【文章內(nèi)容簡(jiǎn)介】
ck, either statically ,for instance to ensure that operands of an instuction are of the correct type , or dynamically , for example to locate any access to a protected resource. ProofCarrying Code ? A predefined security policy is defined in terms of a logic. ? Host first asks to be sent a proof that the code respects the policy before he actually agrees to run it. ? The code producer sends the program and an acpanying proof ? After receiving the code ,host can check the program with the guidance of the proof. ProofCarrying Code ProofCarrying Code ? On key question which affects the usefulness of this approach is that of: ? What program properties are expressible and provable in the LF logic used to publish the security policy and encode the proof. ? PCC sacrifices platformindependence for performance. Protection of a mobile code from a malicious host ? The problem of protection from a malicious host has been studied only recently , and is intrinsically more difficult because the environment gets a total control over the mobile code (otherwise , host protection would not be possible!) ? Classified along 2 criteria, 1) data versus code protection , and 2) integrity –or confidentialitybased. Malicious Host Solutions to the malicious host problem sho