Remote entrusting by run-time software authentication

5Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The problem of software integrity is traditionally addressed as the static verification of the code before the execution, often by checking the code signature. However, there are no well-defined solutions to the run-time verification of code integrity when the code is executed remotely, which is refer to as run-time remote entrusting. In this paper we present the research challenges involved in run-time remote entrusting and how we intend to solve this problem. Specifically, we address the problem of ensuring that a given piece of code executes on an remote untrusted machine and that its functionalities have not been tampered with both before execution and during run-time. © Springer-Verlag Berlin Hoidelberg 2008.

Cite

CITATION STYLE

APA

Ceccato, M., Ofek, Y., & Tonella, P. (2008). Remote entrusting by run-time software authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4910 LNCS, pp. 83–97). Springer Verlag. https://doi.org/10.1007/978-3-540-77566-9_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free