Abstract
Mobile agent technology is an evolving paradigm that combines the inherent characteristics of intelligent agents, namely, adaptability, reactivity and autonomy with mobility. These characteristics of mobile agents provide an excellent means of meeting the distributed and heterogeneous requirements of many military applications that involve low bandwidth and intermittently connected networks. In typical military applications, mobile agents can be used to perform information push, information pull, and sentinel monitoring [1].
Similar content being viewed by others
References
McGrath, S., Chacón, D., Whitebread, K.: Intelligent Mobile Agents in Military Command and Control. In: Autonomous Agents 2000 Workshop/Agents in Industry, Barcelona, Spain (2000)
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419. Springer, Heidelberg (1998)
Collberg, C., Thomborson, C., Low, D.: Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. In: Proceedings of 1998 ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1998 (1998)
Sakabe, Y., Masakazu, S., Miyaji, A.: Java obfuscation with a theoretical basis for building secure mobile agents. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 1419. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Majumdar, A., Thomborson, C. (2005). On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_90
Download citation
DOI: https://doi.org/10.1007/11427995_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)