Robustness and security hardening of COTS software libraries

被引:8
|
作者
Suesskraut, Martin [1 ]
Fetzer, Christof [1 ]
机构
[1] Tech Univ Dresden, Dept Comp Sci, Dresden, Germany
来源
37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS | 2007年
关键词
D O I
10.1109/DSN.2007.84
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and security. We propose a novel approach to harden software libraries to improve their robustness and security. Our approach is automated, general and extensible and consists of the following stages. First, we use a static analysis to prepare and guide the following fault injection. In the dynamic analysis stage, fault injection experiments execute the library functions with both usual and extreme input values. The experiments are used to derive and verify one protection hypothesis per function (for instance, function foo fails if argument I is a NULL pointer). In the hardening stage, a protection wrapper is generated from these hypothesis to reject unrobust input values of library functions. We evaluate our approach by hardening a library used by Apache (a web server).
引用
收藏
页码:61 / +
页数:2
相关论文
共 50 条
  • [1] Hardening COTS software with generic software wrappers
    Fraser, Timothy
    Badger, Lee
    Feldman, Mark
    Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1999, : 2 - 16
  • [2] Hardening COTS software with generic software wrappers
    Fraser, T
    Badger, L
    Feldman, M
    PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 2 - 16
  • [3] Estimating the cost of security for COTS software
    Reifer, DJ
    Boehm, BW
    Gangadharan, M
    COTS-BASED SOFTWARE SYSTEMS, PROCEEDINGS, 2003, 2580 : 178 - 186
  • [4] Retrofitting Security in COTS Software with Binary Rewriting
    O'Sullivan, Padraig
    Anand, Kapil
    Kotha, Aparna
    Smithson, Matthew
    Barua, Rajeev
    Keromytis, Angelos D.
    FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 154 - +
  • [5] SOFTWARE QUALITY EVALUATION FOR SECURITY COTS PRODUCTS
    Teresa Villalba, M.
    Fernandez-Sanz, Luis
    Cuadrado-Gallego, Juan J.
    Martinez, Jose J.
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (01) : 27 - 48
  • [6] Security verification techniques applied to PatchLink COTS software
    Gilliam, David P.
    Powell, John D.
    Bishop, Matt
    Andrew, Chris
    Jog, Sameer
    15TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2006, : 319 - +
  • [7] Hidden Risks to Cyberspace Security from Obsolete COTS Software
    Ozkan, Baris Egemen
    Bulkan, Serol
    2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE, 2019, : 61 - 79
  • [8] An Automated Software Fault Injection Tool for Robustness Assessment of Java']Java COTs
    Zamli, Kamal Z.
    Hassan, Mohd Daud Alang
    Isa, Nor Ashidi Mat
    Azizan, Siti Norbaya
    2006 INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS (ICOCI 2006), 2006, : 470 - +
  • [9] How useful is software fault injection for evaluating the security of COTS products?
    Reynolds, J
    Bishop, M
    Ghosh, A
    Whittaker, J
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 339 - 340
  • [10] METAlloc: Efficient and Comprehensive Metadata Management for Software Security Hardening
    Haller, Istvan
    van der Kouwe, Erik
    Giuffrida, Cristiano
    Bos, Herbert
    PROCEEDINGS OF THE 9TH EUROPEAN WORKSHOP ON SYSTEM SECURITY, (EUROSEC 2016), 2016, : 25 - 30