COTS, the safety nightmare of component-oriented frameworks

Third party components seem to be an easy solution when implementing a sofisticated software application. This paper takes a closer look at the security implications for a system that uses third party components. We will focus on third party components for which the source code is not available and thus the exact behavior is unknown. Different methods that can be used for testing and validating the given specifications as well as the undocumented behavior of these components will be discussed. On-line as well as off-line methods will be presented. We will conclude that no single method provides an acceptable degree of security and, because the testing and validation effort must remain lower than designing and producing the component for yourself, not even the combination of all possible methods provides a sufficient degree of security for a mission critical application. COTS, the safety nightmare of component-oriented frameworks Lieven Desmet, Liesbeth Jaco, Koenraad Mertens, Tine Verhanneman DistriNet, Dept. of Computer Science, K.U.Leuven DistriNet Workshop on Run-Time Adaptation in Distributed Software November 29-30, 2002