Skip to main content

Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel

  • Conference paper
Critical Information Infrastructure Security (CRITIS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5508))

Abstract

Critical infrastructures are usually controlled by software entities. To monitor the well-function of these entities, a solution based in the use of mobile agents is proposed. Some proposals to detect modifications of mobile agents, as digital signature of code, exist but they are oriented to protect software against modification or to verify that an agent have been executed correctly. The aim of our proposal is to guarantee that the software is being executed correctly by a non trusted host. The way proposed to achieve this objective is by the improvement of the Self-Validating Branch-Based Software Watermarking by Myles et al.. The proposed modification is the incorporation of an external element called sentinel which controls branch targets. This technique applied in mobile agents can guarantee the correct operation of an agent or, at least, can detect suspicious behaviours of a malicious host during the execution of the agent instead of detecting when the execution of the agent have finished.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Myles, G., Jin, H.: Self-validating branch-based software watermarking. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 342–356. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Franklin, S., Graesser, A.: Is it an agent,or just a program?: A taxonomy for autonomous agents. In: ECAI 1996: Proceedings of the Workshop on Intelligent Agents III,Agent Theories,Architectures,and Languages, London,UK, pp. 21–35. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  3. Collberg, C., Thomborson, C.: On the limits of software watermark- ing. Technical Report 164, Department of Computer Science,The University of Auckland (August 1998)

    Google Scholar 

  4. Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings (January 1999)

    Google Scholar 

  5. Wagner, N.R.: Fingerprinting. In: SP 1983: Proceedings of the 1983 IEEE Sympo- sium on Security and Privacy, Washington,DC,USA, p. 18. IEEE Computer Society, Los Alamitos (1983)

    Google Scholar 

  6. Linn, C., Debray, S.: Obfuscation of executable code to improve resis- tance to static disassembly. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 290–299. ACM Press, New York (2003)

    Google Scholar 

  7. Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  8. Esparza, O., Soriano, M., Munoz, J.L., Forne, J.: A protocol for detecting ma- licious hosts based on limiting the execution time of mobile agents. In: Proceedings. Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), vol. 1, pp. 251–256 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tomàs-Buliart, J., Fernández, M., Soriano, M. (2009). Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03552-4_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03551-7

  • Online ISBN: 978-3-642-03552-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics