Transporting mobile code with internal authentication and tamper detection

被引:0
|
作者
Marvel, LM [1 ]
Baur, EH [1 ]
Hartwig, GW [1 ]
机构
[1] USA, Res Lab, Comp & Informat Sci Directorate, Comp & Commun Sci Div, Aberdeen Proving Ground, MD 21005 USA
关键词
mobile code; Internet; security; authentication;
D O I
10.1117/12.438307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile code opens a world of possibilities for Battlespace digitization. However, due to security issues associated with transporting code over such networks, mobile code in the battlefield may present serious risks. Attackers may attempt to thwart the end-user's mission by manipulating or destroying code prior to its final destination. To combat such acts, we propose an authentication method that can reside on any Internet server/client without the typical constraints that exist for firewalls and certificates. Our method consists of the construction of a digital signature at the server based on the characteristics of the mobile code itself. This signature, or mark, is then embedded within the code in a hidden manner using steganographic methods. Upon receipt of the mobile code, the client can use the key to extract the embedded mark and regenerate a mark from the received code. The two marks are compared to verify the integrity of the code and the authenticity of the sender. This technique is implemented for HTML code and the effectiveness of tamper detection is demonstrated. Mobile code authentication techniques, such as this, can provide the security necessary to permit the exploitation of this powerful computing medium on the networked battlefield.
引用
收藏
页码:108 / 115
页数:8
相关论文
共 50 条
  • [41] Liveness Detection for Biometric Authentication in Mobile Applications
    Akhtar, Zahid
    Michelon, Christian
    Foresti, Gian Luca
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [42] QR Code Authentication with Embedded Message Authentication Code
    Changsheng Chen
    Mobile Networks and Applications, 2017, 22 : 383 - 394
  • [43] QR Code Authentication with Embedded Message Authentication Code
    Chen, Changsheng
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (03): : 383 - 394
  • [44] A new hierarchical digital image authentication method for tamper detection and recovery against microdotting attacks
    Chen, Tzungher
    Chiu, Chunwei
    Journal of Computational Information Systems, 2010, 6 (06): : 1705 - 1715
  • [45] An efficient mobile code authentication scheme that permits overlapping of execution and downloading
    Jeong, JY
    PArk, Y
    Cho, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (05): : 1077 - 1081
  • [46] FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization
    Costa, Gabriele
    Gasti, Paolo
    Merlo, Alessio
    Yu, Shung-Hsi
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 389 - 400
  • [47] A dual-tamper-detection method for digital image authentication and content self-recovery
    Liu, Tong
    Yuan, Xiaochen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (19) : 29805 - 29826
  • [48] A HASH-BASED IMAGE CONTENT AUTHENTICATION SCHEME FOR TAMPER DETECTION USING COMPRESSIVE SENSING
    Mo, Zhi-Wei
    Zhu, Yue-Sheng
    Liu, Zhen
    2014 11TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2014, : 244 - 248
  • [49] A watermarking scheme for source authentication, ownership identification, tamper detection and restoration for color medical images
    Laishram, Diana
    Singh, Khumanthem Manglem
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 23815 - 23875
  • [50] A dual-tamper-detection method for digital image authentication and content self-recovery
    Tong Liu
    Xiaochen Yuan
    Multimedia Tools and Applications, 2021, 80 : 29805 - 29826