Secure execution of mobile agents on open networks using cooperative agents.
Yu Chiu-Man. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. === Includes bibliographical references (leaves 93-96). === Abstracts in English and Chinese. === Abstract --- p.i === Acknowledgements --- p.ii === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Advantages of mobil...
Other Authors: | |
---|---|
Format: | Others |
Language: | English Chinese |
Published: |
2002
|
Subjects: | |
Online Access: | http://library.cuhk.edu.hk/record=b5895978 http://repository.lib.cuhk.edu.hk/en/item/cuhk-323799 |
Summary: | Yu Chiu-Man. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. === Includes bibliographical references (leaves 93-96). === Abstracts in English and Chinese. === Abstract --- p.i === Acknowledgements --- p.ii === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Advantages of mobile agents --- p.2 === Chapter 1.2 --- Security --- p.3 === Chapter 1.3 --- Contributions --- p.3 === Chapter 1.4 --- Structure --- p.4 === Chapter 2 --- The Problem of Execution Tampering Attack --- p.5 === Chapter 2.1 --- Mobile agent execution model --- p.5 === Chapter 2.2 --- Tampering attack from malicious hosts --- p.5 === Chapter 2.3 --- Open network environment --- p.6 === Chapter 2.4 --- Conclusion --- p.6 === Chapter 3 --- Existing Approaches to Solve the Execution Tampering Prob- lem --- p.8 === Chapter 3.1 --- Introduction --- p.8 === Chapter 3.2 --- Trusted execution environment --- p.9 === Chapter 3.2.1 --- Closed system --- p.9 === Chapter 3.2.2 --- Trusted hardware --- p.9 === Chapter 3.3 --- Tamper-detection --- p.11 === Chapter 3.3.1 --- Execution tracing --- p.11 === Chapter 3.4 --- Tamper-prevention --- p.12 === Chapter 3.4.1 --- Blackbox security --- p.12 === Chapter 3.4.2 --- Time limited blackbox --- p.13 === Chapter 3.4.3 --- Agent mess-up --- p.15 === Chapter 3.4.4 --- Addition of noisy code --- p.15 === Chapter 3.4.5 --- Co-operating agents --- p.16 === Chapter 3.5 --- Conclusion --- p.17 === Chapter 4 --- Tamper-Detection Mechanism of Our Protocol --- p.18 === Chapter 4.1 --- Introduction --- p.18 === Chapter 4.2 --- Execution tracing --- p.18 === Chapter 4.3 --- Code obfuscation --- p.21 === Chapter 4.3.1 --- Resilience of obfuscating transformation --- p.22 === Chapter 4.4 --- Execution tracing with obfuscated program --- p.23 === Chapter 4.5 --- Conclusion --- p.27 === Chapter 5 --- A Flexible Tamper-Detection Protocol by Using Cooperating Agents --- p.28 === Chapter 5.1 --- Introduction --- p.28 === Chapter 5.1.1 --- Agent model --- p.29 === Chapter 5.1.2 --- Execution model --- p.30 === Chapter 5.1.3 --- System model --- p.30 === Chapter 5.1.4 --- Failure model --- p.30 === Chapter 5.2 --- The tamper-detection protocol --- p.30 === Chapter 5.3 --- Fault-tolerance policy --- p.38 === Chapter 5.4 --- Costs of the protocol --- p.38 === Chapter 5.5 --- Discussion --- p.40 === Chapter 5.6 --- Conclusion --- p.42 === Chapter 6 --- Verification of the Protocol by BAN Logic --- p.43 === Chapter 6.1 --- Introduction --- p.43 === Chapter 6.2 --- Modifications to BAN logic --- p.44 === Chapter 6.3 --- Term definitions --- p.45 === Chapter 6.4 --- Modeling of our tamper-detection protocol --- p.46 === Chapter 6.5 --- Goals --- p.47 === Chapter 6.6 --- Sub-goals --- p.48 === Chapter 6.7 --- Assumptions --- p.48 === Chapter 6.8 --- Verification --- p.49 === Chapter 6.9 --- Conclusion --- p.53 === Chapter 7 --- Experimental Results Related to the Protocol --- p.54 === Chapter 7.1 --- Introduction --- p.54 === Chapter 7.2 --- Experiment environment --- p.54 === Chapter 7.3 --- Experiment procedures --- p.55 === Chapter 7.4 --- Experiment implementation --- p.56 === Chapter 7.5 --- Experimental results --- p.61 === Chapter 7.6 --- Conclusion --- p.65 === Chapter 8 --- Extension to Solve the ´حFake Honest Host´ح Problem --- p.68 === Chapter 8.1 --- Introduction --- p.68 === Chapter 8.2 --- "The method to solve the ""fake honest host"" problem" --- p.69 === Chapter 8.2.1 --- Basic idea --- p.69 === Chapter 8.2.2 --- Description of the method --- p.69 === Chapter 8.3 --- Conclusion --- p.71 === Chapter 9 --- Performance Improvement by Program Slicing --- p.73 === Chapter 9.1 --- Introduction --- p.73 === Chapter 9.2 --- Deployment of program slicing --- p.73 === Chapter 9.3 --- Conclusion --- p.75 === Chapter 10 --- Increase Scalability by Supporting Multiple Mobile Agents --- p.76 === Chapter 10.1 --- Introduction --- p.76 === Chapter 10.2 --- Supporting multiple mobile agents --- p.76 === Chapter 10.3 --- Conclusion --- p.78 === Chapter 11 --- Deployment of Trust Relationship in the Protocol --- p.79 === Chapter 11.1 --- Introduction --- p.79 === Chapter 11.2 --- Deployment of trust relationship --- p.79 === Chapter 11.3 --- Conclusion --- p.82 === Chapter 12 --- Conclusions and Future Work --- p.83 === A Data of Experimental Results --- p.86 === Publication --- p.92 === Bibliography --- p.93 |
---|