DocumentCode :
2119590
Title :
Substitution Encryption Algorithm Study for Embedded Mobile Code Protection
Author :
JingDe, Hu ; Gang, Shi
Author_Institution :
Chengdu Neusoft Inst. of Inf., Northeastern Univ., Chengdu
fYear :
2009
fDate :
27-28 Feb. 2009
Firstpage :
645
Lastpage :
649
Abstract :
Protecting against software attacks is becoming a major concern in embedded systems since many of them have more and more functionality added. In this paper, an obfuscation-based approach for providing security of programming a remote embedded Java device is proposed. The basic idea of the proposed approach is that the programming system and the authorized embedded node exchange a Java bytecode substitution table using standard encryption techniques.
Keywords :
Java; authorisation; cryptography; embedded systems; mobile computing; Java bytecode substitution table; authorized embedded node; embedded mobile code protection; obfuscation-based approach; programming security; remote embedded Java device; software attack protection; substitution encryption algorithm; Authentication; Communication system software; Cryptography; Data security; Embedded software; Embedded system; Frequency; Information security; Java; Protection; algorithm; embedded; encryption; java; mobile code;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Software and Networks, 2009. ICCSN '09. International Conference on
Conference_Location :
Macau
Print_ISBN :
978-0-7695-3522-7
Type :
conf
DOI :
10.1109/ICCSN.2009.46
Filename :
5076933
Link To Document :
بازگشت