Secure execution of computations in untrusted hosts

S. H.K. Narayanan, M. T. Kandemir, R. R. Brooks, I. Kolcu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Proliferation of distributed computing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remote hosts. This paper proposes and evaluates a solution to the latter problem for applications based on linear computations that involve scalar as well as array arithmetic. We demonstrate that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.

Original languageEnglish (US)
Title of host publicationReliable Software Technologies - Ada-Europe 2006 - 11th Ada-Europe International Conference on Reliable Software Technologies, Proceedings
PublisherSpringer Verlag
Pages106-118
Number of pages13
ISBN (Print)3540346635, 9783540346630
DOIs
StatePublished - Jan 1 2006
Event11th Ada-Europe International Conference on Reliable Software Technologies - Porto, Portugal
Duration: Jun 5 2006Jun 9 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4006 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th Ada-Europe International Conference on Reliable Software Technologies
CountryPortugal
CityPorto
Period6/5/066/9/06

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Narayanan, S. H. K., Kandemir, M. T., Brooks, R. R., & Kolcu, I. (2006). Secure execution of computations in untrusted hosts. In Reliable Software Technologies - Ada-Europe 2006 - 11th Ada-Europe International Conference on Reliable Software Technologies, Proceedings (pp. 106-118). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4006 LNCS). Springer Verlag. https://doi.org/10.1007/11767077_9