Skip to main content

Secure Execution of Computations in Untrusted Hosts

  • Conference paper
Reliable Software Technologies – Ada-Europe 2006 (Ada-Europe 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4006))

Included in the following conference series:

  • 428 Accesses

Abstract

Proliferation of distributed computing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remote hosts. This paper proposes and evaluates a solution to the latter problem for applications based on linear computations that involve scalar as well as array arithmetic. We demonstrate that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.

This work is supported in part by NSF Career Award 0093082 and a grant from the GSRC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Feigenbaum, J.: Secure circuit evaluation. Journal of Cryptology 2(1), 112 (1990)

    Article  MathSciNet  Google Scholar 

  2. Amarasinghe, S.P., Anderson, J.M., Wilson, C.S., Liao, S.-W., Murphy, B.R., French, R.S., Lam, M.S., Hall, M.W.: Multiprocessors from a Software Perspective IEEE Micro, pp. 52–61 (June 1996)

    Google Scholar 

  3. Bremler-Barr, A., Levy, H.: Spoofing prevention method. In: Proc. of INFOCOM 2005, vol. 1, pp. 536–547 (2005)

    Google Scholar 

  4. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Proc. of the 19th Annual ACM Symposium on Theory of Computing, pp. 218–229 (May 1987)

    Google Scholar 

  5. Li, C., Potkonjak, M., Mangione-Smith, W.H.: MediaBench: A tool for evaluating and synthesizing multimedia and communication systems. In: Proc. of the International Symposium on Microarchitecture (1997)

    Google Scholar 

  6. Loureiro, S., Bussard, L., Roudier, Y.: Extending tamper-proof hardware security to untrusted execution environments. In: Proc. of CARDIS (2002)

    Google Scholar 

  7. Loureiro, S., Molva, R.: Function hiding based on error correcting codes. In: Proc. of the International Workshop on Cryptographic Techniques and Electronic Commerce, pp. 92–98 (1999)

    Google Scholar 

  8. Sander, T., Tschudin, C.F.: Towards mobile cryptography. In: Proc. of the 1998 IEEE Symposium on Security and Privacy, pp. 215–224 (1998)

    Google Scholar 

  9. Tripathi, A., Karnik, N.: A Security Architecture for Mobile Agents in Ajanta. In: Proc. of the International Conference on Distributed Computing Systems (2000)

    Google Scholar 

  10. Sander, T., Tschudin, C.: On software protection via function hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 111. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  11. Wolfe, M.: High Performance Compilers for Parallel Computing. Addison-Wesley Publishing Company, Reading (1996)

    MATH  Google Scholar 

  12. Yao, A.C.: Protocols for secure computations. In: Proc. of the IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)

    Google Scholar 

  13. Yao, A.C.: How to generate and exchange secrets. In: Wiedermann, J., Gruska, J., Rovan, B. (eds.) MFCS 1986. LNCS, vol. 233, pp. 162–167. Springer, Heidelberg (1986)

    Google Scholar 

  14. Yee, B.: A sanctuary for mobile agents. Technical Report CS97-537, Department of Computer Science and Engineering (April 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Narayanan, S.H.K., Kandemir, M.T., Brooks, R.R., Kolcu, I. (2006). Secure Execution of Computations in Untrusted Hosts. In: Pinho, L.M., González Harbour, M. (eds) Reliable Software Technologies – Ada-Europe 2006. Ada-Europe 2006. Lecture Notes in Computer Science, vol 4006. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11767077_9

Download citation

  • DOI: https://doi.org/10.1007/11767077_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34663-0

  • Online ISBN: 978-3-540-34664-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics