Secure execution of mobile agents on open networks using cooperative agents.

Yu Chiu-Man. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. === Includes bibliographical references (leaves 93-96). === Abstracts in English and Chinese. === Abstract --- p.i === Acknowledgements --- p.ii === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Advantages of mobil...

Full description

Bibliographic Details
Other Authors: Yu, Chiu-Man.
Format: Others
Language:English
Chinese
Published: 2002
Subjects:
Online Access:http://library.cuhk.edu.hk/record=b5895978
http://repository.lib.cuhk.edu.hk/en/item/cuhk-323799
id ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_323799
record_format oai_dc
collection NDLTD
language English
Chinese
format Others
sources NDLTD
topic Mobile agents (Computer software)
Computer security
Computer networks--Security measures
spellingShingle Mobile agents (Computer software)
Computer security
Computer networks--Security measures
Secure execution of mobile agents on open networks using cooperative agents.
description Yu Chiu-Man. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. === Includes bibliographical references (leaves 93-96). === Abstracts in English and Chinese. === Abstract --- p.i === Acknowledgements --- p.ii === Chapter 1 --- Introduction --- p.1 === Chapter 1.1 --- Advantages of mobile agents --- p.2 === Chapter 1.2 --- Security --- p.3 === Chapter 1.3 --- Contributions --- p.3 === Chapter 1.4 --- Structure --- p.4 === Chapter 2 --- The Problem of Execution Tampering Attack --- p.5 === Chapter 2.1 --- Mobile agent execution model --- p.5 === Chapter 2.2 --- Tampering attack from malicious hosts --- p.5 === Chapter 2.3 --- Open network environment --- p.6 === Chapter 2.4 --- Conclusion --- p.6 === Chapter 3 --- Existing Approaches to Solve the Execution Tampering Prob- lem --- p.8 === Chapter 3.1 --- Introduction --- p.8 === Chapter 3.2 --- Trusted execution environment --- p.9 === Chapter 3.2.1 --- Closed system --- p.9 === Chapter 3.2.2 --- Trusted hardware --- p.9 === Chapter 3.3 --- Tamper-detection --- p.11 === Chapter 3.3.1 --- Execution tracing --- p.11 === Chapter 3.4 --- Tamper-prevention --- p.12 === Chapter 3.4.1 --- Blackbox security --- p.12 === Chapter 3.4.2 --- Time limited blackbox --- p.13 === Chapter 3.4.3 --- Agent mess-up --- p.15 === Chapter 3.4.4 --- Addition of noisy code --- p.15 === Chapter 3.4.5 --- Co-operating agents --- p.16 === Chapter 3.5 --- Conclusion --- p.17 === Chapter 4 --- Tamper-Detection Mechanism of Our Protocol --- p.18 === Chapter 4.1 --- Introduction --- p.18 === Chapter 4.2 --- Execution tracing --- p.18 === Chapter 4.3 --- Code obfuscation --- p.21 === Chapter 4.3.1 --- Resilience of obfuscating transformation --- p.22 === Chapter 4.4 --- Execution tracing with obfuscated program --- p.23 === Chapter 4.5 --- Conclusion --- p.27 === Chapter 5 --- A Flexible Tamper-Detection Protocol by Using Cooperating Agents --- p.28 === Chapter 5.1 --- Introduction --- p.28 === Chapter 5.1.1 --- Agent model --- p.29 === Chapter 5.1.2 --- Execution model --- p.30 === Chapter 5.1.3 --- System model --- p.30 === Chapter 5.1.4 --- Failure model --- p.30 === Chapter 5.2 --- The tamper-detection protocol --- p.30 === Chapter 5.3 --- Fault-tolerance policy --- p.38 === Chapter 5.4 --- Costs of the protocol --- p.38 === Chapter 5.5 --- Discussion --- p.40 === Chapter 5.6 --- Conclusion --- p.42 === Chapter 6 --- Verification of the Protocol by BAN Logic --- p.43 === Chapter 6.1 --- Introduction --- p.43 === Chapter 6.2 --- Modifications to BAN logic --- p.44 === Chapter 6.3 --- Term definitions --- p.45 === Chapter 6.4 --- Modeling of our tamper-detection protocol --- p.46 === Chapter 6.5 --- Goals --- p.47 === Chapter 6.6 --- Sub-goals --- p.48 === Chapter 6.7 --- Assumptions --- p.48 === Chapter 6.8 --- Verification --- p.49 === Chapter 6.9 --- Conclusion --- p.53 === Chapter 7 --- Experimental Results Related to the Protocol --- p.54 === Chapter 7.1 --- Introduction --- p.54 === Chapter 7.2 --- Experiment environment --- p.54 === Chapter 7.3 --- Experiment procedures --- p.55 === Chapter 7.4 --- Experiment implementation --- p.56 === Chapter 7.5 --- Experimental results --- p.61 === Chapter 7.6 --- Conclusion --- p.65 === Chapter 8 --- Extension to Solve the ´حFake Honest Host´ح Problem --- p.68 === Chapter 8.1 --- Introduction --- p.68 === Chapter 8.2 --- "The method to solve the ""fake honest host"" problem" --- p.69 === Chapter 8.2.1 --- Basic idea --- p.69 === Chapter 8.2.2 --- Description of the method --- p.69 === Chapter 8.3 --- Conclusion --- p.71 === Chapter 9 --- Performance Improvement by Program Slicing --- p.73 === Chapter 9.1 --- Introduction --- p.73 === Chapter 9.2 --- Deployment of program slicing --- p.73 === Chapter 9.3 --- Conclusion --- p.75 === Chapter 10 --- Increase Scalability by Supporting Multiple Mobile Agents --- p.76 === Chapter 10.1 --- Introduction --- p.76 === Chapter 10.2 --- Supporting multiple mobile agents --- p.76 === Chapter 10.3 --- Conclusion --- p.78 === Chapter 11 --- Deployment of Trust Relationship in the Protocol --- p.79 === Chapter 11.1 --- Introduction --- p.79 === Chapter 11.2 --- Deployment of trust relationship --- p.79 === Chapter 11.3 --- Conclusion --- p.82 === Chapter 12 --- Conclusions and Future Work --- p.83 === A Data of Experimental Results --- p.86 === Publication --- p.92 === Bibliography --- p.93
author2 Yu, Chiu-Man.
author_facet Yu, Chiu-Man.
title Secure execution of mobile agents on open networks using cooperative agents.
title_short Secure execution of mobile agents on open networks using cooperative agents.
title_full Secure execution of mobile agents on open networks using cooperative agents.
title_fullStr Secure execution of mobile agents on open networks using cooperative agents.
title_full_unstemmed Secure execution of mobile agents on open networks using cooperative agents.
title_sort secure execution of mobile agents on open networks using cooperative agents.
publishDate 2002
url http://library.cuhk.edu.hk/record=b5895978
http://repository.lib.cuhk.edu.hk/en/item/cuhk-323799
_version_ 1718982902020046848
spelling ndltd-cuhk.edu.hk-oai-cuhk-dr-cuhk_3237992019-02-26T03:35:02Z Secure execution of mobile agents on open networks using cooperative agents. Mobile agents (Computer software) Computer security Computer networks--Security measures Yu Chiu-Man. Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. Includes bibliographical references (leaves 93-96). Abstracts in English and Chinese. Abstract --- p.i Acknowledgements --- p.ii Chapter 1 --- Introduction --- p.1 Chapter 1.1 --- Advantages of mobile agents --- p.2 Chapter 1.2 --- Security --- p.3 Chapter 1.3 --- Contributions --- p.3 Chapter 1.4 --- Structure --- p.4 Chapter 2 --- The Problem of Execution Tampering Attack --- p.5 Chapter 2.1 --- Mobile agent execution model --- p.5 Chapter 2.2 --- Tampering attack from malicious hosts --- p.5 Chapter 2.3 --- Open network environment --- p.6 Chapter 2.4 --- Conclusion --- p.6 Chapter 3 --- Existing Approaches to Solve the Execution Tampering Prob- lem --- p.8 Chapter 3.1 --- Introduction --- p.8 Chapter 3.2 --- Trusted execution environment --- p.9 Chapter 3.2.1 --- Closed system --- p.9 Chapter 3.2.2 --- Trusted hardware --- p.9 Chapter 3.3 --- Tamper-detection --- p.11 Chapter 3.3.1 --- Execution tracing --- p.11 Chapter 3.4 --- Tamper-prevention --- p.12 Chapter 3.4.1 --- Blackbox security --- p.12 Chapter 3.4.2 --- Time limited blackbox --- p.13 Chapter 3.4.3 --- Agent mess-up --- p.15 Chapter 3.4.4 --- Addition of noisy code --- p.15 Chapter 3.4.5 --- Co-operating agents --- p.16 Chapter 3.5 --- Conclusion --- p.17 Chapter 4 --- Tamper-Detection Mechanism of Our Protocol --- p.18 Chapter 4.1 --- Introduction --- p.18 Chapter 4.2 --- Execution tracing --- p.18 Chapter 4.3 --- Code obfuscation --- p.21 Chapter 4.3.1 --- Resilience of obfuscating transformation --- p.22 Chapter 4.4 --- Execution tracing with obfuscated program --- p.23 Chapter 4.5 --- Conclusion --- p.27 Chapter 5 --- A Flexible Tamper-Detection Protocol by Using Cooperating Agents --- p.28 Chapter 5.1 --- Introduction --- p.28 Chapter 5.1.1 --- Agent model --- p.29 Chapter 5.1.2 --- Execution model --- p.30 Chapter 5.1.3 --- System model --- p.30 Chapter 5.1.4 --- Failure model --- p.30 Chapter 5.2 --- The tamper-detection protocol --- p.30 Chapter 5.3 --- Fault-tolerance policy --- p.38 Chapter 5.4 --- Costs of the protocol --- p.38 Chapter 5.5 --- Discussion --- p.40 Chapter 5.6 --- Conclusion --- p.42 Chapter 6 --- Verification of the Protocol by BAN Logic --- p.43 Chapter 6.1 --- Introduction --- p.43 Chapter 6.2 --- Modifications to BAN logic --- p.44 Chapter 6.3 --- Term definitions --- p.45 Chapter 6.4 --- Modeling of our tamper-detection protocol --- p.46 Chapter 6.5 --- Goals --- p.47 Chapter 6.6 --- Sub-goals --- p.48 Chapter 6.7 --- Assumptions --- p.48 Chapter 6.8 --- Verification --- p.49 Chapter 6.9 --- Conclusion --- p.53 Chapter 7 --- Experimental Results Related to the Protocol --- p.54 Chapter 7.1 --- Introduction --- p.54 Chapter 7.2 --- Experiment environment --- p.54 Chapter 7.3 --- Experiment procedures --- p.55 Chapter 7.4 --- Experiment implementation --- p.56 Chapter 7.5 --- Experimental results --- p.61 Chapter 7.6 --- Conclusion --- p.65 Chapter 8 --- Extension to Solve the ´حFake Honest Host´ح Problem --- p.68 Chapter 8.1 --- Introduction --- p.68 Chapter 8.2 --- "The method to solve the ""fake honest host"" problem" --- p.69 Chapter 8.2.1 --- Basic idea --- p.69 Chapter 8.2.2 --- Description of the method --- p.69 Chapter 8.3 --- Conclusion --- p.71 Chapter 9 --- Performance Improvement by Program Slicing --- p.73 Chapter 9.1 --- Introduction --- p.73 Chapter 9.2 --- Deployment of program slicing --- p.73 Chapter 9.3 --- Conclusion --- p.75 Chapter 10 --- Increase Scalability by Supporting Multiple Mobile Agents --- p.76 Chapter 10.1 --- Introduction --- p.76 Chapter 10.2 --- Supporting multiple mobile agents --- p.76 Chapter 10.3 --- Conclusion --- p.78 Chapter 11 --- Deployment of Trust Relationship in the Protocol --- p.79 Chapter 11.1 --- Introduction --- p.79 Chapter 11.2 --- Deployment of trust relationship --- p.79 Chapter 11.3 --- Conclusion --- p.82 Chapter 12 --- Conclusions and Future Work --- p.83 A Data of Experimental Results --- p.86 Publication --- p.92 Bibliography --- p.93 Yu, Chiu-Man. Chinese University of Hong Kong Graduate School. Division of Computer Science and Engineering. 2002 Text bibliography print ix, 96 leaves : ill. ; 30 cm. cuhk:323799 http://library.cuhk.edu.hk/record=b5895978 eng chi Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) http://repository.lib.cuhk.edu.hk/en/islandora/object/cuhk%3A323799/datastream/TN/view/Secure%20execution%20of%20mobile%20agents%20on%20open%20networks%20using%20cooperative%20agents.jpghttp://repository.lib.cuhk.edu.hk/en/item/cuhk-323799