Abstract
Proliferation of distributed computing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remote hosts. This paper proposes and evaluates a solution to the latter problem for applications based on linear computations that involve scalar as well as array arithmetic. We demonstrate that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.
This work is supported in part by NSF Career Award 0093082 and a grant from the GSRC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abadi, M., Feigenbaum, J.: Secure circuit evaluation. Journal of Cryptology 2(1), 112 (1990)
Amarasinghe, S.P., Anderson, J.M., Wilson, C.S., Liao, S.-W., Murphy, B.R., French, R.S., Lam, M.S., Hall, M.W.: Multiprocessors from a Software Perspective IEEE Micro, pp. 52–61 (June 1996)
Bremler-Barr, A., Levy, H.: Spoofing prevention method. In: Proc. of INFOCOM 2005, vol. 1, pp. 536–547 (2005)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proc. of the 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (May 1987)
Li, C., Potkonjak, M., Mangione-Smith, W.H.: MediaBench: A tool for evaluating and synthesizing multimedia and communication systems. In: Proc. of the International Symposium on Microarchitecture (1997)
Loureiro, S., Bussard, L., Roudier, Y.: Extending tamper-proof hardware security to untrusted execution environments. In: Proc. of CARDIS (2002)
Loureiro, S., Molva, R.: Function hiding based on error correcting codes. In: Proc. of the International Workshop on Cryptographic Techniques and Electronic Commerce, pp. 92–98 (1999)
Sander, T., Tschudin, C.F.: Towards mobile cryptography. In: Proc. of the 1998 IEEE Symposium on Security and Privacy, pp. 215–224 (1998)
Tripathi, A., Karnik, N.: A Security Architecture for Mobile Agents in Ajanta. In: Proc. of the International Conference on Distributed Computing Systems (2000)
Sander, T., Tschudin, C.: On software protection via function hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 111. Springer, Heidelberg (1998)
Wolfe, M.: High Performance Compilers for Parallel Computing. Addison-Wesley Publishing Company, Reading (1996)
Yao, A.C.: Protocols for secure computations. In: Proc. of the IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)
Yao, A.C.: How to generate and exchange secrets. In: Wiedermann, J., Gruska, J., Rovan, B. (eds.) MFCS 1986. LNCS, vol. 233, pp. 162–167. Springer, Heidelberg (1986)
Yee, B.: A sanctuary for mobile agents. Technical Report CS97-537, Department of Computer Science and Engineering (April 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Narayanan, S.H.K., Kandemir, M.T., Brooks, R.R., Kolcu, I. (2006). Secure Execution of Computations in Untrusted Hosts. In: Pinho, L.M., González Harbour, M. (eds) Reliable Software Technologies – Ada-Europe 2006. Ada-Europe 2006. Lecture Notes in Computer Science, vol 4006. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11767077_9
Download citation
DOI: https://doi.org/10.1007/11767077_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34663-0
Online ISBN: 978-3-540-34664-7
eBook Packages: Computer ScienceComputer Science (R0)