Abstract
Critical infrastructures are usually controlled by software entities. To monitor the well-function of these entities, a solution based in the use of mobile agents is proposed. Some proposals to detect modifications of mobile agents, as digital signature of code, exist but they are oriented to protect software against modification or to verify that an agent have been executed correctly. The aim of our proposal is to guarantee that the software is being executed correctly by a non trusted host. The way proposed to achieve this objective is by the improvement of the Self-Validating Branch-Based Software Watermarking by Myles et al.. The proposed modification is the incorporation of an external element called sentinel which controls branch targets. This technique applied in mobile agents can guarantee the correct operation of an agent or, at least, can detect suspicious behaviours of a malicious host during the execution of the agent instead of detecting when the execution of the agent have finished.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Myles, G., Jin, H.: Self-validating branch-based software watermarking. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 342–356. Springer, Heidelberg (2005)
Franklin, S., Graesser, A.: Is it an agent,or just a program?: A taxonomy for autonomous agents. In: ECAI 1996: Proceedings of the Workshop on Intelligent Agents III,Agent Theories,Architectures,and Languages, London,UK, pp. 21–35. Springer, Heidelberg (1997)
Collberg, C., Thomborson, C.: On the limits of software watermark- ing. Technical Report 164, Department of Computer Science,The University of Auckland (August 1998)
Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings (January 1999)
Wagner, N.R.: Fingerprinting. In: SP 1983: Proceedings of the 1983 IEEE Sympo- sium on Security and Privacy, Washington,DC,USA, p. 18. IEEE Computer Society, Los Alamitos (1983)
Linn, C., Debray, S.: Obfuscation of executable code to improve resis- tance to static disassembly. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 290–299. ACM Press, New York (2003)
Hohl, F.: Time limited blackbox security: Protecting mobile agents from malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Esparza, O., Soriano, M., Munoz, J.L., Forne, J.: A protocol for detecting ma- licious hosts based on limiting the execution time of mobile agents. In: Proceedings. Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), vol. 1, pp. 251–256 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tomàs-Buliart, J., Fernández, M., Soriano, M. (2009). Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-03552-4_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03551-7
Online ISBN: 978-3-642-03552-4
eBook Packages: Computer ScienceComputer Science (R0)