skip to main content
10.1145/2459976.2460025acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration

Published: 08 January 2013 Publication History

Abstract

Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address current cyber threats. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation on a demonstration project to compute behavior of legacy IBM Assembly code for a federal agency. The ultimate goal is to understand functionality and security vulnerabilities for code modernization. This paper reports on the first phase, to define functional semantics for IBM instructions and conduct behavior computation experiments.

References

[1]
Allison, L., A Practical Introduction to Denotational Semantics, Cambridge Computer Science Texts 23, Cambridge University Press, 1986.
[2]
Burns, L. and T. Daly, "FXplorer: Exploration of Computed Software Behavior: A New Approach to Understanding and Verification," Proceedings of Hawaii International Conference on System Sciences (HICSS-42), IEEE Computer Society Press, Los Alimitos, CA, 2009.
[3]
Collins, R, Linger, R., Walton, G., and Hevner, A., "The Impacts of Function Extraction Technology on Program Comprehension: A Controlled Experiment," Journal of Information & Software Technology, Vol. 50, M. Shepperd, C. Wohlin, and S. Elbaum (eds.), Elsevier Publishers, New York, NY, 2008.
[4]
Cousot, P. and Cousot, R., "Abstract Interpretation: a Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints", Proceedings of 4th Conference on the Principles of Programming Languages (POPL), Los Angeles, CA, 1977, pp. 238--252.
[5]
King, James C., "Symbolic execution and program testing", Comm. of the ACM, v. 19, n. 7, 1976, pp. 385--394.
[6]
Linger, R., Mills, H., and Witt, B., Structured Programming: Theory and Practice, Addison-Wesley, Reading MS, 1979.
[7]
Pleszkoch, M., Linger, R., Prowell, S., Sayre, K., and Burns, L., "Automated Behavior Computation for Software Analysis and Validation," Proceedings of Hawaii International Conference on System Sciences (HICSS-45), IEEE Computer Society Press, Los Alimitos, CA, 2012 (to appear).
[8]
Prowell, S., C. Trammell, R. Linger, and J. Poore, Cleanroom Software Engineering: Technology and Practice, Addison Wesley, Reading, MA, 1999.
[9]
Walton, G., T. Longstaff, and R. Linger, Technology Foundations for Computational Evaluation of Security Attributes, Technical Report CMU/SEI-2006-TR-021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, 2006.

Cited By

View all
  • (2023)Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware DetectorsDigital Threats: Research and Practice10.1145/35674324:2(1-22)Online publication date: 10-Aug-2023

Index Terms

  1. Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
    January 2013
    282 pages
    ISBN:9781450316873
    DOI:10.1145/2459976

    Sponsors

    • Los Alamos National Labs: Los Alamos National Labs
    • Sandia National Labs: Sandia National Laboratories
    • DOE: Department of Energy
    • Oak Ridge National Laboratory
    • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
    • BERKELEYLAB: Lawrence National Berkeley Laboratory
    • Argonne Natl Lab: Argonne National Lab
    • Idaho National Lab.: Idaho National Laboratory
    • Pacific Northwest National Laboratory
    • Nevada National Security Site: Nevada National Security Site

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. reverse engineering
    2. security properties
    3. software behavior computation
    4. specification

    Qualifiers

    • Research-article

    Conference

    CSIIRW '13
    Sponsor:
    • Los Alamos National Labs
    • Sandia National Labs
    • DOE
    • Lawrence Livermore National Lab.
    • BERKELEYLAB
    • Argonne Natl Lab
    • Idaho National Lab.
    • Nevada National Security Site
    CSIIRW '13: Cyber Security and Information Intelligence
    January 8 - 10, 2013
    Tennessee, Oak Ridge, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware DetectorsDigital Threats: Research and Practice10.1145/35674324:2(1-22)Online publication date: 10-Aug-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media