Virtual Machines Jailed

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Machines Jailed Virtual Machines Jailed Virtualization in Systems with Small Trusted Computing Bases Michael Peter, Henning Schild, Adam Lackorzynski, Alexander Warg Technische Universität Dresden Department of Computer Science Operating Systems Group {peter, hschild, adam, warg}@os.inf.tu-dresden.de ABSTRACT Linux kernel contains about 200,000 SLOC and the majority 2 The trusted computing base of legacy applications can be of production con gurations are signi cantly larger . With reduced signi cantly by separating their security{critical such a size, vulnerabilities are unavoidable[3]. Even worse, parts into dedicated protection domains. As yet, paravir- the attacker does not need to compromise the kernel, as tualization has been used to host the non{secure portion. it is sucient to gain control over one of several processes The applicability of this approach is limited by the need of running with superuser privileges. For example, current X11 source code access. We show how to implement ecient implementations comprise 1.25 million lines of code. Bu er virtual machines in a microkernel{based system enabling over ows, as observed in the past [4], have the potential to the reuse of arbitrary operating systems. We found that seize complete control over the machine. the performance is on par with other virtual machine imple- With about two defects per 1,000 SLOC [17] produced mentations, while security{sensitive applications retain their even by leading software-development organizations, error- small trusted computing base. In fact, the kernel growth free software is elusive in the foreseeable future and other is marginal (500 SLOC), other security{critical components mitigations should be considered. Proposed for more than are not a ected. three decades [22], subdividing software into trusted and untrusted components has eventually been recognized as the best practice [24, 12, 21, 20, 11]. Categories and Subject Descriptors Microkernels have a record for being a suitable foundation D.4.6 [Operating Systems]: Security Kernels; D.4.8 upon which highly decomposed systems can be built. As for [Operating Systems]: Performance any novel system, lack of applications is an issue. From the technical point of view, building a completely new General Terms operating system stack with desirable properties followed by porting applications is the most appealing solution. But Design, Security, Performance it also comes with the highest costs. A more pragmatic approach is to port whole legacy systems which obviates Keywords changes to applications. Nonetheless the kernel has to be Virtualization, Small Trusted Computing Base, Secure Sys- adapted to run on top of the microkernel instead of bare tems, Microkernel hardware. Although possible, porting is labor{intensive or even impossible without source code access. In this paper, we show how a microkernel can be extended 1. INTRODUCTION to support CPU and memory virtualization both of which Visiting the web page of his bank, a user must trust are crucial for the implementation of virtual machines software on his machine that can easily comprise millions of (VMs). We start with a small system where the security source lines of code (SLOC). Contemporary web browsers, critical core system, i.e. the kernel and base infrastructure, 1 such as Firefox, which alone accounts for 2.5 million SLOC contains less than 150,000 SLOC. Adding support for virtu- are targeted recurrently[2]. Private data may be exposed alization resulted in a modest growth of 500 SLOC in kernel possibly resulting in personal distress or nancial losses. size, which was the only increase of the trusted computing Considering the size of trusted components, the situation base (TCB) for security{concerned applications. is similar at the system level. A minimal con guration of the We will proceed as follows: Section 2 will revisit the 1Firefox 3.0 measured with David A. Wheelers SLOCCount fundamentals, before the design is described in Section 3. Our evaluation in Section 4 shows that the performance is on par with established solutions, which is noteworthy because previous secure systems often had to pay a security tax. Related work will be discussed in Section 5 and will be followed by concluding remarks. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in VTDS 2009, March 31, 2009, Nuremberg, Germany. 2 Copyright 2009 ACM 978-1-60558-473-7 ...$5.00. Linux 2.6.29 comprises about 7 million SLOC 2. BACKGROUND 2.2 Splitting Applications The conceptionally most appealing approach | rebuilding 2.1 Microkernel-based Systems an application with a small TCB | is impractical in most Microkernels grew out of the insight that error{prone cases. This can be illustrated with the example of a device drivers should not reside in a location where isolation contemporary web browser: Given that a browser runs on cannot be enforced; and neither should resource allocation a secure operating system, it still has a TCB of hundreds policies, which have the potential of yielding much better of thousands, if not millions of lines of code. Modern performance, if user{level knowledge is incorporated. web pages apply sophisticated transformations to adapt Following the L4 [16] philosophy, L4/Fiasco aims at their presentation. They often use scripting, which is minimality in the kernel. Functionality is only admitted indispensable for rich web applications, and employ plugins into the kernel if either it cannot be implemented at for more elaborate dynamic content. user{level without compromising on security, or an user{ If an application has to be available then there is no other level implementation had a severely adverse impact on choice than to make sure that all contributing components 3 performance. Page table related operations (address space are also available. Fortunately, security has less stringent construction) are an example for the former, scheduling is requirements. For many use cases it is acceptable that an one for the latter. application fails as long as there are no harmful e ects. As communication overhead had proven to be crucial for An example is an online banking transaction as described the viability of a microkernel, early work on L4 was primarily in [23], where a full featured web browser is usually involved. focused on inter-process communication (IPC) performance, The user authorizes a bank transfer with a Transaction which was a prerequisite for ne-grained isolation. When Authentication Number (TAN) where it needs to be made this problem was solved the attention turned towards secu- sure that the TAN is not stolen or data of the transaction rity, where the global name space was swiftly identi ed as is modi ed by intruders. In a split application scenario the problematic. Various development lines arose all with the user uses his regular web browser but the nal transaction goal to adopt a capability{based access control mechanism, is displayed by a secure component and the TAN is entered which had been advocated as the method of choice [19]. only there. The secure side also handles the encryption of Our e orts have resulted in L4/Fiasco, a microkernel which the transaction, which is nally sent to the bank via the employs capability mediation for all kernel objects. legacy operating system. This scenario handles threats like In the remainder of this section, we will brie y intro- keyloggers or viruses that exploit vulnerabilities somewhere duce L4 mechanisms as far as they are needed for the in the sizable software stack. comprehension. An L4 task embodies a protection domain and serves as a container for resources such as memory. 3. DESIGN AND IMPLEMENTATION L4 threads, the unit of scheduling, execute in tasks and The objective of our design is the support of virtual communicate via synchronous IPC. Apart from simple machines in an environment that at the same time allows message exchange, IPC is also used for capability transfer for secure applications with a small TCB. Secure applica- and fault re ection. In L4{speak, granting capabilities via tions may use VM{hosted functionality through the split IPC is called mapping, the revocation is called unmapping. application design pattern (see Section 2.2). A pager is a program that ful ls the role of handling faults by mapping capabilities. The size of an appropriately con gured development 3.1 Virtualization Aspects version of L4/Fiasco is approximately 26,000 SLOC, which The implementation of a virtual machine can be broken is two orders of magnitude smaller than current commodity down into virtualization of the CPU and memory and device monolithic kernels. virtualization. A microkernel is of little use on its own. It is rather CPU and memory virtualization are tightly coupled and the microkernel{based system that provides utility to the critical to the performance of a VM. It is desirable to end user. The execution environment needs to supply basic execute as many instruction as possible natively on the functionality, such as memory management, CPU and device processor. Recent virtualization extensions in commodity resources, infrastructure and service discovery, or common processors allow for ecient CPU virtualization with low application libraries. software complexity. Switching CPU execution modes is a Based on the kernel mechanisms we developed a runtime highly intrusive operation that involves page tables de ning environment that provides this set of abstractions. It's the execution environment. Since only the kernel can overall structure is hierarchical and allows the construction guarantee the validity of page tables, this operation has to be of isolated compartments with di ering characteristics. integrated into the kernel's protection domain management. Some avor of virtualization is the most convenient way The guest in a VM employs it's own virtual memory de ning it through page tables in (guest) physical memory which to provide access to legacy applications.
Recommended publications
  • Understanding the Syntactic Rule Usage in Java
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by UCL Discovery Understanding the Syntactic Rule Usage in Java Dong Qiua, Bixin Lia,∗, Earl T. Barrb, Zhendong Suc aSchool of Computer Science and Engineering, Southeast University, China bDepartment of Computer Science, University College London, UK cDepartment of Computer Science, University of California Davis, USA Abstract Context: Syntax is fundamental to any programming language: syntax defines valid programs. In the 1970s, computer scientists rigorously and empirically studied programming languages to guide and inform language design. Since then, language design has been artistic, driven by the aesthetic concerns and intuitions of language architects. Despite recent studies on small sets of selected language features, we lack a comprehensive, quantitative, empirical analysis of how modern, real-world source code exercises the syntax of its programming language. Objective: This study aims to understand how programming language syntax is employed in actual development and explore their potential applications based on the results of syntax usage analysis. Method: We present our results on the first such study on Java, a modern, mature, and widely-used programming language. Our corpus contains over 5,000 open-source Java projects, totalling 150 million source lines of code (SLoC). We study both independent (i.e. applications of a single syntax rule) and dependent (i.e. applications of multiple syntax rules) rule usage, and quantify their impact over time and project size. Results: Our study provides detailed quantitative information and yields insight, particularly (i) confirming the conventional wisdom that the usage of syntax rules is Zipfian; (ii) showing that the adoption of new rules and their impact on the usage of pre-existing rules vary significantly over time; and (iii) showing that rule usage is highly contextual.
    [Show full text]
  • Development of an Enhanced Automated Software Complexity Measurement System
    Journal of Advances in Computational Intelligence Theory Volume 1 Issue 3 Development of an Enhanced Automated Software Complexity Measurement System Sanusi B.A.1, Olabiyisi S.O.2, Afolabi A.O.3, Olowoye, A.O.4 1,2,4Department of Computer Science, 3Department of Cyber Security, Ladoke Akintola University of Technology, Ogbomoso, Nigeria. Corresponding Author E-mail Id:- [email protected] [email protected] [email protected] 4 [email protected] ABSTRACT Code Complexity measures can simply be used to predict critical information about reliability, testability, and maintainability of software systems from the automatic measurement of the source code. The existing automated code complexity measurement is performed using a commercially available code analysis tool called QA-C for the code complexity of C-programming language which runs on Solaris and does not measure the defect-rate of the source code. Therefore, this paper aimed at developing an enhanced automated system that evaluates the code complexity of C-family programming languages and computes the defect rate. The existing code-based complexity metrics: Source Lines of Code metric, McCabe Cyclomatic Complexity metrics and Halstead Complexity Metrics were studied and implemented so as to extend the existing schemes. The developed system was built following the procedure of waterfall model that involves: Gathering requirements, System design, Development coding, Testing, and Maintenance. The developed system was developed in the Visual Studio Integrated Development Environment (2019) using C-Sharp (C#) programming language, .NET framework and MYSQL Server for database design. The performance of the system was tested efficiently using a software testing technique known as Black-box testing to examine the functionality and quality of the system.
    [Show full text]
  • The Commenting Practice of Open Source
    The Commenting Practice of Open Source Oliver Arafat Dirk Riehle Siemens AG, Corporate Technology SAP Research, SAP Labs LLC Otto-Hahn-Ring 6, 81739 München 3410 Hillview Ave, Palo Alto, CA 94304, USA [email protected] [email protected] Abstract lem domain is well understood [15]. Agile software devel- opment methods can cope with changing requirements and The development processes of open source software are poorly understood problem domains, but typically require different from traditional closed source development proc- co-location of developers and fail to scale to large project esses. Still, open source software is frequently of high sizes [16]. quality. This raises the question of how and why open A host of successful open source projects in both well source software creates high quality and whether it can and poorly understood problem domains and of small to maintain this quality for ever larger project sizes. In this large sizes suggests that open source can cope both with paper, we look at one particular quality indicator, the den- changing requirements and large project sizes. In this pa- sity of comments in open source software code. We find per we focus on one particular code metric, the comment that successful open source projects follow a consistent density, and assess it across 5,229 active open source pro- practice of documenting their source code, and we find jects, representing about 30% of all active open source that the comment density is independent of team and pro- projects. We show that commenting source code is an on- ject size. going and integrated practice of open source software de- velopment that is consistently found across all these pro- Categories and Subject Descriptors D.2.8 [Metrics]: jects.
    [Show full text]
  • Differences in the Definition and Calculation of the LOC Metric In
    Differences in the Definition and Calculation of the LOC Metric in Free Tools∗ István Siket Árpád Beszédes Department of Software Engineering Department of Software Engineering University of Szeged, Hungary University of Szeged, Hungary [email protected] [email protected] John Taylor FrontEndART Software Ltd. Szeged, Hungary [email protected] Abstract The software metric LOC (Lines of Code) is probably one of the most controversial metrics in software engineering practice. It is relatively easy to calculate, understand and use by the different stakeholders for a variety of purposes; LOC is the most frequently applied measure in software estimation, quality assurance and many other fields. Yet, there is a high level of variability in the definition and calculation methods of the metric which makes it difficult to use it as a base for important decisions. Furthermore, there are cases when its usage is highly questionable – such as programmer productivity assessment. In this paper, we investigate how LOC is usually defined and calculated by today’s free LOC calculator tools. We used a set of tools to compute LOC metrics on a variety of open source systems in order to measure the actual differences between results and investigate the possible causes of the deviation. 1 Introduction Lines of Code (LOC) is supposed to be the easiest software metric to understand, compute and in- terpret. The issue with counting code is determining which rules to use for the comparisons to be valid [5]. LOC is generally seen as a measure of system size expressed using the number of lines of its source code as it would appear in a text editor, but the situation is not that simple as we will see shortly.
    [Show full text]
  • Projectcodemeter Users Manual
    ProjectCodeMeter ProjectCodeMeter Pro Software Development Cost Estimation Tool Users Manual Document version 202000501 Home Page: www.ProjectCodeMeter.com ProjectCodeMeter Is a professional software tool for project managers to measure and estimate the Time, Cost, Complexity, Quality and Maintainability of software projects as well as Development Team Productivity by analyzing their source code. By using a modern software sizing algorithm called Weighted Micro Function Points (WMFP) a successor to solid ancestor scientific methods as COCOMO, COSYSMO, Maintainability Index, Cyclomatic Complexity, and Halstead Complexity, It produces more accurate results than traditional software sizing tools, while being faster and simpler to configure. Tip: You can click the icon on the bottom right corner of each area of ProjectCodeMeter to get help specific for that area. General Introduction Quick Getting Started Guide Introduction to ProjectCodeMeter Quick Function Overview Measuring project cost and development time Measuring additional cost and time invested in a project revision Producing a price quote for an Existing project Monitoring an Ongoing project development team productivity Evaluating development team past productivity Evaluating the attractiveness of an outsourcing price quote Predicting a Future project schedule and cost for internal budget planning Predicting a price quote and schedule for a Future project Evaluating the quality of a project source code Software Screen Interface Project Folder Selection Settings File List Charts Summary Reports Extended Information System Requirements Supported File Types Command Line Parameters Frequently Asked Questions ProjectCodeMeter Introduction to the ProjectCodeMeter software ProjectCodeMeter is a professional software tool for project managers to measure and estimate the Time, Cost, Complexity, Quality and Maintainability of software projects as well as Development Team Productivity by analyzing their source code.
    [Show full text]
  • Counting Software Size: Is It As Easy As Buying a Gallon of Gas?
    Counting Software Size: Is It as Easy as Buying A Gallon of Gas? October 22, 2008 NDIA – 11th Annual Systems Engineering Conference Lori Vaughan and Dean Caccavo Northrop Grumman Mission Systems Office of Cost Estimation and Risk Analysis Agenda •Introduction • Standards and Definitions •Sample • Implications •Summary 2 NORTHOP GRUMMAN CORPORTION© Introduction • In what ways is software like gasoline? • In what ways is software not like gasoline? 3 NORTHOP GRUMMAN CORPORTION© Industry Data Suggests… • A greater percentage of the functions of the DoD Weapon Systems are performed by software System Functionality Requiring Software • Increased amount of software in Space Systems and DoD Weapon Systems – Ground, Sea and Space/Missile • Increased amount of software in our daily lives: – Cars, Cell Phones, iPod, Appliances, PDAs… Code Size/Complexity Growth The amount of software used in DoD weapon systems has grown exponentially 4 NORTHOP GRUMMAN CORPORTION© Is There a Standard for Counting Software? • Since, increasing percent of our DoD systems are reliant on software we need to be able to quantify the software size – Historical data collection – Estimation and planning – Tracking and monitoring during program performance • Software effort is proportional to the size of the software being developed – SW Engineering Economics 1981 by Dr. Barry Boehm • “Counting” infers there is a standard • Experience as a prime integrator – Do not see a standard being followed There are software counting standards but the message isn’t out or it is not being followed consistently 5 NORTHOP GRUMMAN CORPORTION© Source Line of Code definition From Wikipedia, the free encyclopedia ”Source lines of code (SLOC) is a software metric used to measure the size of a software program by counting the number of lines in the text of the program's source code.
    [Show full text]
  • Empirical Software Engineering at Microsoft Research
    Software Productivity Decoded How Data Science helps to Achieve More Thomas Zimmermann, Microsoft Research, USA © Microsoft Corporation © Microsoft Corporation What makes software engineering research at Microsoft unique? Easy access to industrial problems and data Easy access to engineers Near term impact Collaborations with Microsoft researchers Collaborations with external researchers © Microsoft Corporation Product group engagement © Microsoft Corporation What metrics are the If I increase test coverage, will that best predictors of failures? actually increase software quality? What is the data quality level Are there any metrics that are indicators of used in empirical studies and failures in both Open Source and Commercial how much does it actually domains? matter? I just submitted a bug report. Will it be fixed? Should I be writing unit tests in my software How can I tell if a piece of software will have vulnerabilities? project? Is strong code ownership good or Do cross-cutting concerns bad for software quality? cause defects? Does Distributed/Global software Does Test Driven Development (TDD) development affect quality? produce better code in shorter time? © Microsoft Corporation Data Science Productivity © Microsoft Corporation Data Science © Microsoft Corporation Use of data, analysis, and systematic reasoning to [inform and] make decisions 17 © Microsoft Corporation Web analytics (Slide by Ray Buse) © Microsoft Corporation Game analytics Halo heat maps Free to play © Microsoft Corporation Usage analytics Improving the File Explorer for Windows 8 Explorer in Windows 7 Alex Simons: Improvements in Windows Explorer. http://blogs.msdn.com/b/b8/archive/2011/08/29 /improvements-in-windows-explorer.aspx © Microsoft Corporation Trinity of software analytics Dongmei Zhang, Shi Han, Yingnong Dang, Jian-Guang Lou, Haidong Zhang, Tao Xie: Software Analytics in Practice.
    [Show full text]
  • Investigating the Applicability of Software Metrics and Technical Debt on X++ Abstract Syntax Tree in XML Format – Calculations Using Xquery Expressions
    Linköping University | Department of Computer and Information Science Master’s thesis, 30 ECTS | Datateknik 202019 | LIU-IDA/LITH-EX-A--2019/101--SE Investigating the applicability of Software Metrics and Technical Debt on X++ Abstract Syntax Tree in XML format – calculations using XQuery expressions Tillämpning av mjukvarumetri och tekniska skulder från en XML representation av abstrakta syntaxträd för X++ kodprogram David Tran Supervisor : Jonas Wallgren Examiner : Martin Sjölund External supervisor : Laurent Ricci Linköpings universitet SE–581 83 Linköping +46 13 28 10 00 , www.liu.se Upphovsrätt Detta dokument hålls tillgängligt på Internet ‐ eller dess framtida ersättare ‐ under 25 år frånpublicer‐ ingsdatum under förutsättning att inga extraordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstakako‐ pior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervis‐ ning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. Allannan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säker‐ heten och tillgängligheten finns lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsman‐ nens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/. Copyright The publishers will keep this document online on the Internet ‐ or its possible replacement ‐ for a period of 25 years starting from the date of publication barring exceptional circumstances.
    [Show full text]
  • SOFTWARE METRICS TOOL a Paper
    SOFTWARE METRICS TOOL A Paper Submitted to the Graduate Faculty of the North Dakota State University of Agriculture and Applied Science By Vijay Reddy Reddy In Partial Fulfillment of the Requirements for the Degree of MASTER OF SCIENCE Major Department: Computer Science July 2016 Fargo, North Dakota North Dakota State University Graduate School Title SOFTWARE METRICS TOOL By Vijay Reddy Reddy The Supervisory Committee certifies that this disquisition complies with North Dakota State University’s regulations and meets the accepted standards for the degree of MASTER OF SCIENCE SUPERVISORY COMMITTEE: Kenneth Magel Chair Kendall Nygard Bernhardt Saini-Eidukat Approved: August 4, 2016 Brian M. Slator Date Department Chair ABSTRACT A software metric is the measurement of a particular characteristic of a software program. These metrics are very useful for optimizing the performance of the software, managing resources, debugging, schedule planning, quality assurance and periodic calculation of software metrics increases the success rate of any software project. Therefore, a software metrics tool is developed in this research which provides an extensible way to calculate software metrics. The tool developed is a web-based application which has the ability to calculate some of the important software metrics and statistics as well. It also provides a functionality to the user to add additional metrics and statistics to the application. This software metrics tool is a language- dependent tool which calculates metrics and statistics for only C# source files. iii ACKNOWLEDGEMENTS Though only my name appears on the cover of this disquisition, a great many people have contributed to its production. I owe my gratitude to all those people who have made this possible and because of whom my graduate experience has been one that I will cherish forever.
    [Show full text]
  • Measuring Woody: the Size of Debian 3.0∗
    Measuring Woody: The Size of Debian 3.0∗ Juan Jose´ Amor, Gregorio Robles, and Jesus´ M. Gonzalez-Barahona´ December 2004 Keywords libre software, Debian, GNU/Linux, libre software engineering, lines of code, SLOC, COCOMO Legal Notice Copyright (cc) 2004 Juan Jose´ Amor, Gregorio Robles and Jesus´ M. Gonzalez-Barahona.´ Some rights reserved. This work is licensed under the Creative Commons Attribution-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/2.0/ or send a letter to Cre- ative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Abstract Debian is possibly the largest free software distribution, with well over 4,500 source packages in the latest stable release (Debian 3.0) and more than 8,000 source packages in the release cur- rently in preparation. However, we wish to know what these numbers mean. In this paper, we use David A. Wheeler’s SLOCCount system to determine the number of physical source lines of code (SLOC) of Debian 3.0 (aka woody). We show that Debian 3.0 includes more than 105,000,000 physical SLOC (almost twice than Red Hat 9, released about 8 months later), showing that the Debian development model (based on the work of a large group of voluntary developers spread around the world) is at least as capable as other development methods (like the more centralized one, based on the work of employees, used by Red Hat or Microsoft) to manage distributions of this size. It is also shown that if Debian had been developed using traditional proprietary methods, the COCOMO model estimates that its cost would be close to $6.1 billion USD to develop Debian 3.0.
    [Show full text]
  • Mobile Open Source Economic Analysis
    Mobile Open Source Economic Analysis LiMo Foundation White Paper August 2009 ™ ™ White Paper 1 Executive Summary It is possible to use quantitative techniques to examine a number of the proposed economic benefits of open source software. The claimed benefits are a reduction in cost of acquisition, access to innovation and cost of ownership of software technology. The quantitative techniques we use to conduct our analysis are based on measuring source lines of code (SLOC) applied to publicly accessible open source project repositories. To aid our analysis, we have developed a command line tool to mine information on open source projects using the ohloh1 web service. Based on this analysis, Based on this analysis, there is a strong case for constructive engagement with there is a strong case for open source communities where the corresponding open source software constructive engagement components are used within a collaboratively developed, open mobile software with open source platform such as the LiMo Platform™. communities... There is additionally a case for mobile software platform providers to consider using certain strategic open source projects as the basis for development of new functionality on their roadmap. There is no proven case within this analysis for converting existing proprietary items already within a mobile software platform to open source. To conduct a cost-benefit analysis of that scenario would require examination of more factors than SLOC alone. 1http://www.ohloh.net ™ White Paper 1 1. Introduction The subject of open source is increasingly important in relation to mobile device platforms and in view of this, it is vital to understand the underlying economic factors driving the use of open source software in a mobile context.
    [Show full text]
  • Evaluating Complexity, Code Churn, and Developer Activity Metrics As Indicators of Software Vulnerabilities
    > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO 1 EDIT) < Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities Yonghee SHIN , Student Member, IEEE , Andrew MENEELY , Student Member , IEEE , Laurie WILLIAMS, Member, IEEE, and Jason OSBORNE Abstract -- Post-release detection of a software vulnerability does not only cost a company money to fix, but also results in loss of reputation and damaging litigation. Techniques to prevent and detect vulnerabilities prior to release, therefore, are valuable. We performed empirical case studies on two large, widely-used open source projects: the Mozilla Firefox web browser and the Red Hat Enterprise Linux kernel. We investigated whether software metrics obtained early in the software development life cycle are discriminative of vulnerable code locations, and can guide actions for an organization to take for improvement of code and development team. We also investigated whether the metrics are predictive of vulnerabilities so that prediction models can prioritize validation and verification efforts. The metrics fall into three categories: complexity, code churn, and developer activity metrics. The results indicate that the metrics are discriminative and predictive of vulnerabilities. The predictive model on the three categories of metrics predicted 70.8% of the known vulnerabilities by selecting only 10.9% of the project’s files. Similarly, the model for the Red Hat Enterprise Linux kernel found 68.8% of the known vulnerabilities by selecting only 13.0% of the files. Index Terms -- Software Security, Software Vulnerability, Process metrics, Product metrics, Fault Prediction, Vulnerability Prediction. I. INTRODUCTION A single security problem can cause severe damage to an organization by not only incurring large costs for late fixes, but by losing invaluable assets and credibility and leading to legal issues.
    [Show full text]