Robustness and security hardening of COTS software libraries

被引:8
|
作者
Suesskraut, Martin [1 ]
Fetzer, Christof [1 ]
机构
[1] Tech Univ Dresden, Dept Comp Sci, Dresden, Germany
来源
37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS | 2007年
关键词
D O I
10.1109/DSN.2007.84
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and security. We propose a novel approach to harden software libraries to improve their robustness and security. Our approach is automated, general and extensible and consists of the following stages. First, we use a static analysis to prepare and guide the following fault injection. In the dynamic analysis stage, fault injection experiments execute the library functions with both usual and extreme input values. The experiments are used to derive and verify one protection hypothesis per function (for instance, function foo fails if argument I is a NULL pointer). In the hardening stage, a protection wrapper is generated from these hypothesis to reject unrobust input values of library functions. We evaluate our approach by hardening a library used by Apache (a web server).
引用
收藏
页码:61 / +
页数:2
相关论文
共 50 条
  • [31] Using cots software for mars missions
    Chapin, N
    PROCEEDINGS OF THE FOUNDING CONVENTION OF THE MARS SOCIETY, PT II, 1999, : 381 - 395
  • [32] Software criticality analysis of COTS/SOUP
    Bishop, P
    Bloomfield, R
    Clement, T
    Guerra, S
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2003, 81 (03) : 291 - 301
  • [33] USING COTS COMPONENTS IN SOFTWARE DEVELOPMENT
    Jilani, Abdul Khader
    INTERNATIONAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION, 2008, 1052 : 203 - 208
  • [34] Acquiring COTS software selection requirements
    Maiden, NA
    Ncube, C
    IEEE SOFTWARE, 1998, 15 (02) : 46 - +
  • [35] Qualifying the reliability of COTS software components
    Voas, J
    Howell, C
    Everett, B
    Laprie, JC
    EIGHTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 1997, : 144 - 144
  • [36] Problems with COTS software: A case study
    Beheshti, J
    Dupuis, J
    CANADIAN JOURNAL OF INFORMATION AND LIBRARY SCIENCE-REVUE CANADIENNE DES SCIENCES DE L INFORMATION ET DE BIBLIOTHECONOMIE, 1999, 24 (04): : 42 - 42
  • [37] Acquiring COTS software selection requirements
    Maiden, NAM
    Ncube, C
    THIRD INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING - PROCEEDINGS, 1998, : 241 - 241
  • [38] COTS software in Science Operations, is it Worth it?
    O'Mullane, William
    Bach, Nana
    Hernandez, Jose
    Hutton, Alexander
    Messineo, Rosario
    ASTRONOMICAL DATA ANALYSIS SOFTWARE AND SYSTEMS XXVI, 2019, 521 : 153 - 156
  • [39] Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach
    Fournaris, Apostolos P.
    Tselios, Christos
    Haleplidis, Evangelos
    Athanasopoulos, Elias
    Dionysiou, Antreas
    Mitropoulos, Dimitrios
    Louridas, Panos
    Christou, Georgios
    Athanatos, Manos
    Hatzivasilis, George
    Georgopoulos, Konstantinos
    Kalogeros, Costas
    Kotselidis, Christos
    Vogl, Simon
    Hamon, Francois
    Ioannidis, Sotiris
    2023 IEEE 28TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, CAMAD 2023, 2023, : 80 - 86
  • [40] An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation
    Mouheb, Djedjiga
    Talhi, Chamseddine
    Mourad, Azzam
    Lima, Vitor
    Debbabi, Mourad
    Wang, Lingyu
    Pourzandi, Makan
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2009, 199 : 203 - 222