Abid Khan, X. Niu, W. Anwar, Mansoor Ahmed, Ali Nawaz Khan
{"title":"Mobile agent watermarking (MAW): security properties and attacks revisited","authors":"Abid Khan, X. Niu, W. Anwar, Mansoor Ahmed, Ali Nawaz Khan","doi":"10.1145/1838002.1838038","DOIUrl":null,"url":null,"abstract":"Providing integrity of execution is considered as the most challenging problem in Mobile Agent System (MAs). Mobile agent watermarking (MAW) is a technique that attempts to provide integrity of execution to a mobile agent. We discuss the attacks against MAW technique and how the security properties for MAs data integrity are fulfilled. We try to model the behavior of a malicious host by launching a series of passive attacks against mobile agent and then see to what extent the security properties for mobile agent can be achieved. The experimental results suggest that MAW framework can be used to protect the computations results of mobile agents","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1838002.1838038","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Providing integrity of execution is considered as the most challenging problem in Mobile Agent System (MAs). Mobile agent watermarking (MAW) is a technique that attempts to provide integrity of execution to a mobile agent. We discuss the attacks against MAW technique and how the security properties for MAs data integrity are fulfilled. We try to model the behavior of a malicious host by launching a series of passive attacks against mobile agent and then see to what extent the security properties for mobile agent can be achieved. The experimental results suggest that MAW framework can be used to protect the computations results of mobile agents