An approach of program analysis prevention for information protection

Ken'ichi Takahashi, Zhaoyu Liu, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the user supposes safe. In the framework, a user offers a program, which implements a way the user supposes safe, to an information recipient. And then, the information recipient makes use of the user's sensitive information through the program. In this manner, the user can protect his sensitive information. The framework, however, has a problem, by which the information recipient may analyze the program and obtain some sensitive information. In this paper, we introduce a tamper-proof device and trust relationship for a solution of this problem.

Original languageEnglish
Title of host publicationProceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
Pages35-40
Number of pages6
DOIs
Publication statusPublished - Dec 31 2007
Externally publishedYes
Event2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007 - Seoul, Korea, Republic of
Duration: Apr 26 2007Apr 28 2007

Publication series

NameProceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007

Other

Other2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007
Country/TerritoryKorea, Republic of
CitySeoul
Period4/26/074/28/07

All Science Journal Classification (ASJC) codes

  • Software
  • Media Technology

Fingerprint

Dive into the research topics of 'An approach of program analysis prevention for information protection'. Together they form a unique fingerprint.

Cite this