-203. Plenum Press, New York and London, 1983, August 1982.
    • (1982) Proc. CRYPTO '82 , pp. 199-203
    • Chaum, D.1
  • 5
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection
    • Aug
    • C. Collberg and C. Thomborson. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. IEEE Trans. on Software Engineering, Vol. 28, No. 8, Aug. 2002.
    • (2002) IEEE Trans. on Software Engineering , vol.28 , Issue.8
    • Collberg, C.1    Thomborson, C.2
  • 6
    • 34247401111 scopus 로고    scopus 로고
    • C. Collberg, C. Thomborson and D. Low. A Taxonomy of Obfuscating Transformations. Technical Report #148, Dept. of Computer Science, University of Auckland, 1997.
    • C. Collberg, C. Thomborson and D. Low. A Taxonomy of Obfuscating Transformations. Technical Report #148, Dept. of Computer Science, University of Auckland, 1997.
  • 7
    • 34247391783 scopus 로고    scopus 로고
    • K. D. Cooper, T. J. Harvey and T. Waterman. Building a Control-Flow Graph from Scheduled. Assembly Code. Technical Report #TR02-399, Rice University, June 2002.
    • K. D. Cooper, T. J. Harvey and T. Waterman. Building a Control-Flow Graph from Scheduled. Assembly Code. Technical Report #TR02-399, Rice University, June 2002.
  • 8
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • Proc. CRYPTO '92, Springer-Verlag, August
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In Proc. CRYPTO '92, LNCS(740), pp. 139-147, Springer-Verlag, August 1992.
    • (1992) LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 11
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • R. Kennell and L. Jamieson. Establishing the genuinity of remote computer systems. In 12th USENIX Security Symposium, pp. 295-310, 2003.
    • (2003) 12th USENIX Security Symposium , pp. 295-310
    • Kennell, R.1    Jamieson, L.2
  • 14
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Mobile Agents and Security, Springer-Verlag
    • T. Sanders and C. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, LNCS(1419), Springer-Verlag, 1998.
    • (1998) LNCS , vol.1419
    • Sanders, T.1    Tschudin, C.2
  • 15
    • 85084162788 scopus 로고    scopus 로고
    • U. Shankar, M. Chew and J.D. Tygar. Side effects are not sufficient to authenticate software. In In 13th USNIX Security Symposium, pp. 89-101, 2004.
    • U. Shankar, M. Chew and J.D. Tygar. Side effects are not sufficient to authenticate software. In In 13th USNIX Security Symposium, pp. 89-101, 2004.
  • 16
    • 3042738543 scopus 로고    scopus 로고
    • A. Seshadri, A. Perrig, L. van. Doom and P. Khosla, SWATT: SoftWare-Based ATTestation for Embedded Devices. In IEEE Symp. on Security and Privacy, 2004.
    • A. Seshadri, A. Perrig, L. van. Doom and P. Khosla, SWATT: SoftWare-Based ATTestation for Embedded Devices. In IEEE Symp. on Security and Privacy, 2004.
  • 18
    • 34247339956 scopus 로고    scopus 로고
    • Trusted Computing Group TCG
    • Trusted Computing Group (TCG). https://www.trustedcomputinggroup.org/, 2003.
    • (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.