Abstract
In this paper, an approach to partially solve one of the most difficult aspects of security of mobile agents systems is presented, the problem of malicious hosts. This problem consists in the possibility of attacks against a mobile agent by the party that maintains an agent system node, a host. The idea to solve this problem is to create a blackbox out of an original agent. A blackbox is an agent that performs the same work as the original agent, but is of a different structure. This difference allows to assume a certain agent protection time interval, during which it is impossible for an attacker to discover relevant data or to manipulate the execution of the agent. After that time interval the agent and some associated data get invalid and the agent cannot migrate or interact anymore, which prevents the exploitation of attacks after the protection interval.
This work was funded by the German Research Community (DFG)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Farmer, William; Guttmann, Joshua; Swarup, Vipin: Security for Mobile Agents: Authentication and State Appraisal, in: Proceedings of the European Symposium on Research in Computer Security (ESORICS), pp. 118–130, Springer LNCS 1146, 1996
General Magic: The Telescript Reference Manual. 1996. http://www.genmagic.com/Telescript/Documentation/TRM/
Hohl, Fritz: An approach to solve the problem of malicious hosts. Universität Stuttgart, Fakultät Informatik, Fakultätsbericht Nr. 1997/03, 1997. http://www.informatik.uni-stuttgart.de/cgi-bin/ncstrl_rep_view.pl?/inf/ftp/pub/library/ncstrl.ustuttgart_fi/TR-1997-03/TR-1997-03.bib
Röhrle, Klaus: Konzeption, Implementierung und Analyse von Verwürfelungsmechanismen für Quellcode, Diploma Thesis Nr. 1541, Faculty of Informatics, University of Stuttgart, Germany, 1997
Mobilis: Exploring Telescript-mobilis Reader Interview: General Magic’s Jim White. Mobilis March 1996. http://www.volksware.com/mobilis/march.96/interv1.htm
Mole project page. http://www.informatik.uni-stuttgart.de/ipvr/vs/projekte/mole.html
Palmer, E: An Introduction to Citadel-a secure crypto coprocessor for workstations, in: Proceedings of the IFIP SEC’94 Conference, 1994
Rasmusson, Lars; Jansson, Sverker: Simulated Social Control for Secure Internet Commerce, in: New Security Paradigms’ 96, ACM Press, 1996
Sander, Tomas: Security! or “How to Avoid to Breath Life in Frankensteins Monster”. Slides of a talk at the ICSI Inhouse Workshop on Auto Mobile Code, “Technology and Applications of Auto Mobile Code (AMC)”, September 1997. http://www.icsi.berkeley.edu/~tschudin/amc/workshop97/security.html
Sander, Tomas; Tschudin, Christian: Protecting Mobile Agents Against Malicious Hosts, in: Vigna, Giovanni (Ed.): Mobile Agents and Security, Springer-Verlag, 1998. http://www.icsi.berkeley.edu/~sander/publications/MA-protect.ps
Sander, Tomas; Tschudin, Christian: Towards Mobile Cryptography. Technical Report 97-049, International Computer Science Institute, Berkeley. 1997. http://www.icsi.berkeley.edu/~sander/publications/tr-97-049.ps
Sander, Tomas; Tschudin, Christian: On Sofware Protection via Function Hiding. Submitted to the 2nd International Workshop on Information Hiding, Dec 1998. http://www.icsi.berkeley.edu/~sander/publications/hiding.ps
Vigna, Giovanni: Protecting Mobile Agents through Tracing, in: Proceedings of the Third ECOOP Workshop on Operating System support for Mobile Object Systems, 1997. To appear.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Hohl, F. (1998). Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (eds) Mobile Agents and Security. Lecture Notes in Computer Science, vol 1419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-68671-1_6
Download citation
DOI: https://doi.org/10.1007/3-540-68671-1_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64792-8
Online ISBN: 978-3-540-68671-2
eBook Packages: Springer Book Archive