期刊文献+

An Approach of Trustworthy Software Design with Automatically Adapting Software Update

An Approach of Trustworthy Software Design with Automatically Adapting Software Update
原文传递
导出
摘要 In this paper, we merge software trustworthiness with software design and present an approach to trustworthy software design with an automatically adapting software update. First, software behavior and results can be expected and behavior states can be monitored when a software runs by introducing a trustworthy behavior trace on a software and inserting a checkpoint sensor at each checkpoint of the trustworthy software. Second, an updated approach of the trustworthy behavior trace for the software at the level of checkpoints is presented. The trustworthy behavior traces of the software for two versions can be merged adequately by constructing split points and merge points between two trustworthy behavior traces. Finally, experiments and analyses show that: (1) the software designed by our approach can detect and report the anomaly in a software automatically and effectively, so it has a higher ability of trustworthiness evaluation than the traditional software; and (2) our approach can realize the accurate update of the trustworthy behavior trace with a lower space overhead of checkpoints when the software updates. In this paper, we merge software trustworthiness with software design and present an approach to trustworthy software design with an automatically adapting software update. First, software behavior and results can be expected and behavior states can be monitored when a software runs by introducing a trustworthy behavior trace on a software and inserting a checkpoint sensor at each checkpoint of the trustworthy software. Second, an updated approach of the trustworthy behavior trace for the software at the level of checkpoints is presented. The trustworthy behavior traces of the software for two versions can be merged adequately by constructing split points and merge points between two trustworthy behavior traces. Finally, experiments and analyses show that: (1) the software designed by our approach can detect and report the anomaly in a software automatically and effectively, so it has a higher ability of trustworthiness evaluation than the traditional software; and (2) our approach can realize the accurate update of the trustworthy behavior trace with a lower space overhead of checkpoints when the software updates.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期391-398,共8页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (60873203) the Foundation of Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education (AISTC2009_03) the Outstanding Youth Foundation of Hebei Province (F2010000317) the Natural Science Foundation of Hebei Province (F2010000319, F2011201039)
关键词 trustworthy software design software update software behavior trustworthiness evaluation trustworthy software design software update software behavior trustworthiness evaluation
  • 相关文献

参考文献14

  • 1刘克,单志广,王戟,何积丰,张兆田,秦玉文.“可信软件基础研究”重大研究计划综述[J].中国科学基金,2008,22(3):145-151. 被引量:136
  • 2Wang Huaimin, Tang Yangbin, Yi Gang, et al. The trustworthiness mechanism of network software[J]. Science in China(Series E): Information Sciences, 2006, 36(1): 1- 14(Ch).
  • 3文静,王怀民,应时,倪友聪,王涛.支持运行监控的可信软件体系结构设计方法[J].计算机学报,2010,33(12):2321-2334. 被引量:13
  • 4赵会群,孙晶.面向服务的可信软件体系结构代数模型[J].计算机学报,2010,33(5):890-899. 被引量:21
  • 5古亮,郭耀,王华,邹艳珍,谢冰,邵维忠.基于TPM的运行时软件可信证据收集机制[J].软件学报,2010,21(2):373-387. 被引量:18
  • 6Yang Y, Wang Q, Li M S. Process trustworthiness as a capability indicator for measuring and improving software trustworthiness[C]//Proceedings of 2009 International Conference on Software Process. Berlin, Heidelberg: Springer-Verlag, 2009: 389-401.
  • 7Zhang H, Shu F, Yang Y, et al. A fuzzy-based method of evaluating the trustworthiness of software processes [C]// Proceedings of International Conference on Software Process. Berlin, Heidelberg: Springer-Verlag, 2010: 297-308.
  • 8Lu G, Wang H, Mao X. Using ELECTRE TRI outranking method to evaluate trustworthy software[C]//Proceedings of the 7th International Conference on Autonomic and Trusted Computing. Berlin, Heidelberg: Springer-Verlag, 2010: 219- 227.
  • 9Tucek J, Xiong W, Zhou Y. Efficient online validation with delta execution[C]//Proceedings of the 14th International Conference on Architectural Support or Programming Languages an Operating Systems. New York: ACM Press, 2009: 193-204.
  • 10Li P, Gao D, Reiter M K. Automatically adapting a trained anomaly detector to software patches[C]//Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection. Berlin, Heidelberg: Springer-Verlag, 2009: 142-160.

二级参考文献37

共引文献180

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部