Uncategorized

tamper-proof software Research Paper

tamper-proof software Research Paper

Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble. Answer should be a clear explanation and should be clear understanding (1000 words). Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books. When use citation from any reference please keep it between citation (Author,Year),please citation should be not more than 5% As reference you can use the following book: Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition) Author: Anderson, R. ISBN: ISBN-10: 0470068523 ISBN-13: 978-0470068526 Publisher: John Wiley & Sons Book available from below link: http://www.cl.cam.ac.uk/~rja14/book.html Assignment is: DQ1:One hot topic is the building of tamper-proof software. What is your opinion? Is it possible in practice to build such software even though the work of Barak et al. shows that it is theoretically impossible? Indeed in their seminal paper, Diffie and Hellman proposed building public-key cryptosystems using code obfuscation. Another example related to this topic is mobile agent. Another example related to this topic is mobile agent. Mobile agent is one of the most important applications in this area. At some time people are thinking about building mobile agent to buy the ticket for you. For example, if you want to travel to NY, you initiate an agent from your computer, this agent will travel trough all the travel agents computers, it will check the cheapest ticket and the most convenient time according to your specification. After some comparison, it will buy the ticket (otherwise, some other people may buy it and you may have no chance to get that ticket when your agent comes back to that computer). This means that the agent will make a LEGAL decision, which again means it has to take your private key to sign the contract. Then you can image what the malicious host can do to your agent. You may aslo discuss the whether we really need tamper-resistent software in our life. Attachments: SECENG-week5-.pdf

Is this the question you were looking for? If so, place your order here to get started!

×