首页> 外文学位 >Enhanced security for mobile agent systems.
【24h】

Enhanced security for mobile agent systems.

机译:增强了移动代理系统的安全性。

获取原文
获取原文并翻译 | 示例

摘要

Mobile agents are an application design scheme for distributed systems that combine mobile code principles with software agents. Mobile computing emerged over the last decade with a vision for code that changes its execution location---moving from platform to platform in a heterogeneous network carrying an embodied, updatable state. Agents are software processes that act on a user's behalf, perform particular functions autonomously, and interact with their environment to accomplish their goals. We consider in this thesis historical mobile agent security research while also gauging current trends.; Program mobility and autonomy are ultimate distributed computing expressions---programmers can view the network as a seamless canvas for application development. Disconnected host operations give a key advantage to mobile agents; however, researchers agree that protecting a stand-alone autonomous mobile agent with software-only approaches remains difficult. In this thesis, we produce several results that enhance mobile agent security and provide generalized code protection. We propose and define several novel techniques that protect mobile agents in ubiquitous environments and that solve practical problems in the program obfuscation field. We contribute to the field in the following ways:; Generalized black box program protection. We provide a novel technique for hiding a candidate program's input/output relationships by using a data encryption padding technique. This method provides general program/circuit protection and relies on the semantic security strength found in common data encryption ciphers. Analyzing the black box relations for such protected programs cannot reproduce the original program's input/output mapping.; Generalized white box program protection. We semantically protect the white-box source code/gate structure information for a relevant program class defined by bounded input size. By using simple Boolean canonical circuit forms, we create an obfuscation technique that effectively hides all information regarding the source code or circuit gate structure.; Embedded-key program protection. Leveraging our white-box results, we demonstrate how to embed an encryption key in programs that have small input size with measurable security. This technique gives foundations for solving the classic computer security problem regarding how transform any private-key cryptosystem into a public-key cryptosystem.; Analyzing mobile code protection schemes for code privacy. The Virtual Black Box (VBB) has been a theoretical foundation for understanding obfuscation strength for some time. We consider programmatic intent protection for mobile agents and pose a new model for obfuscated code security based on random programs.; Tamperproofing mobile code. We lay foundations for a new code protection methodology for mobile agents based on techniques used in the data encryption field. Specifically, we employ circuit encryption techniques that use combined sub-circuit permutation and substitution. As a result, we appeal to indistinguishability notions for circuits drawn uniformly from large sets and establish properties for obfuscators that provide intent protection based on randomization.; Trust framework for mobile agents. Security tends to be Boolean and rigid in its application. Mobile agents in unknown and ubiquitous environments need a flexible security model that accounts for the unique challenges they face. We develop a novel framework to capture principles and trust relationships specific to the mobile agent paradigm. Our framework fills in the shortfall gap in current trust frameworks that attempt to deal with agents and mobility.; Application security models. Initial trust levels between mobile agent principals depend on the application security model. Application designers can provide initial trust conditions to characterize the mobile execution environment; we seed a mobile interaction trust database with these conditions. We defi
机译:移动代理是将移动代码原理与软件代理相结合的分布式系统的应用程序设计方案。在过去的十年中,移动计算以改变其执行位置的代码的愿景出现-在异构网络中从一个平台到另一个平台,并带有一种可实现的可更新状态。代理是代表用户执行,自主执行特定功能并与环境交互以实现其目标的软件过程。在本文中,我们考虑了历史悠久的移动代理安全性研究,同时也掌握了当前的趋势。程序移动性和自治性是最终的分布式计算表达方式-程序员可以将网络视为用于应用程序开发的无缝画布。断开连接的主机操作为移动代理提供了关键优势。但是,研究人员一致认为,使用纯软件方法保护独立的自主移动代理仍然很困难。在本文中,我们得出了一些可以增强移动代理安全性并提供通用代码保护的结果。我们提出并定义了几种新颖的技术,这些技术可在无处不在的环境中保护移动代理并解决程序混淆领域中的实际问题。我们通过以下方式为该领域做出贡献:通用黑盒程序保护。我们提供了一种通过使用数据加密填充技术来隐藏候选程序的输入/输出关系的新颖技术。这种方法提供了通用的程序/电路保护,并依赖于常见数据加密密码中的语义安全强度。分析此类受保护程序的黑盒关系无法重现原始程序的输入/输出映射。通用白盒程序保护。我们在语义上保护由有界输入大小定义的相关程序类的白盒源代码/门结构信息。通过使用简单的布尔规范电路形式,我们创建了一种混淆技术,可以有效地隐藏有关源代码或电路门结构的所有信息。嵌入式密钥程序保护。利用我们的白盒测试结果,我们演示了如何将加密密钥嵌入具有可测量安全性的小输入程序中。该技术为解决经典的计算机安全问题奠定了基础,该问题涉及如何将任何私钥密码系统转换为公钥密码系统。分析移动代码保护方案以获得代码隐私。虚拟黑匣子(VBB)一直是了解混淆强度的理论基础。我们考虑了针对移动代理的程序意图保护,并为基于随机程序的混淆代码安全性提出了新模型。防篡改移动代码。我们基于数据加密领域中使用的技术,为移动代理的新代码保护方法奠定了基础。具体来说,我们采用结合了子电路置换和替换的电路加密技术。结果,我们呼吁从大集合中统一抽取电路的不可区分性概念,并为混淆器建立属性,以基于随机性提供意图保护。移动代理的信任框架。在其应用程序中,安全性往往是布尔值和严格的。未知和无处不在的环境中的移动代理都需要一种灵活的安全模型,以解决他们面临的独特挑战。我们开发了一个新颖的框架来捕获特定于移动代理范例的原则和信任关系。我们的框架弥补了当前试图处理代理人和流动性的信任框架中的缺口。应用程序安全模型。移动代理主体之间的初始信任级别取决于应用程序安全模型。应用程序设计人员可以提供初始信任条件来表征移动执行环境。我们在这些条件下播种了移动交互信任数据库。我们反抗

著录项

  • 作者

    McDonald, Jeffrey T.;

  • 作者单位

    The Florida State University.;

  • 授予单位 The Florida State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 251 p.
  • 总页数 251
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号