Towards a Practical Secure Framework for Mobile Code Commerce
Securingthe mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must be addressed. In a second step we list the possible techniques that can be used for that purpose. In a third step, we build a framework based on the analysis done. This framework has been implemented to show its validity.
Keywordselectronic commerce electronic right management copyright protection software piracy obfuscation watermarking
Unable to display preview. Download preview PDF.
- 1.C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, July 1994.Google Scholar
- 2.C. Collbergand C. Thomborson. Software Watermarking: Models and Dynamic Embeddings. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), January 1999.Google Scholar
- 3.C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science. The University of Auckland, July 1997.Google Scholar
- 4.Intel Corporation and Microsoft Corporation. PC 99 System Design Guide. http://www.pcdesguide.org/pc99/, 1999.
- 5.D. Dean. DIVX, DPRM (Digital Property Rights Management) and SDMI (Secure Digital Music Initiative). In DIMACS Workshop on Management of Digital Intellectual Property, Piscataway, New Jersey, USA, April 2000. DIMACS.Google Scholar
- 6.Premkunar T. Devanbu and Stuart Stubblebine. Software Engineering for Security: a Roadmap. In The Future of Software Engineering. Special volume of the proceedings of the 22nd International Conference on Software Engineering-ICSE 2000, June 2000.Google Scholar
- 9.N. Johnson and S. Katzenbeisser. A survey of steganographic tehcniques. In Information Hiding: techniques for steganography and digital watermarking , chapter 3.Google Scholar
- 10.S. Katzenbeisser and F. Petitcolas. Information Hiding: techniques for steganography and digital watermarking. Computer Security Series. Artech House, 2000.Google Scholar
- 12.Paul Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO’ 99, volume 1666 of Lectures Notes in Computer Science (LNCS), pages 388–397. Springer-Verlag, 1999.Google Scholar
- 13.Oliver Kommerling and Markus G. Kuhn. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’ 99), pages 9–20. USENIX Association, May 1999.Google Scholar
- 14.M. Kutter and F. Hartung. Introduction of watermaking techniques. In Information Hiding: techniques for steganography and digital watermarking , chapter 5.Google Scholar
- 15.G. Nolan. Decompile once, run anywhere. Web Techniques Magazine, 2(9), September 1997.Google Scholar
- 16.F. Petitcolas, R. Anderson, and M. Kuhn. Information hiding-a survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062–1078, July 1999.Google Scholar
- 17.T. Proebsting and S. Watterson. Krakatoa: Decompilation in JAVA (Does Bytecode Reveal Source?). In USENIX Conference on Object-Oriented Technologies and Systems (COOTS’ 97), June 1997.Google Scholar
- 18.Julien P. Stern, Gaël Hachez, François Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In A. Pfitzmann, editor, Information Hiding’ 99, volume 1768 of Lectures Notes in Computer Science (LNCS), pages 368–378, Dresden, Germany, 2000. Springer-Verlag.CrossRefGoogle Scholar