In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities that may arise (such as authentication and authorization), guaranteeing the integrity of the client code is one of the most difficult to address. This security vulnerability is an instance of the malicious host problem, where an adversary in control of the client`s host environment tries to tamper with the client code. We propose a novel client replacement strategy to counter the malicious host problem. The client code is periodically replaced by new orthogonal clients, such that their combination with the server is functionally-equivalent to the original client-ser...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
In a typical client-server scenario, a trusted server provides valuable services to a client, which...
ABSTRACT In a typical client-server scenario, a trusted server provides valuable services to a clien...
In a typical client-server scenario, a server provides valuable services to client applications that...
Remote trusting aims at verifying the ``healthy'' execution of a program running on an untrusted cl...
Remote trusting aims at verifying the healthy execu-tion of a program running on an untrusted clien...
International audienceHow to trust an application executed in a remote untrusted client? Indeed, in ...
When a piece of software is loaded on an untrusted machine it can be analyzed by an attacker who cou...
Given a client/server application, how can the server entrust the integrity of the remote client, al...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
We present a novel technique to secure the execution of a processor against the execution of malicio...
Abstract. Denial of service by server resource exhaustion has become a majorsecurity threat in open ...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
In a typical client-server scenario, a trusted server provides valuable services to a client, which...
ABSTRACT In a typical client-server scenario, a trusted server provides valuable services to a clien...
In a typical client-server scenario, a server provides valuable services to client applications that...
Remote trusting aims at verifying the ``healthy'' execution of a program running on an untrusted cl...
Remote trusting aims at verifying the healthy execu-tion of a program running on an untrusted clien...
International audienceHow to trust an application executed in a remote untrusted client? Indeed, in ...
When a piece of software is loaded on an untrusted machine it can be analyzed by an attacker who cou...
Given a client/server application, how can the server entrust the integrity of the remote client, al...
Software protection aims at safeguarding assets embedded in software by preventing and delaying reve...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
We present a novel technique to secure the execution of a processor against the execution of malicio...
Abstract. Denial of service by server resource exhaustion has become a majorsecurity threat in open ...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
The remote trust problem aims to address the issue of verifying the execution of a program running o...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...