skip to main content
10.1145/1036921.1036935acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Self-regenerative software components

Published:31 October 2003Publication History

ABSTRACT

Self-regenerative capabilities are a new trend in survivable system design. Self-regeneration ensures the property that a system's vulnerabilities cannot be exploited to the extent that the mission objective is compromised, but instead that the vulnerabilities are eventually removed, and system functionality is restored. To establish the usefulness of self-regenerative capabilities in the design of survivable systems, it is important to ensure that a system satisfying the self-regenerative requirement is survivable, and software engineering practices and tool support are available for building self-regenerative systems. This paper emphasizes the need for formal definition of the concept of self-regenerative systems in general and self-regenerative software components in particular. We propose a simple formal definition of a self-regenerative software component and we propose to adapt well-established formal software validation techniques to build tool support to implement self-regenerative capabilities at the component level.

References

  1. A. Arora and S. S. Kulkarni. Detectors and correctors: A theory of fault-tolerance components. In Proceedings of the 18th IEEE International Conference on Distributed Computing Systems (ICDCS98), May 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Ball, Majumdar, T. Millstein, and S. Rajamani. Automatic predicate abstraction of C programs. In C. Norris and J. J. B. Fenwick, editors, Proc. of the ACM SIGPLAN '01 Conference on Programming Language Design and Implementation (PLDI-01), volume 36.5 of ACM SIGPLAN Notices, pages 203-213, New York, June 2001. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. M. Clarke, O. Grunberg, and D. A. Peled. Model Checking. The MIT Press, Cambridge, Massachusetts, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. pages 238-252. ACM Press, Jan. 1977.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Conference, pages 63-78, Jan. 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Flanagan and J. Leino. Houdini, an annotation assistant for ESC/Java. In International Symposium on FME 2001: Formal Methods for Increasing Software Productivity, LNCS, volume 1, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Graf and H. Saïdi. Construction of abstract state graphs with PVS. In O. Grumberg, editor, Conference on Computer Aided Verification, volume 1254 of LNCS, pages 72-83, Haifa, Israel, June 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Levy, H. Saïdi, and T. E. Uribe. Combining monitors for run-time system verification. Electronic Notes in Theoretical Computer Science, 70(4), Dec. 2002.]]Google ScholarGoogle Scholar
  9. T. M. Mitchell. Machine Learning. McGraw-Hill, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. C. Necula, S. McPeak, and W. Weimer. CCured: Type-safe retrofitting of legacy code. In Principles of Programming Languages. ACM, Jan. 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Pnueli. The temporal logic of programs. pages 46-57. IEEE Computer Society Press, 1977. Revised version published in Theoretical Computer Science, 13:45-60, 1981.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. P. Porras and P. Neumann. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353-365, Baltimore, MD, Oct. 1997.]]Google ScholarGoogle Scholar
  13. M. Roesch. Snort: Lightweight intrusion detection for networks. In USENIX LISA'99, Nov. 1999. www.snort.org.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Saïdi. Model-checking guided abstraction and analysis. In 7th International Static Analysis Symposium, SAS 2000, volume 1824, pages 377-396, June 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Visser, K. Havelund, G. Brat, and S.-J. Park. Model checking programs. In Proc. 15th IEEE International Conference on Automated Software Engineering, Sept. 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Self-regenerative software components

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SSRS '03: Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
        October 2003
        129 pages
        ISBN:1581137842
        DOI:10.1145/1036921

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 31 October 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader