Research directions for automated software verification: using trusted hardware

  • Authors:
  • P. Devanbu;S. Stubblebine

  • Affiliations:
  • -;-

  • Venue:
  • ASE '97 Proceedings of the 12th international conference on Automated software engineering (formerly: KBSE)
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

Service providers hosting software on servers at the request of content providers need assurance that the hosted software has no undesirable properties. This problem applies to browsers which host applets, networked software which can host software agents, etc. The hosted software's properties are currently verified by testing and/or verification processes by the hosting computer. This increases cost, causes delay, and leads to difficulties in version control. By furnishing content providers with a physically secure computing device with an embedded certified private key, such properties can be verified and/or enforced by the secure computing device at the content provider's site; the secure device can verify such properties, statically whenever possible, and by inserting checks into the executable binary when necessary. The resulting binary is attested by a trusted signature, and can be hosted with confidence. The position paper is a preliminary report that outlines scientific and engineering goals in this project.