A Framework for Practical Dynamic Software Updating

被引:8
作者
Chen, Gang [1 ,2 ]
Jin, Hai [1 ]
Zou, Deqing [1 ]
Liang, Zhenkai [3 ]
Zhou, Bing Bing [4 ]
Wang, Hao [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab, Wuhan 430074, Peoples R China
[2] Wuhan Second Ship Design & Res Inst, Wuhan, Peoples R China
[3] Natl Univ Singapore, Sch Comp, Dept Comp Sci, Singapore 117548, Singapore
[4] Univ Sydney, Ctr Distributed & High Performance Comp, Sch Informat Technol, Sydney, NSW 2006, Australia
基金
美国国家科学基金会;
关键词
Dynamic software updating; stack updating; patching;
D O I
10.1109/TPDS.2015.2430854
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dynamic software updating (DSU) enables a program to be patched on the fly without being shutdown. This paper addresses the practicality problem of the recent research on DSU systems, and presents Replus, a new DSU system that balances practicality and functionality. Replus aims to retain backward binary compatibility and support multi-threaded programs. In addition, it does not require customers to have developer-level software knowledge. More importantly, without specific compiler support, Replus can patch programs that are difficult to be updated at runtime, as well as programs that may incur an indefinite delay in DSU. The key technique of our solution is to update the stack elements for the patched program using two new mechanisms: Immediate Stack Updating, which immediately updates the stack of a thread, and timely stack updating, which only updates the stack frames of the necessary functions without affecting others. Replus also develops an Instruction Level Updating mechanism, which is more efficient for certain security patches. We used popular server applications as test suites to evaluate the effectiveness of Replus. The experimental results demonstrated that Replus can successfully update all the test suites with negligible impact on application performance.
引用
收藏
页码:941 / 950
页数:10
相关论文
共 24 条
[1]  
Altekar G, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P287
[2]  
[Anonymous], 2015, DESIGN ERROR APACHE
[3]  
[Anonymous], 2015, APACHE MOD REWRITE O
[4]  
[Anonymous], 2015, IDAPRO MULTIPROCESSO
[5]  
[Anonymous], 2015, PROFTPD REMOTE VULNE
[6]  
Arnold J, 2009, EUROSYS'09: PROCEEDINGS OF THE FOURTH EUROSYS CONFERENCE, P187
[7]   A lightweight software fault-tolerance system in the cloud environment [J].
Chen, Gang ;
Jin, Hai ;
Zou, Deqing ;
Zhou, Bing Bing ;
Qiang, Weizhong .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12) :2982-2998
[8]   SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities [J].
Chen, Gang ;
Jin, Hai ;
Zou, Deqing ;
Zhou, Bing Bing ;
Liang, Zhenkai ;
Zheng, Weide ;
Shi, Xuanhua .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (06) :368-379
[9]  
Chen HB, 2007, PROC INT CONF SOFTW, P271
[10]  
Costa M., 2005, P 21 ACM SIGOPS S OP, P133