Abstract
Absolute protection of mobile agents from attacks by malicious hosts is an open research problem. We propose a software based paradigm whereby an agent is protected from various static and dynamic attacks from a malicious host of an unknown hardware configuration, for a specific period of time. This time interval is computed by restricting the maximum resources that may be available to the adversary and the time complexity of the critical static and dynamic attacks that it may launch. We employ the technique of oblivious hashing (OH) using overlapped instructions [1], with multilevel pointer aliasing to thwart static analysis and instant code modifications. The host is required to obtain the aggregate OH value of the whole agent by executing it in an unobtrusive environment and to send it back to the agent originator within the specified time interval. To provide unobtrusive environment, we employ external timing analysis to detect major dynamic attack tools such as debuggers, virtual machines and emulators. Experimental results are presented that demonstrate the viability of the timing analysis mechanism in detecting dynamic attack tools on a range of Intel based machines. © 2009 IEEE.
Original language | English |
---|---|
Title of host publication | Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009|Proc. - IEEE Int. Conf. Comput. Sci. Eng., CSE |
Pages | 837-846 |
Number of pages | 9 |
Volume | 2 |
DOIs | |
Publication status | Published - 2009 |
Event | 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009 - Vancouver, BC Duration: 1 Jul 2009 → … |
Conference
Conference | 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009 |
---|---|
City | Vancouver, BC |
Period | 1/07/09 → … |
Keywords
- Intel based machines
- debuggers
- dynamic attacks
- emulators
- external timing analysis
- instant code modifications
- malicious host
- mobile agents
- multilevel pointer aliasing
- oblivious hashing
- overlapped instructions
- software based approach
- static analysis
- static attacks
- time complexity
- trusted agent execution
- virtual machines
- computational complexity
- cryptography
- multi-agent systems
- program debugging
- program diagnostics