Skip to main content

Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts

  • Chapter
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1419))

Abstract

In this paper, an approach to partially solve one of the most difficult aspects of security of mobile agents systems is presented, the problem of malicious hosts. This problem consists in the possibility of attacks against a mobile agent by the party that maintains an agent system node, a host. The idea to solve this problem is to create a blackbox out of an original agent. A blackbox is an agent that performs the same work as the original agent, but is of a different structure. This difference allows to assume a certain agent protection time interval, during which it is impossible for an attacker to discover relevant data or to manipulate the execution of the agent. After that time interval the agent and some associated data get invalid and the agent cannot migrate or interact anymore, which prevents the exploitation of attacks after the protection interval.

This work was funded by the German Research Community (DFG)

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Farmer, William; Guttmann, Joshua; Swarup, Vipin: Security for Mobile Agents: Authentication and State Appraisal, in: Proceedings of the European Symposium on Research in Computer Security (ESORICS), pp. 118–130, Springer LNCS 1146, 1996

    Google Scholar 

  2. General Magic: The Telescript Reference Manual. 1996. http://www.genmagic.com/Telescript/Documentation/TRM/

  3. Hohl, Fritz: An approach to solve the problem of malicious hosts. Universität Stuttgart, Fakultät Informatik, Fakultätsbericht Nr. 1997/03, 1997. http://www.informatik.uni-stuttgart.de/cgi-bin/ncstrl_rep_view.pl?/inf/ftp/pub/library/ncstrl.ustuttgart_fi/TR-1997-03/TR-1997-03.bib

  4. Röhrle, Klaus: Konzeption, Implementierung und Analyse von Verwürfelungsmechanismen für Quellcode, Diploma Thesis Nr. 1541, Faculty of Informatics, University of Stuttgart, Germany, 1997

    Google Scholar 

  5. Mobilis: Exploring Telescript-mobilis Reader Interview: General Magic’s Jim White. Mobilis March 1996. http://www.volksware.com/mobilis/march.96/interv1.htm

  6. Mole project page. http://www.informatik.uni-stuttgart.de/ipvr/vs/projekte/mole.html

  7. Palmer, E: An Introduction to Citadel-a secure crypto coprocessor for workstations, in: Proceedings of the IFIP SEC’94 Conference, 1994

    Google Scholar 

  8. Rasmusson, Lars; Jansson, Sverker: Simulated Social Control for Secure Internet Commerce, in: New Security Paradigms’ 96, ACM Press, 1996

    Google Scholar 

  9. Sander, Tomas: Security! or “How to Avoid to Breath Life in Frankensteins Monster”. Slides of a talk at the ICSI Inhouse Workshop on Auto Mobile Code, “Technology and Applications of Auto Mobile Code (AMC)”, September 1997. http://www.icsi.berkeley.edu/~tschudin/amc/workshop97/security.html

  10. Sander, Tomas; Tschudin, Christian: Protecting Mobile Agents Against Malicious Hosts, in: Vigna, Giovanni (Ed.): Mobile Agents and Security, Springer-Verlag, 1998. http://www.icsi.berkeley.edu/~sander/publications/MA-protect.ps

  11. Sander, Tomas; Tschudin, Christian: Towards Mobile Cryptography. Technical Report 97-049, International Computer Science Institute, Berkeley. 1997. http://www.icsi.berkeley.edu/~sander/publications/tr-97-049.ps

    Google Scholar 

  12. Sander, Tomas; Tschudin, Christian: On Sofware Protection via Function Hiding. Submitted to the 2nd International Workshop on Information Hiding, Dec 1998. http://www.icsi.berkeley.edu/~sander/publications/hiding.ps

  13. Vigna, Giovanni: Protecting Mobile Agents through Tracing, in: Proceedings of the Third ECOOP Workshop on Operating System support for Mobile Object Systems, 1997. To appear.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hohl, F. (1998). Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-68671-1_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64792-8

  • Online ISBN: 978-3-540-68671-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics