TY - GEN
T1 - Barrier slicing for remote software trusting
AU - Ceccato, Mariano
AU - Preda, Mila Dalla
AU - Nagra, Jasvir
AU - Collberg, Christian
AU - Tonella, Paolo
PY - 2007/12/1
Y1 - 2007/12/1
N2 - Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is replicated, we propose to use barrier slicing. We show the feasibility of our approach on a case study. Our results indicate that a barrier slice is significantly smaller than the corresponding backward slice while providing the same level of protection.
AB - Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the client code, based on the replication of a portion of the client on the server. To minimize the size of the code that is replicated, we propose to use barrier slicing. We show the feasibility of our approach on a case study. Our results indicate that a barrier slice is significantly smaller than the corresponding backward slice while providing the same level of protection.
UR - http://www.scopus.com/inward/record.url?scp=47749090850&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=47749090850&partnerID=8YFLogxK
U2 - 10.1109/SCAM.2007.27
DO - 10.1109/SCAM.2007.27
M3 - Conference contribution
AN - SCOPUS:47749090850
SN - 0769528805
SN - 9780769528809
T3 - SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation
SP - 27
EP - 36
BT - SCAM 2007 - Proceedings 7th IEEE International Working Conference on Source Code Analysis and Manipulation
T2 - 7th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2007
Y2 - 30 September 2007 through 1 October 2007
ER -