2006 IEEE International Multitopic Conference 2006
DOI: 10.1109/inmic.2006.358182
|View full text |Cite
|
Sign up to set email alerts
|

Notice of Violation of IEEE Publication Principles - Securing Java-Based Mobile Agents through Byte Code Obfuscation Techniques

Abstract: Mobile agents have the ability to relocate computation and then carry communication with their peers locally. The design and implementation of mechanism to relocate computations requires a careful assessment of security issues. If these issues are not addressed properly, mobile agent technology cannot be used to implement real-world applications. To address such issues this paper proposes two code obfuscation techniques [1] for Java-based mobile agents that are compiled into a platform independent byte code fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
(13 reference statements)
0
2
0
Order By: Relevance
“…In [18], the authors obfuscate the Java byte code through identifier renaming in order to protect the Java-based mobile agents. It is illustrated that through removing the name of the variables and methods the decompiJed code contains numbers of syntax errors.…”
Section: Related Workmentioning
confidence: 99%
“…In [18], the authors obfuscate the Java byte code through identifier renaming in order to protect the Java-based mobile agents. It is illustrated that through removing the name of the variables and methods the decompiJed code contains numbers of syntax errors.…”
Section: Related Workmentioning
confidence: 99%
“…Obfuscation techniques are recommended to be used in order to obtain various versions of the same task and thus to provide the mobile agent several equivalent behaviors that generate the same result. A more recent study of this technique can be found in [16].…”
Section: Obfuscation Techniquesmentioning
confidence: 99%