Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007) 2007
DOI: 10.1109/scam.2007.4362895
|View full text |Cite
|
Sign up to set email alerts
|

Barrier Slicing for Remote Software Trusting

Abstract: Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
24
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 11 publications
(24 citation statements)
references
References 6 publications
0
24
0
Order By: Relevance
“…This represents a well-known limitation of program slicing. However, previous studies (Ceccato et al 2007;Krinke 2003Krinke , 2004 report that barrier slices are sensibly smaller than traditional backward slices, which reduces the conservativity issue for our protection technique.…”
Section: Barrier Slicing For Remote Software Entrustingmentioning
confidence: 93%
See 4 more Smart Citations
“…This represents a well-known limitation of program slicing. However, previous studies (Ceccato et al 2007;Krinke 2003Krinke , 2004 report that barrier slices are sensibly smaller than traditional backward slices, which reduces the conservativity issue for our protection technique.…”
Section: Barrier Slicing For Remote Software Entrustingmentioning
confidence: 93%
“…The barrier slicing solution proposed in (Ceccato et al 2007) uses a completely different approach, in fact it does not rely on any hardware or any precise time computation, which is hard to achieve in the presence of non-collaborative users. The idea here is to use barrier slicing and program transformations to ensure that the critical portion of the client computation that cannot be protected through assertions is executed on the server.…”
Section: Existing Solutionsmentioning
confidence: 99%
See 3 more Smart Citations