{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:43Z","timestamp":1750308103991,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2005,5,15]],"date-time":"2005-05-15T00:00:00Z","timestamp":1116115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>Many researchers are investigating the use of adaptive program transformation as a way to efficiently improve program performance. Performance improving transformations are performed at runtime to adapt to the possibly changing runtime characteristics of the program. Leveraging this kind of program transformation on multiple hosts can achieve these same performance gains while reducing the overhead to apply the transformations on the local machine running the program. The reduction in overhead is obtained by distributing the responsibilities for the transformation process to multiple hosts throughout the network. The use of this technology could greatly benefit applications running on networked computation nodes; however, one must first establish confidence in the secure generation and distribution of the transformed versions of the original program before acceptance and execution can occur for many network environments.Since programs are being transformed dynamically, traditional program validation methods such as checksums and digital signatures will be unable to efficiently meet the security needs of this possibly itinerant, transforming software. New validation methods must be developed in order to allow future software to avail itself of the advantages that dynamic program modification may provide while mitigating potential security risks. In this paper, we present our framework to validate dynamically-transforming software in a manner that enables the system to restrict how the software can transform as it executes on a network of hosts. Our prototype system utilizes specification languages to communicate program transformations and controls for those transformations on hosts in the system. This first step towards validating evolving mobile code before transformation occurs, will make dynamically-transforming software a safe and viable future technology.<\/jats:p>","DOI":"10.1145\/1082983.1083210","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling control over adaptive program transformation for dynamically evolving mobile software validation"],"prefix":"10.1145","volume":"30","author":[{"given":"Mike","family":"Jochen","sequence":"first","affiliation":[{"name":"University of Delaware, Newark, DE"}]},{"given":"Anteneh Addis","family":"Anteneh","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE"}]},{"given":"Lori L.","family":"Pollock","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE"}]},{"given":"Lisa M.","family":"Marvel","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory, MD"}]}],"member":"320","published-online":{"date-parts":[[2005,5,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/871816.871860"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353175"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582432"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349303"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology","author":"Bierman E.","year":"2002","unstructured":"E. Bierman and E. Cloete . Classification of malicious host threats in mobile agent computing . In Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology , 2002 .]] E. Bierman and E. Cloete. Classification of malicious host threats in mobile agent computing. In Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, 2002.]]"},{"key":"e_1_2_1_6_1","unstructured":"Bluetooth SIG. Specification of the Bluetooth System. http:\/\/www.bluetooth.org 2003.]]  Bluetooth SIG. Specification of the Bluetooth System. http:\/\/www.bluetooth.org 2003.]]"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/648051.746186"},{"key":"e_1_2_1_9_1","first-page":"169","volume-title":"Proceedings of the 11th USENIX Security Symposium","author":"Christodorescu M.","year":"2003","unstructured":"M. Christodorescu and S. Jha . Static analysis of executables to detect malicious patterns . In Proceedings of the 11th USENIX Security Symposium , pages 169 -- 186 , Aug. 2003 .]] M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. In Proceedings of the 11th USENIX Security Symposium, pages 169--186, Aug. 2003.]]"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/358438.349306"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00201-8"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336559"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/264107.264126"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30191-2_15"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2004.1494983"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/951952.952373"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2003.1290205"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/950785.950899"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.364"},{"key":"e_1_2_1_21_1","first-page":"2104","article-title":"HMAC: Keyed-hashing for message authentication","author":"Krawczyk H.","year":"1997","unstructured":"H. Krawczyk , M. Bellare , and R. Canetti . HMAC: Keyed-hashing for message authentication . RFC 2104 , 1997 .]] H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. RFC 2104, 1997.]]","journal-title":"RFC"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"key":"e_1_2_1_23_1","volume-title":"Morgan Kaufmann","author":"Muchnick S. S.","year":"2000","unstructured":"S. S. Muchnick . Advanced Compiler Design and Implementation . Morgan Kaufmann , 2000 .]] S. S. Muchnick. Advanced Compiler Design and Implementation. Morgan Kaufmann, 2000.]]"},{"key":"e_1_2_1_24_1","first-page":"186","article-title":"Digital signature standard","author":"National Institute of Standards and Technology","year":"1994","unstructured":"National Institute of Standards and Technology . Digital signature standard . NIST FIPS PUB 186 , 1994 .]] National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, 1994.]]","journal-title":"NIST FIPS PUB"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/962757.963293"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566186"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/379539.379583"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/267959.267960"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083210","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1082983.1083210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:05Z","timestamp":1750262885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5,15]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1082983.1083210"],"URL":"https:\/\/doi.org\/10.1145\/1082983.1083210","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1083200.1083210","asserted-by":"subject"}]},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,5,15]]},"assertion":[{"value":"2005-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}