科技报告详细信息
Securing mobile code.
Link, Hamilton E. ; Schroeppel, Richard Crabtree ; Neumann, William Douglas ; Campbell, Philip LaRoche ; Beaver, Cheryl Lynn ; Pierson, Lyndon George ; Anderson, William Erik
Sandia National Laboratories
关键词: 99 General And Miscellaneous//Mathematics, Computing, And Information Science;    Mobility;    Cryptography;    Computer Security.;    Computer Networks;   
DOI  :  10.2172/919632
RP-ID  :  SAND2004-5114
RP-ID  :  AC04-94AL85000
RP-ID  :  919632
美国|英语
来源: UNT Digital Library
PDF
【 摘 要 】

If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.

【 预 览 】
附件列表
Files Size Format View
919632.pdf 972KB PDF download
  文献评价指标  
  下载次数:23次 浏览次数:47次