Transporting mobile code with internal authentication and tamper detection

被引:0
|
作者
Marvel, LM [1 ]
Baur, EH [1 ]
Hartwig, GW [1 ]
机构
[1] USA, Res Lab, Comp & Informat Sci Directorate, Comp & Commun Sci Div, Aberdeen Proving Ground, MD 21005 USA
关键词
mobile code; Internet; security; authentication;
D O I
10.1117/12.438307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile code opens a world of possibilities for Battlespace digitization. However, due to security issues associated with transporting code over such networks, mobile code in the battlefield may present serious risks. Attackers may attempt to thwart the end-user's mission by manipulating or destroying code prior to its final destination. To combat such acts, we propose an authentication method that can reside on any Internet server/client without the typical constraints that exist for firewalls and certificates. Our method consists of the construction of a digital signature at the server based on the characteristics of the mobile code itself. This signature, or mark, is then embedded within the code in a hidden manner using steganographic methods. Upon receipt of the mobile code, the client can use the key to extract the embedded mark and regenerate a mark from the received code. The two marks are compared to verify the integrity of the code and the authenticity of the sender. This technique is implemented for HTML code and the effectiveness of tamper detection is demonstrated. Mobile code authentication techniques, such as this, can provide the security necessary to permit the exploitation of this powerful computing medium on the networked battlefield.
引用
收藏
页码:108 / 115
页数:8
相关论文
共 50 条
  • [1] Image authentication scheme separating tamper detection from tamper location
    Information Engineering Institute, PLA Information Engineering University, Zhengzhou 450002, China
    Jisuanji Xuebao, 2007, 10 (1880-1888): : 1880 - 1888
  • [2] Content authentication and tamper detection in digital video
    Mobasseri, BG
    Sieffert, MJ
    Simard, RJ
    2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2000, : 458 - 461
  • [3] A secure image authentication scheme for tamper detection and recovery
    Chen, T-Y
    Hwang, M-S
    Jan, J-K
    IMAGING SCIENCE JOURNAL, 2012, 60 (04): : 219 - 233
  • [4] Video authentication and tamper detection based on cloud model
    Liang, Chang-yin
    Li, Ang
    Niu, Xia-mu
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 225 - +
  • [5] Mobile application tamper detection scheme using dynamic code injection against repackaging attacks
    Cho, Haehyun
    Bang, Jiwoong
    Ji, Myeongju
    Yi, Jeong Hyun
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3629 - 3645
  • [6] A comprehensive survey on image authentication for tamper detection with localization
    H R Chennamma
    B Madhushree
    Multimedia Tools and Applications, 2023, 82 : 1873 - 1904
  • [7] Mobile application tamper detection scheme using dynamic code injection against repackaging attacks
    Haehyun Cho
    Jiwoong Bang
    Myeongju Ji
    Jeong Hyun Yi
    The Journal of Supercomputing, 2016, 72 : 3629 - 3645
  • [8] A comprehensive survey on image authentication for tamper detection with localization
    Chennamma, H. R.
    Madhushree, B.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (02) : 1873 - 1904
  • [9] Authentication and Tamper Detection of Digital Holy Quran Images
    Kurniawan, Fajri
    Khalil, Mohammed S.
    Khan, Muhammad Khurram
    Alginahi, Yasser M.
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 291 - 296
  • [10] A framework for tamper detection marking of mobile application
    Jochen, M
    Marvel, LM
    Pollock, LL
    ISSRE 2003: 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2003, : 143 - 153