Barrier slicing for remote software trusting

Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, Christian Collberg, Paolo Tonella

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Abstract

Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is replicated, we propose to use barrier slicing. We show the feasibility of our approach on a case study. Our results indicate that a barrier slice is significantly smaller than the corresponding backward slice while providing the same level of protection.

Original languageEnglish (US)
Title of host publicationSCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation
Pages27-36
Number of pages10
DOIs
StatePublished - Dec 1 2007
Event7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007 - Paris, France
Duration: Sep 30 2007Oct 1 2007

Publication series

NameSCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation

Other

Other7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007
CountryFrance
CityParis
Period9/30/0710/1/07

    Fingerprint

ASJC Scopus subject areas

  • Computer Science Applications
  • Software

Cite this

Ceccato, M., Preda, M. D., Nagra, J., Collberg, C., & Tonella, P. (2007). Barrier slicing for remote software trusting. In SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation (pp. 27-36). [4362895] (SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation). https://doi.org/10.1109/SCAM.2007.27