Research Areas 5: Securing Untrusted Binaries with Acceptance Testing and Field Monitoring
Final rept. 1 May 2010-30 Apr 2014
VIRGINIA UNIV CHARLOTTESVILLE
Pagination or Media Count:
Today s Army relies on computing to effectively engage an increasingly sophisticated enemy. Using commercial off the shelf COTS software to build Army systems has many advantages reduced development costs, leveraging of vendor resources and expertise, and greater functionality. Unfortunately, COTS software often includes untrusted components that may contain any variety of uncaught coding errors, intentionally planted time or logic bombs, trojan horses, backdoors, or other features which can cause security violations.
- Computer Programming and Software
- Computer Systems Management and Standards