首页> 外文会议>First Asia-Pacific Conference on Intelligent Agent Technology (IAT'99), held in Hong Kong from 14~(th) to 17~(th) December 1999 >Intention spreading: an extensible theme to protect mobile agents from read attack hoisted by malicious hosts
【24h】

Intention spreading: an extensible theme to protect mobile agents from read attack hoisted by malicious hosts

机译:意图传播:可扩展的主题,可保护移动代理免受恶意主机发起的读取攻击

获取原文
获取原文并翻译 | 示例

摘要

An approach called Intention Spreading is recently proposed to protect mobile agents from read attack. Read attack helps the malicious hosts to win over other hosts in a competitive environment by analyzing the content of the mobile agents without modification of the agents' static code or the dynamic state. Intention spreading protects a mobile agent from read attack by adding noisy code to spread its original intention. There are three main types for distribution of mobile agents: source code, intermediate code and compiled native binary code. The source code category suffers the direct read attack because this category is readily readable. The remaining categories suffer a certain degree of read attack after software reverse engineering. Besides, read attack could be rather obvious in some mobile agent systems in which the system calls are monitored for host security. In this paper, the vulnerabilities of programming languages under read attack, and the inherent undesirability of system monitoring by hosts are surveyed, in the perspective of agent security. Further techniques in intention spreading are mentioned to show its implementation varieties: both the intention spreading which occurs within a mobile agent and among several collaborating mobile agents are outlined. Intention spreading is generalized as a theme to 1) complement the classical cryptography and 2) install protection codes (weapons) to the mobile agents as a promising extension.
机译:最近提出了一种名为“意图传播”的方法,以保护移动代理免受读取攻击。读取攻击通过分析移动代理的内容而无需修改代理的静态代码或动态状态,可以帮助恶意主机在竞争环境中赢得其他主机的竞争。意图传播通过添加嘈杂的代码来传播其原始意图,从而保护移动代理免受读取攻击。分发移动代理的主要类型有三种:源代码,中间代码和已编译的本机二进制代码。源代码类别遭受直接读取攻击,因为该类别易于阅读。在软件反向工程之后,其余类别遭受了一定程度的读取攻击。此外,在某些监视系统调用的主机安全性的移动代理系统中,读取攻击可能非常明显。本文从代理程序安全性的角度研究了编程语言在读取攻击下的脆弱性,以及主机对系统进行监视的固有不希望性。提到了意向传播中的其他技术以显示其实现方式的多样性:概述了在移动代理内以及在多个协作移动代理之间发生的意图传播。意向传播被概括为一个主题,以:1)补充经典的加密技术; 2)将保护代码(武器)安装到移动代理作为有希望的扩展。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号