Nothing Special   »   [go: up one dir, main page]

Skip to main content

Higher Dependability and Security for Mobile Applications

  • Conference paper
Security in Pervasive Computing (SPC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3934))

Included in the following conference series:

  • 659 Accesses

Abstract

In this paper, we are concerned with the detection software faults and tampering of the mobile application as well as the mobile device theft. We want to disable mobile device cryptographically once either of these problems are detected. Basically the device needs to receive a new cryptographic key after each pre-set period of time in order to continue function. The mobile application execution integrity is checked by the authority when deciding whether or not to give out a new key. The detection can be done via a run-time result checking when the device connects to the authority. The authority can also proactively examine whether or not software tampering is happening. This paper will show approaches that each standalone can improve the dependability and security of a mobile application. We will show how these approaches can work together seamlessly to form a stronger scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Steven Fritzinger and Marianne Mueller. Java Security (1996)

    Google Scholar 

  2. Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.: Efficient software-based fault isolation. In: Proceedings of the ACM SIGCOMM 1996 symposium (1996)

    Google Scholar 

  3. Necula, G.: Proof Carrying Code. In: Proceedings of the Twenty Fourth Annual Symposium on Principles of Programming Languages (1997)

    Google Scholar 

  4. Libes, D.: Obfuscated C and other mysteries. Wiley, Chichester (1993)

    Google Scholar 

  5. Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. Mobile agents and Security, pp. 44–60 (1998)

    Google Scholar 

  6. Vigna, G.: Cryptographic traces for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 137–153. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Hohl, F.: Time limited blackbox security: protecting mobile agents from malicous hosts. Mobile agents and security, pp. 92–113. Springer, Heidelberg (1998)

    Google Scholar 

  8. Denning, D.: An intrusion detection model. IEEE Transactions on Sofwtare engineering, vol. SE SE-13(2), 222–232 (1987)

    Article  Google Scholar 

  9. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptograghy. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  10. Jin, H., Lotspiech, J.: Proactive software tampering detection. In: Proceeding of ISC (2003)

    Google Scholar 

  11. Sullivan, G.F., Masson, G.M.: Using certification trails to achieve software fault tolerance. In: Digest of the 1990 Fault Tolerant Computing Symposium, pp. 423–431. IEEE Computer Society Press, Los Alamitos (1990)

    Google Scholar 

  12. Avizienis, A.: The N-version approach to fault tolerant software. IEEE Trans. on Software Engineering 11, 1491–1501 (1985)

    Article  Google Scholar 

  13. Randell, B.: System structure for software fault tolerance. IEEE Trans. on Software Engineering 1, 220–232 (1975)

    Article  Google Scholar 

  14. Huang, K.-H., Abraham, J.: Algorithm-based fault tolerance for matrix operations. IEEE Trans. on Computers C-33, 518–529 (1984)

    Article  MATH  Google Scholar 

  15. Blum, M., Kannan, S.: Designing programs that check their work. In: Proceedings of the 1989 ACM Symposium on Theory of Computing, pp. 86–97. ACM Press, New York (1989)

    Google Scholar 

  16. Lawler, E.L., Lenstra, J.K., Rinnooy Kan, A.H.G., Shmoys, D.B.: The Traveling Salesman Problem. John Wiley and Sons Ltd., Chichester (1985)

    MATH  Google Scholar 

  17. Chess, D., Grosof, B., Harrison, C., Levine, D., Paris, C., Tsudik, G.: ”Itinerant Agents for Mobile Computing”, Technical report, IBM T.J.Watson Research Center (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, H. (2006). Higher Dependability and Security for Mobile Applications. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734666_8

Download citation

  • DOI: https://doi.org/10.1007/11734666_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33376-0

  • Online ISBN: 978-3-540-33377-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics