Secure Execution of Computations in Untrusted Hosts

  • S. H. K. Narayanan
  • M. T. Kandemir
  • R. R. Brooks
  • I. Kolcu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4006)


Proliferation of distributed computing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remote hosts. This paper proposes and evaluates a solution to the latter problem for applications based on linear computations that involve scalar as well as array arithmetic. We demonstrate that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.


Mobile Application Original Code Code Fragment Loop Body Scalar Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abadi, M., Feigenbaum, J.: Secure circuit evaluation. Journal of Cryptology 2(1), 112 (1990)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Amarasinghe, S.P., Anderson, J.M., Wilson, C.S., Liao, S.-W., Murphy, B.R., French, R.S., Lam, M.S., Hall, M.W.: Multiprocessors from a Software Perspective IEEE Micro, pp. 52–61 (June 1996)Google Scholar
  3. 3.
    Bremler-Barr, A., Levy, H.: Spoofing prevention method. In: Proc. of INFOCOM 2005, vol. 1, pp. 536–547 (2005)Google Scholar
  4. 4.
    Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proc. of the 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (May 1987)Google Scholar
  5. 5.
    Li, C., Potkonjak, M., Mangione-Smith, W.H.: MediaBench: A tool for evaluating and synthesizing multimedia and communication systems. In: Proc. of the International Symposium on Microarchitecture (1997)Google Scholar
  6. 6.
    Loureiro, S., Bussard, L., Roudier, Y.: Extending tamper-proof hardware security to untrusted execution environments. In: Proc. of CARDIS (2002)Google Scholar
  7. 7.
    Loureiro, S., Molva, R.: Function hiding based on error correcting codes. In: Proc. of the International Workshop on Cryptographic Techniques and Electronic Commerce, pp. 92–98 (1999)Google Scholar
  8. 8.
    Sander, T., Tschudin, C.F.: Towards mobile cryptography. In: Proc. of the 1998 IEEE Symposium on Security and Privacy, pp. 215–224 (1998)Google Scholar
  9. 9.
    Tripathi, A., Karnik, N.: A Security Architecture for Mobile Agents in Ajanta. In: Proc. of the International Conference on Distributed Computing Systems (2000)Google Scholar
  10. 10.
    Sander, T., Tschudin, C.: On software protection via function hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 111. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  11. 11.
    Wolfe, M.: High Performance Compilers for Parallel Computing. Addison-Wesley Publishing Company, Reading (1996)MATHGoogle Scholar
  12. 12.
    Yao, A.C.: Protocols for secure computations. In: Proc. of the IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)Google Scholar
  13. 13.
    Yao, A.C.: How to generate and exchange secrets. In: Wiedermann, J., Gruska, J., Rovan, B. (eds.) MFCS 1986. LNCS, vol. 233, pp. 162–167. Springer, Heidelberg (1986)Google Scholar
  14. 14.
    Yee, B.: A sanctuary for mobile agents. Technical Report CS97-537, Department of Computer Science and Engineering (April 1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • S. H. K. Narayanan
    • 1
  • M. T. Kandemir
    • 1
  • R. R. Brooks
    • 2
  • I. Kolcu
    • 3
  1. 1.Department of Computer Science and EngineeringThe Pennsylvania State UniversityUniversity ParkUSA
  2. 2.Department of Electrical and Computer EngineeringClemson UniversityClemsonUSA
  3. 3.Computation DepartmentUMISTManchesterUK

Personalised recommendations