The problem of software integrity is traditionally addressed as the static verification of the code before the execution, often by checking the code signature. However, there are no well-defined solutions to the run-time verification of code integrity when the code is executed remotely, which is refer to as run-time remote entrusting. In this paper we present the research challenges involved in run-time remote entrusting and how we intend to solve this problem. Specifically, we address the problem of ensuring that a given piece of code executes on an remote untrusted machine and that its functionalities have not been tampered with both before execution and during run-time. © Springer-Verlag Berlin Hoidelberg 2008.
CITATION STYLE
Ceccato, M., Ofek, Y., & Tonella, P. (2008). Remote entrusting by run-time software authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4910 LNCS, pp. 83–97). Springer Verlag. https://doi.org/10.1007/978-3-540-77566-9_8
Mendeley helps you to discover research relevant for your work.