Towards a Practical Secure Framework for Mobile Code Commerce

  • Gaël Hachez
  • Laurent Den Hollander
  • Mehrdad Jalali
  • Jean-Jacques Quisquater 
  • Christophe Vasserot
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1975)

Abstract

Securingthe mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must be addressed. In a second step we list the possible techniques that can be used for that purpose. In a third step, we build a framework based on the analysis done. This framework has been implemented to show its validity.

Keywords

electronic commerce electronic right management copyright protection software piracy obfuscation watermarking 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, July 1994.Google Scholar
  2. 2.
    C. Collbergand C. Thomborson. Software Watermarking: Models and Dynamic Embeddings. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), January 1999.Google Scholar
  3. 3.
    C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science. The University of Auckland, July 1997.Google Scholar
  4. 4.
    Intel Corporation and Microsoft Corporation. PC 99 System Design Guide. http://www.pcdesguide.org/pc99/, 1999.
  5. 5.
    D. Dean. DIVX, DPRM (Digital Property Rights Management) and SDMI (Secure Digital Music Initiative). In DIMACS Workshop on Management of Digital Intellectual Property, Piscataway, New Jersey, USA, April 2000. DIMACS.Google Scholar
  6. 6.
    Premkunar T. Devanbu and Stuart Stubblebine. Software Engineering for Security: a Roadmap. In The Future of Software Engineering. Special volume of the proceedings of the 22nd International Conference on Software Engineering-ICSE 2000, June 2000.Google Scholar
  7. 9.
    N. Johnson and S. Katzenbeisser. A survey of steganographic tehcniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 3.Google Scholar
  8. 10.
    S. Katzenbeisser and F. Petitcolas. Information Hiding: techniques for steganography and digital watermarking. Computer Security Series. Artech House, 2000.Google Scholar
  9. 11.
    Paul Kocher. TimingA ttack on Implementations of Diffie-Hellman, RSA, DSS and other systems. In N. Kobliz, editor, Advances in Cryptology-CRYPTO’ 96, volume 1109 of Lectures Notes in Computer Science (LNCS), pages 104–113. Springer-Verlag, 1996.CrossRefGoogle Scholar
  10. 12.
    Paul Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO’ 99, volume 1666 of Lectures Notes in Computer Science (LNCS), pages 388–397. Springer-Verlag, 1999.Google Scholar
  11. 13.
    Oliver Kommerling and Markus G. Kuhn. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’ 99), pages 9–20. USENIX Association, May 1999.Google Scholar
  12. 14.
    M. Kutter and F. Hartung. Introduction of watermaking techniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 5.Google Scholar
  13. 15.
    G. Nolan. Decompile once, run anywhere. Web Techniques Magazine, 2(9), September 1997.Google Scholar
  14. 16.
    F. Petitcolas, R. Anderson, and M. Kuhn. Information hiding-a survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062–1078, July 1999.Google Scholar
  15. 17.
    T. Proebsting and S. Watterson. Krakatoa: Decompilation in JAVA (Does Bytecode Reveal Source?). In USENIX Conference on Object-Oriented Technologies and Systems (COOTS’ 97), June 1997.Google Scholar
  16. 18.
    Julien P. Stern, Gaël Hachez, François Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In A. Pfitzmann, editor, Information Hiding’ 99, volume 1768 of Lectures Notes in Computer Science (LNCS), pages 368–378, Dresden, Germany, 2000. Springer-Verlag.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Gaël Hachez
    • 1
  • Laurent Den Hollander
    • 2
  • Mehrdad Jalali
    • 3
  • Jean-Jacques Quisquater 
    • 1
  • Christophe Vasserot
    • 4
  1. 1.UCL Crypto GroupUniversité Catholique de LouvainLouvain-la-NeuveBelgium
  2. 2.GemplusGémenos CedexFrance
  3. 3.Fraunhofer Institut für Graphische Datenverarbeitung-IGDDarmstadtGermany
  4. 4.Thomson-CSF Communications, Care Technique & Technology UnitColombesFrance

Personalised recommendations