Using Rose and Compass for Authentication

Year
2009
Author(s)
Gregory K. White - Lawrence Livermore National Laboratory
Gregory K. White - Lawrence Livermore National Laboratory
Abstract
Many recent non-proliferation software projects include a software authentication component. In intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of securityspecific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.