A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology
暂无分享,去创建一个
[1] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[2] Jose L. Muñoz,et al. Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts , 2003, MATA.
[3] Chen Zhi. Study of the Security in Network Management Based on Mobile Agents , 2004 .
[4] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[5] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[6] Ting-Wei Hou,et al. Three control flow obfuscation methods for Java software , 2006, IEE Proc. Softw..