An Improved Execution Integrity Solution for Mobile Agents

  • Michelangelo Giansiracusa
  • Selwyn Russell
  • Andrew Clark
  • John Hynd
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3574)


In this paper we introduce a new infrastructural approach to providing mobile agent execution integrity, a very important property – especially to the confidence an agent user can place in the results of its deployed autonomous mobile agents. Existing mobile agent execution integrity schemes are shown to be comparatively inferior when analysed in light of a number of essential robustness properties. We provide an analysis of Hohl’s reference states scheme and introduce our novel execution integrity scheme, which builds – in part – on Hohl’s scheme. Besides significantly improving on this existing scheme, our scheme meets all of the desired criteria for a robust execution integrity scheme.


Mobile agent security RECDAM execution integrity real-time execution checking reference state MASHIn MASH checking host 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Samaras, G.: Mobile Agents: What about Them? Did They Deliver what They Promised? Are They Here to Stay? In: International Conference on Mobile Data Management (MDM 2004), pp. 294–295 (2004)Google Scholar
  2. 2.
    Roth, V.: Obstacles to the adoption of mobile agents. In: International Conference on Mobile Data Management (MDM 2004), pp. 296–297 (2004)Google Scholar
  3. 3.
    Wilhelm, U.: A Technical Approach to Privacy based on Mobile Agents Protected by Tamper-resistant Hardware. PhD thesis, Ecole Polytechnique Federale de Lausanne, Switzerland (1999)Google Scholar
  4. 4.
    Yao, M.: A Security Architecture for Protecting Dynamic Components of Mobile Agents. PhD thesis, Information Security Research Centre, Faculty of Information Technology, Queensland University of Technology (2004)Google Scholar
  5. 5.
    Gray, R.: Agent Tcl: A flexible and secure mobile-agent system. PhD thesis, Dartmouth College, Hanover, New Hampshire (1997)Google Scholar
  6. 6.
    Karnik, N.: Security in Mobile Agent Systems. PhD dissertation, University of Minnesota (1998)Google Scholar
  7. 7.
    Weiss, G. (ed.): Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, Cambridge (2000)Google Scholar
  8. 8.
    Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements. In: Presented at the 1996 National Information Systems Security Conference, Baltimore, MD, USA (1996),
  9. 9.
    Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  10. 10.
    Jansen, W.: Countermeasures for Mobile Agent Security. Computer Communications Special Issue on Advanced Security Techniques for Network Protection (2000)Google Scholar
  11. 11.
    Alfalayleh, M., Brankovic, L.: An Overview of Security Issues and Techniques in Mobile Agents. In: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, pp. 59–78 (2004), Available at
  12. 12.
    Claessens, J., Preneel, B., Vandewalle, J. (How) can mobile agents do secure electronic transactions on untrusted hosts? - A survey of the security issues and current solutions. ACM Transactions on Internet Technology (TOIT) 3, 28–48 (2003)CrossRefGoogle Scholar
  13. 13.
    Hohl, F.: A Protocol to Detect Malicious Hosts Attacks by Using Reference States. Technical report, Universit Stuttgart, Fakult Informatik (1999)Google Scholar
  14. 14.
    Hohl, F.: A framework to protect mobile agents by using reference states. In: International Conference on Distributed Computing Systems, pp. 410–417 (2000)Google Scholar
  15. 15.
    Giansiracusa, M., Russell, S., Clark, A., Roth, V.: Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 343–357. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    Giansiracusa, M., Russell, S., Clark, A., Hynd, J.: A Step Closer to a Secure Internet Mobile Agent Community. In: Fifth Asia-Pacific Industrial Engineering and Management Systems Conference, APIEMS 2004 (2004) published on CDRom ISBN: 0-9596291-8-1Google Scholar
  17. 17.
    Giansiracusa, M., Russell, S., Clark, A.: Clever Use of Trusted Third Parties for Mobile Agent Security. In: Applied Cryptography and Network Security - Technical Track, pp. 398–407. ICISA Press (2004)Google Scholar
  18. 18.
    Giansiracusa, M.: A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents. PhD thesis Passed internal examination, submitted for external examination (2005), available at
  19. 19.
    Biehl, I., Meyer, B., Wetzel, S.: Ensuring the Integrity of Agent-Based Computations by Short Proofs. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 183–194. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  20. 20.
    Tan, H.K., Moreau, L.: Extending Execution Tracing for Mobile Code Security. In: Fischer, K., Hutter, D. (eds.) Second International Workshop on Security of Mobile MultiAgent Systems (SEMAS 2002), pp. 51–59 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Michelangelo Giansiracusa
    • 1
  • Selwyn Russell
    • 1
  • Andrew Clark
    • 1
  • John Hynd
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.School of Software Engineering and Data CommunicationsQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations