Mobile agent watermarking and fingerprinting: Tracing malicious hosts

17Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. The approach that is presented here detects manipulation attacks performed during the agent's execution. Software watermarking techniques are used in order to embed a mark into the agent. The agent's execution creates marked results. When the agent returns to the origin host, these results are examined in order to find the embedded mark. If the mark has changed, this means that the executing host has modified the agent. Colluding hosts can also be identified by using codes with the identifiable parent property (IPP) as marks, i.e. mobile agent fingerprinting. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Esparza, O., Fernandez, M., Soriano, M., Muñoz, J. L., & Forné, J. (2003). Mobile agent watermarking and fingerprinting: Tracing malicious hosts. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2736, 927–936. https://doi.org/10.1007/978-3-540-45227-0_90

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free