Wrapping Windows NT Binary Executables for Failure Simulation

نویسنده

  • Anup K Ghosh
چکیده

In this short paper we describe a tool for testing the reliability and robustness of Windows NT soft ware applications under stressful environmental con ditions i e under system resource failure conditions Windows NT systems are increasingly being deployed in mission critical applications such as for command and control in US Navy ships However as re cently as July the Navy s Aegis missile cruiser USS Yorktown su ered a signi cant software problem in the Windows NT systems that control the smart ship that e ectively left the ship dead in the water The ship had to be towed to the Norfolk Naval ship yard because a database over ow error resulting from a divide by zero operation caused the ship s propul sion system to fail The research approach and prototype tool de scribed here are speci cally designed to analyze com mercial o the shelf COTS software for Win sys tems where source code is not released but binary executables are available for dynamic analysis The purpose of this research is to assess the robustness of software applications to failing system resources such as memory allocation functions and system I O func tions The tool gives an analyst the capability to ar ti cially simulate stressful conditions e g complete memory utilization that a program may experience during its lifetime using simple toggle functions

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing Alpha Executables on Windows NT with Spike

Vol. 9 No. 4 1997 3 Spike is a performance tool developed by DIGITAL to optimize Alpha executables on the Windows NT operating system. This optimization system has two main components: the Spike Optimizer and the Spike Optimization Environment. The Spike Optimizer reads in an executable, optimizes the code, and writes out the optimized version. The Optimizer uses profile feedback from previous ...

متن کامل

Classifying Malicious Windows Executables Using Anomaly Based Detection

CLASSIFYING MALICIOUS WINDOWS EXECUTABLES USING ANOMALY BASED DETECTION by Ronak Sutaria A malicious executable is broadly defined as any program or piece of code designed to cause damage to a system or the information it contains, or to prevent the system from being used in a normal manner. A generic term used to describe any kind of malicious software is Malware, which includes Viruses, Worms...

متن کامل

forqs: forward-in-time simulation of recombination, quantitative traits and selection

SUMMARY forqs is a forward-in-time simulation of recombination, quantitative traits and selection. It was designed to investigate haplotype patterns resulting from scenarios where substantial evolutionary change has taken place in a small number of generations due to recombination and/or selection on polygenic quantitative traits. AVAILABILITY AND IMPLEMENTATION forqs is implemented as a comm...

متن کامل

Moderating the Execution of Applications on Win32 Platforms

This paper describes an approach and tool for providing administrative control over the execution of software on a Windows NT/2000 system. The kerneldriver–based approach provides the system administrator with a way of restricting users to running only approved applications. As a result, illegal, pirated, personal, and malicious software executables can be prevented from running on corporate ma...

متن کامل

Rethinking Antivirus: Executable Analysis in the Network Cloud

Antivirus software installed on each end host in an organization has become the de-facto security mechanism used to defend against unwanted executables. We argue that the executable analysis currently provided by hostbased antivirus software can be more efficiently and effectively provided as an in-cloud network service. Instead of running complex analysis software on every end host, we suggest...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998