Matches in SemOpenAlex for { <https://semopenalex.org/work/W19006595> ?p ?o ?g. }
- W19006595 abstract "Mobile software provides a highly desirable and flexible form of computing, but creates complex security considerations beyond those associated with the traditional mode of computing. Execution environments with the ability to modify a program at run time compound the risks associated with mobile software. These dynamic program transformation environments could be used to introduce malicious code by transforming an otherwise safe program in a nefarious manner. Inadequate security can have profound, detrimental effects for both the producer and the consumer of mobile code. Validating the integrity of software is one important criterion for safe execution on the client machine. However, networked devices with severely constrained bandwidth or power resources could handle delivery and management of integrity data much more efficiently than methods currently in use today. Techniques to control how a program evolves in a dynamic transformation environment, based on formal security policy, are also lacking. Prior to this research, techniques to control program transformation based on security policy did not exist. This research presents a general tamper detection framework along with the design and implementation of two systems to validate program integrity for various forms of mobile computer programs. The tamper detection framework utilizes hybrid steganographic-cryptographic techniques to encode program authentication data by embedding a fragile watermark within a program. Using steganographic techniques to communicate this authentication data greatly simplifies the storage and management of the data. The fragile watermark can be used to authenticate the sender and to validate the integrity of a mobile program. This dissertation is the first to provide techniques to control dynamic program transformations based upon specified security policy. The developed program transformation control framework is based on a control language which describes transformation policy to the runtime environment. The transformation controls will enable only those program transformations to be applied to the software that are acceptable to the specified policy, thereby controlling how the program is modified at runtime. The major contributions of this dissertation are (1) identifying key weaknesses in current tamper detection techniques, (2) presenting the development and evaluation of novel techniques and frameworks that utilize static analysis of mobile code to embed and validate a tamper detection mark within mobile code, (3) identifying key weaknesses in current validation techniques for dynamically transforming program files, and (4) presenting the development and evaluation of novel techniques and frameworks that utilize a language developed to specify controls for dynamic program transformations to mobile code. The tamper detection component enables the insertion, extraction, and validation of a tamper detection mark in mobile code while maintaining semantic equivalence to the original code. The transformation controls enable dynamic program transformation to occur on a running program within a user-specified set of permissible transformations. The combined effect of tamper detection marking and transformation control helps provide for the safe dissemination and execution of mobile code through validation of program integrity." @default.
- W19006595 created "2016-06-24" @default.
- W19006595 creator A5009639582 @default.
- W19006595 creator A5068927917 @default.
- W19006595 date "2008-01-01" @default.
- W19006595 modified "2023-09-24" @default.
- W19006595 title "Mobile code integrity through static program analysis, steganography, and dynamic transformation control" @default.
- W19006595 cites W124732759 @default.
- W19006595 cites W1486784874 @default.
- W19006595 cites W1489356009 @default.
- W19006595 cites W1491178396 @default.
- W19006595 cites W1508975667 @default.
- W19006595 cites W1510940979 @default.
- W19006595 cites W1511773157 @default.
- W19006595 cites W1514258760 @default.
- W19006595 cites W1520409399 @default.
- W19006595 cites W1527059802 @default.
- W19006595 cites W1544837488 @default.
- W19006595 cites W1566733061 @default.
- W19006595 cites W1578627459 @default.
- W19006595 cites W1585587848 @default.
- W19006595 cites W1585665690 @default.
- W19006595 cites W1589623122 @default.
- W19006595 cites W1599126799 @default.
- W19006595 cites W1644882639 @default.
- W19006595 cites W1656678770 @default.
- W19006595 cites W1656731780 @default.
- W19006595 cites W168248273 @default.
- W19006595 cites W1774235996 @default.
- W19006595 cites W1791023610 @default.
- W19006595 cites W1859852026 @default.
- W19006595 cites W1879312793 @default.
- W19006595 cites W1968519345 @default.
- W19006595 cites W1974055763 @default.
- W19006595 cites W1975319812 @default.
- W19006595 cites W1981663184 @default.
- W19006595 cites W1987805948 @default.
- W19006595 cites W1996360405 @default.
- W19006595 cites W2000646525 @default.
- W19006595 cites W2007920703 @default.
- W19006595 cites W2015946833 @default.
- W19006595 cites W2018639540 @default.
- W19006595 cites W2019763646 @default.
- W19006595 cites W2028124543 @default.
- W19006595 cites W2034711041 @default.
- W19006595 cites W2036015710 @default.
- W19006595 cites W2036395016 @default.
- W19006595 cites W2041673946 @default.
- W19006595 cites W2050619869 @default.
- W19006595 cites W2051776088 @default.
- W19006595 cites W2062341755 @default.
- W19006595 cites W2067881674 @default.
- W19006595 cites W2072737419 @default.
- W19006595 cites W2077329456 @default.
- W19006595 cites W2078243195 @default.
- W19006595 cites W2083122891 @default.
- W19006595 cites W2088056808 @default.
- W19006595 cites W2092483417 @default.
- W19006595 cites W2096173622 @default.
- W19006595 cites W2102727118 @default.
- W19006595 cites W2103299454 @default.
- W19006595 cites W2104489637 @default.
- W19006595 cites W2105090082 @default.
- W19006595 cites W2106529232 @default.
- W19006595 cites W2106682888 @default.
- W19006595 cites W2107667898 @default.
- W19006595 cites W2113613181 @default.
- W19006595 cites W2114067856 @default.
- W19006595 cites W2114619180 @default.
- W19006595 cites W2116210226 @default.
- W19006595 cites W2117008146 @default.
- W19006595 cites W2122440889 @default.
- W19006595 cites W2124890704 @default.
- W19006595 cites W2128180740 @default.
- W19006595 cites W2131300413 @default.
- W19006595 cites W2131756335 @default.
- W19006595 cites W2133252868 @default.
- W19006595 cites W2134518741 @default.
- W19006595 cites W2144642244 @default.
- W19006595 cites W2146567535 @default.
- W19006595 cites W2147547618 @default.
- W19006595 cites W2148589677 @default.
- W19006595 cites W2149827608 @default.
- W19006595 cites W2149996206 @default.
- W19006595 cites W2150010995 @default.
- W19006595 cites W2153281696 @default.
- W19006595 cites W2154839674 @default.
- W19006595 cites W2155623386 @default.
- W19006595 cites W2155986340 @default.
- W19006595 cites W2156897720 @default.
- W19006595 cites W2157074753 @default.
- W19006595 cites W2160468841 @default.
- W19006595 cites W2167141469 @default.
- W19006595 cites W2167373723 @default.
- W19006595 cites W2167918556 @default.
- W19006595 cites W2170107152 @default.
- W19006595 cites W2199322517 @default.
- W19006595 cites W2294906850 @default.
- W19006595 cites W2788962374 @default.
- W19006595 cites W3028982149 @default.