Remotely executing mobile code introduces a plethora of security problems. This paper examines the “external agent replay” attack, identifies the notion of one-way program state transitions, describes the use of monotonic variables as a practical method for detecting these attacks, examines the more general problem state modification attacks, and introduces the use of “results verification vectors” to protect agents from attack.
Bennet S. Yee