Michael Ernst, page 1 Application Communities: Next steps MIT & Determina October 2006.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
® IBM Software Group © 2010 IBM Corporation What’s New in Profiling & Code Coverage RAD V8 April 21, 2011 Kathy Chan
Paradyn Project Paradyn / Dyninst Week College Park, Maryland March 26-28, 2012 Paradyn Project Upcoming Features in Dyninst and its Components Bill Williams.
David Brumley, Pongsin Poosankam, Dawn Song and Jiang Zheng Presented by Nimrod Partush.
Bug Isolation via Remote Program Sampling Ben Liblit, Alex Aiken, Alice X.Zheng, Michael I.Jordan Presented by: Xia Cheng.
ACE: Exploiting Correlation for Energy-Efficient and Continuous Context Sensing Suman Nath Microsoft Research MobiSys 2012 Presenter: Jeffrey.
DEV392: Extending SharePoint Products And Technologies Through Web Parts And ASP.NET Clint Covington, Program Manager Data And Developer Services - Office.
February 21, 2008 Center for Hybrid and Embedded Software Systems Driving Application: 4D Tele-immersion Future Work Though.
© Prentice Hall CHAPTER 9 Application Development by Information Systems Professionals.
Michael Ernst, page 1 Improving Test Suites via Operational Abstraction Michael Ernst MIT Lab for Computer Science Joint.
@ NCSU Zhi NCSU Xuxian Microsoft Research Weidong Microsoft NCSU Peng NCSU ACM CCS’09.
Educational Computer Architecture Experimentation Tool Dr. Abdelhafid Bouhraoua.
This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October 2005.
- Chaitanya Krishna Pappala Enterprise Architect- a tool for Business process modelling.
Success status, page 1 Collaborative learning for security and repair in application communities MIT & Determina AC PI meeting July 10, 2007 Milestones.
Management Suite for Dell Servers The Power of Control! Kevin Winert, Dell OpenManage Product Marketing Bryan Rhodes, Dell Alliance Product Manager, Altiris.
PicsouGrid Viet-Dung DOAN. Agenda Motivation PicsouGrid’s architecture –Pricing scenarios PicsouGrid’s properties –Load balancing –Fault tolerance Perspectives.
Implementation Yaodong Bi. Introduction to Implementation Purposes of Implementation – Plan the system integrations required in each iteration – Distribute.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
Development and Impact of Software Solutions Application of software development approaches.
Self-defending software: Automatically patching security vulnerabilities Michael Ernst University of Washington.
Learning, Monitoring, and Repair in Application Communities Martin Rinard Computer Science and Artificial Intelligence Laboratory Massachusetts Institute.
Support for Debugging Automatically Parallelized Programs Robert Hood Gabriele Jost CSC/MRJ Technology Solutions NASA.
Scalable Analysis of Distributed Workflow Traces Daniel K. Gunter and Brian Tierney Distributed Systems Department Lawrence Berkeley National Laboratory.
SmartGRID Ongoing research work in Univ. Fribourg and Univ. Applied Sciences of Western Switzerland (HES-SO) SwiNG Grid Day, Bern, Nov. 26th, 2009 Ye HUANG.
The Daikon system for dynamic detection of likely invariants MIT Computer Science and Artificial Intelligence Lab. 16 January 2007 Presented by Chervet.
Determina DARPA PI meeting Page 2Confidential © Determina, Inc. Agenda LiveShield –Product and Technology –Current Status Applications to Application.
Self-defending software: Automatically patching errors in deployed software Michael Ernst University of Washington Joint work with: Saman Amarasinghe,
1 Yield Analysis and Increasing Engineering Efficiency Spotfire Users Conference 10/15/2003 William Pressnall, Scott Lacey.
INFSO-RI JRA 1 Testbed Management Technologies Alain Roy (University of Wisconsin-Madison, USA) ETICS 2 Final Review Brussels - 11 May 2010.
Grid Execution Management for Legacy Code Applications Grid Enabling Legacy Applications.
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
Computer Architecture Lecture 32 Fasih ur Rehman.
CSC480 Software Engineering Lecture 10 September 25, 2002.
Determina, Inc. Persisting Information Across Application Executions Derek Bruening Determina, Inc.
Demo of Scalable Pluggable Types Michael Ernst MIT Dagstuhl Seminar “Scalable Program Analysis” April 17, 2008.
Recording Actor Provenance in Scientific Workflows Ian Wootten, Shrija Rajbhandari, Omer Rana Cardiff University, UK.
Application Communities Phase II Technical Progress, Instrumentation, System Design, Plans March 10, 2009.
Module 9 Planning and Implementing Monitoring and Maintenance.
1 Chapter 3: Getting Started with Tasks 3.1 Introduction to Task Dialogs 3.2 Creating a Listing Report 3.3 Creating a Frequency Report 3.4 Creating a Two-Way.
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston,
Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Welcome.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
1st ACS Workshop UTFSM, Valparaiso, Chile ACS Course The Big Picture of ACS H. Sommer, G.Chiozzi.
A Binary Agent Technology for COTS Software Integrity Anant Agarwal Richard Schooler.
Application Communities Phase 2 (AC2) Project Overview Nov. 20, 2008 Greg Sullivan BAE Systems Advanced Information Technologies (AIT)
Presentation subtitle: 20pt Arial Regular, green R223 | G255 | B102 Recommended maximum length: 2 lines Confidentiality/date line: 13pt Arial Regular,
Software Systems Division (TEC-SW) ASSERT process & toolchain Maxime Perrotin, ESA.
Approaches to Intrusion Detection statistical anomaly detection – threshold – profile based rule-based detection – anomaly – penetration identification.
MIT/Determina Application Communities, page 1 Approved for Public Release, Distribution Unlimited - Case 9649 Collaborative learning for security and repair.
Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Conclusion.
Grid Execution Management for Legacy Code Architecture Exposing legacy applications as Grid services: the GEMLCA approach Centre.
Enabling Control over Adaptive Program Transformation for Dynamically Evolving Mobile Software Validation Mike Jochen, Anteneh Anteneh, Lori Pollock University.
October 20-23rd, 2015 FEEBO: A Framework for Empirical Evaluation of Malware Detection Resilience Against Behavior Obfuscation Sebastian Banescu Tobias.
© 2003, Carla Ellis Model Vague idea “groping around” experiences Hypothesis Initial observations Experiment Data, analysis, interpretation Results & final.
Constraint Framework, page 1 Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Constraints approach.
Jeremy Nimmer, page 1 Automatic Generation of Program Specifications Jeremy Nimmer MIT Lab for Computer Science Joint work with.
Application Communities
COTS testing Torbjørn Skramstad.
Names and Attributes Names are a key programming language feature
Chapter 8 – Software Testing
COTS testing Tor Stålhane.
COTS testing Tor Stålhane.
Community Awareness Initial Results
Can you put the symbols in?
Outline System architecture Experiments
Outline System architecture Current work Experiments Next Steps
Mark Quirk Head of Technology Developer & Platform Group
Presentation transcript:

Michael Ernst, page 1 Application Communities: Next steps MIT & Determina October 2006

Michael Ernst, page 2 Instrumentation Client Interface: Done: Working prototype - proof-of-concept integration with Daikon toolchain QA-certified client interface. Integrate symbol info when available Application State Probing: Create probes to test control flow over patches Liveshield coordination center: Import and deploy probes, and return data from them Hybrid System for Binary Analysis: Import a saved code cache from a previous or separate run.

Michael Ernst, page 3 Learning Windows executables Extend prototype tracing tool (e.g., pointers) Infer debug information from binaries Static and dynamic analysis Scale to larger programs Algorithmic changes to take advantage of falsifications Reduce false positives Statistical and machine learning approaches Mitigation strategies Repair or other approaches

Michael Ernst, page 4 Mutability inference and modeling Modeling Use generated tests Find anomalies before deployment Enrich models: augment user-supplied executions Apply models to anomaly detection Mutability More output: Enrich tracing tool Less output (& improve efficiency) Ignore non-modifying calls

Michael Ernst, page 5 Community Collaborative learning Communication of learned models, and attacks, to central resource Distribution of specifications, patches Proactive Situation Awareness: Done: Study of enterprise requirements Done: Community awareness initial experiment Prototype system implementation AC testbed: Put together the AC testbed Create initial scenarios

Michael Ernst, page 6 Evaluation Choose specific programs Select metrics Run experiments