skip to main content
10.1145/2851613.2851666acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Dynamically reconfigurable trust policies for untrustworthy third-party components

Authors Info & Claims
Published:04 April 2016Publication History

ABSTRACT

Dynamic component-based platforms allow software to evolve at runtime, that is, components that can be located, loaded, and executed during runtime. Such dynamic update mechanism provides flexibility but introduces new challenges. This is especially true when dealing with third-party components, which make hard to predict the impacts (e.g., component incompatibilities at runtime, errors leading to application crashes) when integrating such thirdparty code into an application. Component quality is something hard to be evaluated and even harder when components are combined together. Third-party components whose origin or quality attributes are unknown may be considered as untrustworthy since they may potentially introduce faults to applications, although unintentionally. This paper describes the dynamic policy (i.e. changeable at runtime) behind our solution for temporarily isolating components in a sandbox, avoiding the trusted components to be disturbed in case the third-party code behaves inappropriately. By providing such mechanism we help introducing dependability attributes (namely maintainability, reliability and availability) in the component platform's architecture. In case the component presents no harm to the system, our approach provides the ability to promote a component outside the sandbox.

References

  1. Lehman, M. M. and Belady, L. A. (Eds.). 1985. Program Evolution: Processes of Software Change. Academic Press Prof., Inc., San Diego, CA, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Oreizy, P., Medvidovic, N., and Taylor, R. N. 2008. Runtime software adaptation: framework, approaches, and styles. In Companion of the 30th international conference on Software engineering (ICSE Companion '08). ACM, New York, NY, USA, 899--910. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Parnas, D. 1994. Software aging. In Proceedings of the 16th international conference on Software engineering (ICSE '94). IEEE Computer Society Press, Los Alamitos, CA, USA, 279--287. Google ScholarGoogle ScholarCross RefCross Ref
  4. Rodero-Merino, Luis, et al. "Building safe PaaS clouds: A survey on security in multitenant software platforms." computers & security 31.1 (2012): 96--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Szyperski, C., Gruntz, D., Murer, S. Component Software: Beyond Object-Oriented Programming. Addison-Wesley, second edition (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. OSGi Service Platform. www.osgi.orgGoogle ScholarGoogle Scholar
  7. Plasil, F., Balek, D., Janecek, R.: SOFA/DCUP: architecture for component trading and dynamic updating. In: 4th Intl. Conf. on Configurable Distributed Sys., pp. 43--51 (1998) Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kon, F. and Campbell, R. H. 2000. Dependence Management in Component-Based Distributed Systems. IEEE Concurrency 8, 1 (January 2000), 26--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Nagel, C., Evjen, B., Glynn, J., Watson, K., Skinner, M.: Professional C# 4 and .NET 4. Wiley Publishing (2010) Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Crnkovic, I. and Larsson, M. (Editors). Building Reliable Component-Based Software Systems, Artech House Publishers, July, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Armstrong, J. "Making reliable distributed systems in the presence of software errors", PhD dissertation, The Royal Institute of Technology, Stockholm, Sweden, Dec/2003Google ScholarGoogle Scholar
  12. Fox, A., Patterson, D.: Guest Editors' Introduction: Approaches to Recovery-Oriented Computing. IEEE Internet Computing, vol. 9, no. 2, 14--16 (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Tian, J.: Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement. Wiley-IEEE Computer Society Press (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Avižienis, A., Laprie, J., Randell, B., and Landwehr, C. 2004. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1, 1 (Jan. 2004), 11--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Voas, J., "Error propagation analysis for COTS systems," IEEE Comput. Control Eng. J., vol. 8, no. 6, pp. 269--272, Dec. 1997.Google ScholarGoogle Scholar
  16. Fritzinger, J. S. and Mueller, M., "Java security," Tech. Rep., Sun Microsystems, Inc., Palo Alto, CA, 1996.Google ScholarGoogle Scholar
  17. Dai, A., "Exploring the .NET Framework 4 Security Model", MSDN Magazine, November 2009.Google ScholarGoogle Scholar
  18. Hunt, G. C. and Larus, J. R. 2007. Singularity: rethinking the software stack. SIGOPS Oper. Syst. Rev. 41, 2 (April 2007), 37--49. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Dynamically reconfigurable trust policies for untrustworthy third-party components

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '16: Proceedings of the 31st Annual ACM Symposium on Applied Computing
        April 2016
        2360 pages
        ISBN:9781450337397
        DOI:10.1145/2851613

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 April 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SAC '16 Paper Acceptance Rate252of1,047submissions,24%Overall Acceptance Rate1,650of6,669submissions,25%
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader