Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Towards a Practical Secure Framework for Mobile Code Commerce

  • Conference paper
  • First Online:
Information Security (ISW 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1975))

Included in the following conference series:

Abstract

Securingthe mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must be addressed. In a second step we list the possible techniques that can be used for that purpose. In a third step, we build a framework based on the analysis done. This framework has been implemented to show its validity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, July 1994.

    Google Scholar 

  2. C. Collbergand C. Thomborson. Software Watermarking: Models and Dynamic Embeddings. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), January 1999.

    Google Scholar 

  3. C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science. The University of Auckland, July 1997.

    Google Scholar 

  4. Intel Corporation and Microsoft Corporation. PC 99 System Design Guide. http://www.pcdesguide.org/pc99/, 1999.

  5. D. Dean. DIVX, DPRM (Digital Property Rights Management) and SDMI (Secure Digital Music Initiative). In DIMACS Workshop on Management of Digital Intellectual Property, Piscataway, New Jersey, USA, April 2000. DIMACS.

    Google Scholar 

  6. Premkunar T. Devanbu and Stuart Stubblebine. Software Engineering for Security: a Roadmap. In The Future of Software Engineering. Special volume of the proceedings of the 22nd International Conference on Software Engineering-ICSE 2000, June 2000.

    Google Scholar 

  7. N. Johnson and S. Katzenbeisser. A survey of steganographic tehcniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 3.

    Google Scholar 

  8. S. Katzenbeisser and F. Petitcolas. Information Hiding: techniques for steganography and digital watermarking. Computer Security Series. Artech House, 2000.

    Google Scholar 

  9. Paul Kocher. TimingA ttack on Implementations of Diffie-Hellman, RSA, DSS and other systems. In N. Kobliz, editor, Advances in Cryptology-CRYPTO’ 96, volume 1109 of Lectures Notes in Computer Science (LNCS), pages 104–113. Springer-Verlag, 1996.

    Chapter  Google Scholar 

  10. Paul Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO’ 99, volume 1666 of Lectures Notes in Computer Science (LNCS), pages 388–397. Springer-Verlag, 1999.

    Google Scholar 

  11. Oliver Kommerling and Markus G. Kuhn. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’ 99), pages 9–20. USENIX Association, May 1999.

    Google Scholar 

  12. M. Kutter and F. Hartung. Introduction of watermaking techniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 5.

    Google Scholar 

  13. G. Nolan. Decompile once, run anywhere. Web Techniques Magazine, 2(9), September 1997.

    Google Scholar 

  14. F. Petitcolas, R. Anderson, and M. Kuhn. Information hiding-a survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062–1078, July 1999.

    Google Scholar 

  15. T. Proebsting and S. Watterson. Krakatoa: Decompilation in JAVA (Does Bytecode Reveal Source?). In USENIX Conference on Object-Oriented Technologies and Systems (COOTS’ 97), June 1997.

    Google Scholar 

  16. Julien P. Stern, Gaël Hachez, François Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In A. Pfitzmann, editor, Information Hiding’ 99, volume 1768 of Lectures Notes in Computer Science (LNCS), pages 368–378, Dresden, Germany, 2000. Springer-Verlag.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hachez, G., Den Hollander, L., Jalali, M., Jean-Jacques, Q., Vasserot, C. (2000). Towards a Practical Secure Framework for Mobile Code Commerce. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_13

Download citation

  • DOI: https://doi.org/10.1007/3-540-44456-4_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41416-2

  • Online ISBN: 978-3-540-44456-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics