Abstract
Securingthe mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must be addressed. In a second step we list the possible techniques that can be used for that purpose. In a third step, we build a framework based on the analysis done. This framework has been implemented to show its validity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
C. Cifuentes. Reverse Compilation Techniques. PhD thesis, Queensland University of Technology, July 1994.
C. Collbergand C. Thomborson. Software Watermarking: Models and Dynamic Embeddings. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), January 1999.
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Science. The University of Auckland, July 1997.
Intel Corporation and Microsoft Corporation. PC 99 System Design Guide. http://www.pcdesguide.org/pc99/, 1999.
D. Dean. DIVX, DPRM (Digital Property Rights Management) and SDMI (Secure Digital Music Initiative). In DIMACS Workshop on Management of Digital Intellectual Property, Piscataway, New Jersey, USA, April 2000. DIMACS.
Premkunar T. Devanbu and Stuart Stubblebine. Software Engineering for Security: a Roadmap. In The Future of Software Engineering. Special volume of the proceedings of the 22nd International Conference on Software Engineering-ICSE 2000, June 2000.
N. Johnson and S. Katzenbeisser. A survey of steganographic tehcniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 3.
S. Katzenbeisser and F. Petitcolas. Information Hiding: techniques for steganography and digital watermarking. Computer Security Series. Artech House, 2000.
Paul Kocher. TimingA ttack on Implementations of Diffie-Hellman, RSA, DSS and other systems. In N. Kobliz, editor, Advances in Cryptology-CRYPTO’ 96, volume 1109 of Lectures Notes in Computer Science (LNCS), pages 104–113. Springer-Verlag, 1996.
Paul Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In M. Wiener, editor, Advances in Cryptology-CRYPTO’ 99, volume 1666 of Lectures Notes in Computer Science (LNCS), pages 388–397. Springer-Verlag, 1999.
Oliver Kommerling and Markus G. Kuhn. Design principles for tamper-resistant smartcard processors. In Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’ 99), pages 9–20. USENIX Association, May 1999.
M. Kutter and F. Hartung. Introduction of watermaking techniques. In Information Hiding: techniques for steganography and digital watermarking [10], chapter 5.
G. Nolan. Decompile once, run anywhere. Web Techniques Magazine, 2(9), September 1997.
F. Petitcolas, R. Anderson, and M. Kuhn. Information hiding-a survey. Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062–1078, July 1999.
T. Proebsting and S. Watterson. Krakatoa: Decompilation in JAVA (Does Bytecode Reveal Source?). In USENIX Conference on Object-Oriented Technologies and Systems (COOTS’ 97), June 1997.
Julien P. Stern, Gaël Hachez, François Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In A. Pfitzmann, editor, Information Hiding’ 99, volume 1768 of Lectures Notes in Computer Science (LNCS), pages 368–378, Dresden, Germany, 2000. Springer-Verlag.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hachez, G., Den Hollander, L., Jalali, M., Jean-Jacques, Q., Vasserot, C. (2000). Towards a Practical Secure Framework for Mobile Code Commerce. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_13
Download citation
DOI: https://doi.org/10.1007/3-540-44456-4_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41416-2
Online ISBN: 978-3-540-44456-5
eBook Packages: Springer Book Archive