skip to main content
10.1145/3064814.3064821acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
short-paper

Automatic generation of network element software (AGNES): short paper

Published: 04 April 2017 Publication History

Abstract

The security of computer networks is critical to our nation's civil and military infrastructure. Eliminating vulnerabilities in network software will significantly improve security of our computer and military systems. The Automatic Generation of Network Element Software (AGNES) code generator will generate network element software that is free from known weaknesses which in turn will reduce vulnerabilities. AGNES uses an ontology of coding solutions based on network element standards and the Common Weakness Enumeration (CWE) database to avoid common weaknesses. The generated software will be put through rigorous static analysis to validate the absence of known weaknesses. The generated code will be compared to open source software for comparison of code quality, functionality and performance.

References

[1]
J. Broekstra and A. Kampman. 2002. Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema. In Proc. of the 1st International Semantic Web Conference (ISWC2002).
[2]
Matthew Flatt. 2011. Creating Languages in Racket. Queue 9, 11, (Nov 2011).
[3]
C.L. Hedrick. 1988. Routing information protocol.
[4]
Graphical Network Simulator-3. URL http://www.gns3.com
[5]
Internet Engineering Task Force (IETF). URL https://www.ietf.org
[6]
O. Lassila and R.R. Swick. 1999. Resource Description Framework (RDF) Model and Syntax Specification. URL http://www.w3.org/TR/1999/REC-rdf-syntax-19990222.
[7]
R.A. Martin and S. Barnum. 2008. Common weakness enumeration (CWE) status update. Ada Letters, XXVIII (1):88--91.
[8]
J. McCarthy. 1960. Recursive functions of symbolic expressions and their computation by machine, Part I. Commun. ACM 3, 4 (April 1960), 184--195.
[9]
MITRE. 2008. Common weakness enumeration (CWE). URL http://cwe.mitre.org/data/slices/2000.html
[10]
A. Repenning and A. Ioannidou. 2007. X-expressions in XMLisp: S-expressions and extensible markup language unite. In Proceedings of the 2007 International Lisp Conference (ILC '07). ACM, New York, NY, USA.
[11]
rdf4j. URL http://rdf4j.org

Cited By

View all
  • (2023)Ensuring the Security of Defense IoT Through Automatic Code GenerationIoT for Defense and National Security10.1002/9781119892199.ch16(307-323)Online publication date: 6-Jan-2023

Index Terms

  1. Automatic generation of network element software (AGNES): short paper

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CISRC '17: Proceedings of the 12th Annual Conference on Cyber and Information Security Research
      April 2017
      106 pages
      ISBN:9781450348553
      DOI:10.1145/3064814
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 April 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. automatic code generation
      2. network security
      3. software vulnerabilities
      4. software weaknesses

      Qualifiers

      • Short-paper

      Conference

      CISRC'17

      Acceptance Rates

      CISRC '17 Paper Acceptance Rate 8 of 22 submissions, 36%;
      Overall Acceptance Rate 69 of 136 submissions, 51%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Ensuring the Security of Defense IoT Through Automatic Code GenerationIoT for Defense and National Security10.1002/9781119892199.ch16(307-323)Online publication date: 6-Jan-2023

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media