Accession Number:

ADA624016

Title:

Research Areas 5: Securing Untrusted Binaries with Acceptance Testing and Field Monitoring

Descriptive Note:

Final rept. 1 May 2010-30 Apr 2014

Corporate Author:

VIRGINIA UNIV CHARLOTTESVILLE

Personal Author(s):

Report Date:

2014-11-25

Pagination or Media Count:

18.0

Abstract:

Today s Army relies on computing to effectively engage an increasingly sophisticated enemy. Using commercial off the shelf COTS software to build Army systems has many advantages reduced development costs, leveraging of vendor resources and expertise, and greater functionality. Unfortunately, COTS software often includes untrusted components that may contain any variety of uncaught coding errors, intentionally planted time or logic bombs, trojan horses, backdoors, or other features which can cause security violations.

Subject Categories:

  • Computer Programming and Software
  • Computer Systems Management and Standards

Distribution Statement:

APPROVED FOR PUBLIC RELEASE