{"title":"Bandwidth efficient tamper detection for distributed Java systems","authors":"M. Jochen, L. Marvel, L. Pollock","doi":"10.1109/HPCSA.2002.1019165","DOIUrl":null,"url":null,"abstract":"The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark make our system desirable in applications where low bandwidth utilization is a requirement (e.g., wireless networks and low power devices). We implemented our system in Java and evaluated its performance through an empirical study. The analysis indicates that our system detects any degree of alteration to a marked Java class file and can do so within a reasonable amount of time.","PeriodicalId":111862,"journal":{"name":"Proceedings 16th Annual International Symposium on High Performance Computing Systems and Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 16th Annual International Symposium on High Performance Computing Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HPCSA.2002.1019165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark make our system desirable in applications where low bandwidth utilization is a requirement (e.g., wireless networks and low power devices). We implemented our system in Java and evaluated its performance through an empirical study. The analysis indicates that our system detects any degree of alteration to a marked Java class file and can do so within a reasonable amount of time.