Title :
Health monitoring for software security
Abstract :
This paper discusses health monitoring of security proper ties, that is, software properties the violation of which might indicate that a vulnerability in the software is being attacked. Because malicious attackers may try to hide their presence from a health monitor, such monitoring has to be fine-grained - we will argue that individual instructions in the binary executable code should be monitored. This can be prohibitively expensive, but it may be possible to use static verification technology to reduce the workload of the health monitor. The paper discusses the possibilities of such a synthesis between static verification and runtime supervision.
Keywords :
program verification; security of data; supervisory programs; binary executable code; health monitoring; malicious attack; runtime supervision; software security; software vulnerability; static verification technology; Binary codes; Central Processing Unit; Context; Monitoring; Runtime; Security; Software;
Conference_Titel :
Prognostics and Health Management (PHM), 2011 IEEE Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4244-9828-4
DOI :
10.1109/ICPHM.2011.6024360