A protocol to detect malicious hosts attacks by using reference states

Fritz Hohl
To protect mobile agents from attacks by their execution environments, or hosts, one class of protection mechanisms uses 'reference states' to detect modification attacks. Reference states are agent states that have been produced by non-attacking, or reference hosts. This paper presents a new protocol using reference states by modifying an existing approach, called 'traces'. In contrast to the original approach, this new protocol offers a model, where the execution on one host is checked unconditionally...
This data repository is not currently reporting usage information. For information on how your repository can submit usage information, please see our documentation.