Trusted Software Repair for System Resiliency

Westley Weimer, Stephanie Forrest, Miryung Kim, Claire Le Goues, Patrick Hurley

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

We describe ongoing work to increase trust in resilient software systems. Automated software repair techniques promise to increase system resiliency, allowing missions to continue in the face of software defects. While anumber of program repair approaches have been proposed, the most scalableand applicable of those techniques can be the most difficult to trust. Using approximate solutions to the oracle problem, we consider threeapproaches by which trust can be re-established in a post-repair system. Each approach learns or infers a different form of partial model of correctbehavior from pre-repair observations, post-repair systems are evaluatedwith respect to those models. We focus on partial oracles modeled fromexternal execution signals, derived from similar code fragment behavior, and inferred from invariant relations over local variables. We believethese three approaches can provide an expanded assessment of trust in arepaired, resilient system.

Original languageEnglish (US)
Title of host publicationProceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages238-241
Number of pages4
ISBN (Electronic)9781467388917
DOIs
StatePublished - Sep 22 2016
Externally publishedYes
Event46th IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016 - Toulouse, France
Duration: Jun 28 2016Jul 1 2016

Other

Other46th IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2016
Country/TerritoryFrance
CityToulouse
Period6/28/167/1/16

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Trusted Software Repair for System Resiliency'. Together they form a unique fingerprint.

Cite this