Barrier slicing for remote software trusting

Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian S Collberg, Paolo Tonella

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is replicated, we propose to use barrier slicing. We show the feasibility of our approach on a case study. Our results indicate that a barrier slice is significantly smaller than the corresponding backward slice while providing the same level of protection.

Original languageEnglish (US)
Title of host publicationSCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation
Pages27-36
Number of pages10
DOIs
StatePublished - 2007
Event7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007 - Paris, France
Duration: Sep 30 2007Oct 1 2007

Other

Other7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007
CountryFrance
CityParis
Period9/30/0710/1/07

Fingerprint

Servers

ASJC Scopus subject areas

  • Computer Science Applications
  • Software

Cite this

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C. S., & Tonella, P. (2007). Barrier slicing for remote software trusting. In SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation (pp. 27-36). [4362895] https://doi.org/10.1109/SCAM.2007.27

Barrier slicing for remote software trusting. / Ceccato, Mariano; Preda, Mila Dalla; Nagra, Jasvir; Collberg, Christian S; Tonella, Paolo.

SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. 2007. p. 27-36 4362895.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ceccato, M, Preda, MD, Nagra, J, Collberg, CS & Tonella, P 2007, Barrier slicing for remote software trusting. in SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation., 4362895, pp. 27-36, 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007, Paris, France, 9/30/07. https://doi.org/10.1109/SCAM.2007.27
Ceccato M, Preda MD, Nagra J, Collberg CS, Tonella P. Barrier slicing for remote software trusting. In SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. 2007. p. 27-36. 4362895 https://doi.org/10.1109/SCAM.2007.27
Ceccato, Mariano ; Preda, Mila Dalla ; Nagra, Jasvir ; Collberg, Christian S ; Tonella, Paolo. / Barrier slicing for remote software trusting. SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation. 2007. pp. 27-36
@inproceedings{19069b7d664240a999dec27a54a754c8,
title = "Barrier slicing for remote software trusting",
abstract = "Remote trusting aims at verifying the {"}healthy{"} execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is replicated, we propose to use barrier slicing. We show the feasibility of our approach on a case study. Our results indicate that a barrier slice is significantly smaller than the corresponding backward slice while providing the same level of protection.",
author = "Mariano Ceccato and Preda, {Mila Dalla} and Jasvir Nagra and Collberg, {Christian S} and Paolo Tonella",
year = "2007",
doi = "10.1109/SCAM.2007.27",
language = "English (US)",
isbn = "0769528805",
pages = "27--36",
booktitle = "SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation",

}

TY - GEN

T1 - Barrier slicing for remote software trusting

AU - Ceccato, Mariano

AU - Preda, Mila Dalla

AU - Nagra, Jasvir

AU - Collberg, Christian S

AU - Tonella, Paolo

PY - 2007

Y1 - 2007

N2 - Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is replicated, we propose to use barrier slicing. We show the feasibility of our approach on a case study. Our results indicate that a barrier slice is significantly smaller than the corresponding backward slice while providing the same level of protection.

AB - Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is replicated, we propose to use barrier slicing. We show the feasibility of our approach on a case study. Our results indicate that a barrier slice is significantly smaller than the corresponding backward slice while providing the same level of protection.

UR - http://www.scopus.com/inward/record.url?scp=47749090850&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=47749090850&partnerID=8YFLogxK

U2 - 10.1109/SCAM.2007.27

DO - 10.1109/SCAM.2007.27

M3 - Conference contribution

AN - SCOPUS:47749090850

SN - 0769528805

SN - 9780769528809

SP - 27

EP - 36

BT - SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation

ER -