Skip to main content

On the Use of Opaque Predicates in Mobile Agent Code Obfuscation

  • Conference paper
Intelligence and Security Informatics (ISI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Included in the following conference series:

Abstract

Mobile agent technology is an evolving paradigm that combines the inherent characteristics of intelligent agents, namely, adaptability, reactivity and autonomy with mobility. These characteristics of mobile agents provide an excellent means of meeting the distributed and heterogeneous requirements of many military applications that involve low bandwidth and intermittently connected networks. In typical military applications, mobile agents can be used to perform information push, information pull, and sentinel monitoring [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. McGrath, S., Chacón, D., Whitebread, K.: Intelligent Mobile Agents in Military Command and Control. In: Autonomous Agents 2000 Workshop/Agents in Industry, Barcelona, Spain (2000)

    Google Scholar 

  2. Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Proceedings of 1998 ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1998 (1998)

    Google Scholar 

  5. Sakabe, Y., Masakazu, S., Miyaji, A.: Java obfuscation with a theoretical basis for building secure mobile agents. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 1419. Springer, Heidelberg (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Majumdar, A., Thomborson, C. (2005). On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_90

Download citation

  • DOI: https://doi.org/10.1007/11427995_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics