Activating mobile agents from contactless smart cards through a Java bytecode extractor

As mobile agents reside on on-board units or mobile devices and act on behalf of drivers, it imposes a strong demand to devise mechanisms for protecting the algorithms that are exclusively coded in mobile agents for different drivers. Although contactless smart cards are widely used as a means to pr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lee, Jonathan, Shin-Jie Lee, Hsi-Min Chen, Liang, Jeremy, Chia-Ling Wu, Yao-Chiang Wang
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3951
container_issue
container_start_page 3948
container_title
container_volume
creator Lee, Jonathan
Shin-Jie Lee
Hsi-Min Chen
Liang, Jeremy
Chia-Ling Wu
Yao-Chiang Wang
description As mobile agents reside on on-board units or mobile devices and act on behalf of drivers, it imposes a strong demand to devise mechanisms for protecting the algorithms that are exclusively coded in mobile agents for different drivers. Although contactless smart cards are widely used as a means to protecting personal information, it is still a challenge to protect the whole code of a mobile agent in a limited storage. In this paper, we propose a tool, called jExtractor, by which the private or sensitive data coded in a Java-based mobile agent can be extracted and moved to a contactless smart card, and can further be read from the card and merged to be the original mobile agent. Moreover, we use 30,000 Java classes as samples to validate jExtractor. In the experimental result, 79.4% of the sample classes can successfully be extracted and moved to Mifare Standard S50 (1K) smart card with our strictest configuration level.
doi_str_mv 10.1109/ICSMC.2010.5642250
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5642250</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5642250</ieee_id><sourcerecordid>5642250</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-3f9f077cab921b26698b71f3186089a6def68cedf69bbda30c7bb0983d0cb4c83</originalsourceid><addsrcrecordid>eNo1kEtOwzAYhM1LIi29AGx8gZTfTvxaVhGFoiIWgGBX2Y6dBiUNsk1Fb08kymo0mk-j0SB0TWBOCKjbVfXyVM0pjJ7xklIGJ2imhCQlLUvOpIRTlFEmRE44Y2do8h9wdY4yApzmitKPSzSJ8ROAQklkht4XNrV7ndpdg_vBtJ3DunG7FLEPQ4_tsEvaps7FiGOvQ8JWhzritA3Dd7PFGj_qvcbmkJwdaofdTwojP4QrdOF1F93sqFP0trx7rR7y9fP9qlqs85YIlvLCKw9CWG0UJYZyrqQRxBdEcpBK89p5Lq2rPVfG1LoAK4wBJYsarCmtLKbo5q-3dc5tvkI7jjxsjgcVv8cgV3g</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Activating mobile agents from contactless smart cards through a Java bytecode extractor</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Lee, Jonathan ; Shin-Jie Lee ; Hsi-Min Chen ; Liang, Jeremy ; Chia-Ling Wu ; Yao-Chiang Wang</creator><creatorcontrib>Lee, Jonathan ; Shin-Jie Lee ; Hsi-Min Chen ; Liang, Jeremy ; Chia-Ling Wu ; Yao-Chiang Wang</creatorcontrib><description>As mobile agents reside on on-board units or mobile devices and act on behalf of drivers, it imposes a strong demand to devise mechanisms for protecting the algorithms that are exclusively coded in mobile agents for different drivers. Although contactless smart cards are widely used as a means to protecting personal information, it is still a challenge to protect the whole code of a mobile agent in a limited storage. In this paper, we propose a tool, called jExtractor, by which the private or sensitive data coded in a Java-based mobile agent can be extracted and moved to a contactless smart card, and can further be read from the card and merged to be the original mobile agent. Moreover, we use 30,000 Java classes as samples to validate jExtractor. In the experimental result, 79.4% of the sample classes can successfully be extracted and moved to Mifare Standard S50 (1K) smart card with our strictest configuration level.</description><identifier>ISSN: 1062-922X</identifier><identifier>ISBN: 1424465869</identifier><identifier>ISBN: 9781424465866</identifier><identifier>EISSN: 2577-1655</identifier><identifier>EISBN: 9781424465880</identifier><identifier>EISBN: 1424465877</identifier><identifier>EISBN: 1424465885</identifier><identifier>EISBN: 9781424465873</identifier><identifier>DOI: 10.1109/ICSMC.2010.5642250</identifier><language>eng</language><publisher>IEEE</publisher><subject>Contactless Smart Card ; Driver circuits ; Java Bytecode ; Mobile Agent</subject><ispartof>2010 IEEE International Conference on Systems, Man and Cybernetics, 2010, p.3948-3951</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5642250$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5642250$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lee, Jonathan</creatorcontrib><creatorcontrib>Shin-Jie Lee</creatorcontrib><creatorcontrib>Hsi-Min Chen</creatorcontrib><creatorcontrib>Liang, Jeremy</creatorcontrib><creatorcontrib>Chia-Ling Wu</creatorcontrib><creatorcontrib>Yao-Chiang Wang</creatorcontrib><title>Activating mobile agents from contactless smart cards through a Java bytecode extractor</title><title>2010 IEEE International Conference on Systems, Man and Cybernetics</title><addtitle>ICSMC</addtitle><description>As mobile agents reside on on-board units or mobile devices and act on behalf of drivers, it imposes a strong demand to devise mechanisms for protecting the algorithms that are exclusively coded in mobile agents for different drivers. Although contactless smart cards are widely used as a means to protecting personal information, it is still a challenge to protect the whole code of a mobile agent in a limited storage. In this paper, we propose a tool, called jExtractor, by which the private or sensitive data coded in a Java-based mobile agent can be extracted and moved to a contactless smart card, and can further be read from the card and merged to be the original mobile agent. Moreover, we use 30,000 Java classes as samples to validate jExtractor. In the experimental result, 79.4% of the sample classes can successfully be extracted and moved to Mifare Standard S50 (1K) smart card with our strictest configuration level.</description><subject>Contactless Smart Card</subject><subject>Driver circuits</subject><subject>Java Bytecode</subject><subject>Mobile Agent</subject><issn>1062-922X</issn><issn>2577-1655</issn><isbn>1424465869</isbn><isbn>9781424465866</isbn><isbn>9781424465880</isbn><isbn>1424465877</isbn><isbn>1424465885</isbn><isbn>9781424465873</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kEtOwzAYhM1LIi29AGx8gZTfTvxaVhGFoiIWgGBX2Y6dBiUNsk1Fb08kymo0mk-j0SB0TWBOCKjbVfXyVM0pjJ7xklIGJ2imhCQlLUvOpIRTlFEmRE44Y2do8h9wdY4yApzmitKPSzSJ8ROAQklkht4XNrV7ndpdg_vBtJ3DunG7FLEPQ4_tsEvaps7FiGOvQ8JWhzritA3Dd7PFGj_qvcbmkJwdaofdTwojP4QrdOF1F93sqFP0trx7rR7y9fP9qlqs85YIlvLCKw9CWG0UJYZyrqQRxBdEcpBK89p5Lq2rPVfG1LoAK4wBJYsarCmtLKbo5q-3dc5tvkI7jjxsjgcVv8cgV3g</recordid><startdate>201010</startdate><enddate>201010</enddate><creator>Lee, Jonathan</creator><creator>Shin-Jie Lee</creator><creator>Hsi-Min Chen</creator><creator>Liang, Jeremy</creator><creator>Chia-Ling Wu</creator><creator>Yao-Chiang Wang</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201010</creationdate><title>Activating mobile agents from contactless smart cards through a Java bytecode extractor</title><author>Lee, Jonathan ; Shin-Jie Lee ; Hsi-Min Chen ; Liang, Jeremy ; Chia-Ling Wu ; Yao-Chiang Wang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-3f9f077cab921b26698b71f3186089a6def68cedf69bbda30c7bb0983d0cb4c83</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Contactless Smart Card</topic><topic>Driver circuits</topic><topic>Java Bytecode</topic><topic>Mobile Agent</topic><toplevel>online_resources</toplevel><creatorcontrib>Lee, Jonathan</creatorcontrib><creatorcontrib>Shin-Jie Lee</creatorcontrib><creatorcontrib>Hsi-Min Chen</creatorcontrib><creatorcontrib>Liang, Jeremy</creatorcontrib><creatorcontrib>Chia-Ling Wu</creatorcontrib><creatorcontrib>Yao-Chiang Wang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lee, Jonathan</au><au>Shin-Jie Lee</au><au>Hsi-Min Chen</au><au>Liang, Jeremy</au><au>Chia-Ling Wu</au><au>Yao-Chiang Wang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Activating mobile agents from contactless smart cards through a Java bytecode extractor</atitle><btitle>2010 IEEE International Conference on Systems, Man and Cybernetics</btitle><stitle>ICSMC</stitle><date>2010-10</date><risdate>2010</risdate><spage>3948</spage><epage>3951</epage><pages>3948-3951</pages><issn>1062-922X</issn><eissn>2577-1655</eissn><isbn>1424465869</isbn><isbn>9781424465866</isbn><eisbn>9781424465880</eisbn><eisbn>1424465877</eisbn><eisbn>1424465885</eisbn><eisbn>9781424465873</eisbn><abstract>As mobile agents reside on on-board units or mobile devices and act on behalf of drivers, it imposes a strong demand to devise mechanisms for protecting the algorithms that are exclusively coded in mobile agents for different drivers. Although contactless smart cards are widely used as a means to protecting personal information, it is still a challenge to protect the whole code of a mobile agent in a limited storage. In this paper, we propose a tool, called jExtractor, by which the private or sensitive data coded in a Java-based mobile agent can be extracted and moved to a contactless smart card, and can further be read from the card and merged to be the original mobile agent. Moreover, we use 30,000 Java classes as samples to validate jExtractor. In the experimental result, 79.4% of the sample classes can successfully be extracted and moved to Mifare Standard S50 (1K) smart card with our strictest configuration level.</abstract><pub>IEEE</pub><doi>10.1109/ICSMC.2010.5642250</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1062-922X
ispartof 2010 IEEE International Conference on Systems, Man and Cybernetics, 2010, p.3948-3951
issn 1062-922X
2577-1655
language eng
recordid cdi_ieee_primary_5642250
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Contactless Smart Card
Driver circuits
Java Bytecode
Mobile Agent
title Activating mobile agents from contactless smart cards through a Java bytecode extractor
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-16T11%3A39%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Activating%20mobile%20agents%20from%20contactless%20smart%20cards%20through%20a%20Java%20bytecode%20extractor&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Systems,%20Man%20and%20Cybernetics&rft.au=Lee,%20Jonathan&rft.date=2010-10&rft.spage=3948&rft.epage=3951&rft.pages=3948-3951&rft.issn=1062-922X&rft.eissn=2577-1655&rft.isbn=1424465869&rft.isbn_list=9781424465866&rft_id=info:doi/10.1109/ICSMC.2010.5642250&rft_dat=%3Cieee_6IE%3E5642250%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424465880&rft.eisbn_list=1424465877&rft.eisbn_list=1424465885&rft.eisbn_list=9781424465873&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5642250&rfr_iscdi=true