Speculative Software Modification and its Use in Securing SOUP | IEEE Conference Publication | IEEE Xplore

Speculative Software Modification and its Use in Securing SOUP


Abstract:

We present an engineering process model for generating software modifications that is designed to be used when either most or all development artifacts about the software...Show More

Abstract:

We present an engineering process model for generating software modifications that is designed to be used when either most or all development artifacts about the software, including the source code, are unavailable. This kind of software, commonly called Software Of Unknown Provenance (SOUP), raises many doubts about the existence and adequacy of desired dependability properties, for example security. These doubts motivate some users to apply modifications to enhance dependability properties of the software, however, without necessary development artifacts, modifications are made in a state of uncertainty and risk. We investigate enhancing dependability through software modification in the presence of these risks as an engineering problem and introduce an engineering process for generating software modifications called Speculative Software Modification (SSM). We present the motivation and guiding principles of SSM, and a case study of SSM applied to protect software against buffer overflow attacks when only the binary is available.
Date of Conference: 13-16 May 2014
Date Added to IEEE Xplore: 26 May 2014
Electronic ISBN:978-1-4799-3804-9
Conference Location: Newcastle, UK

Contact IEEE to Subscribe

References

References is not available for this document.