@inproceedings{0309087df1dd45f89303f2c222e217c4,
title = "Computing legacy software behavior to understand functionality and security properties: An IBM/370 demonstration",
abstract = "Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address current cyber threats. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation on a demonstration project to compute behavior of legacy IBM Assembly code for a federal agency. The ultimate goal is to understand functionality and security vulnerabilities for code modernization. This paper reports on the first phase, to define functional semantics for IBM instructions and conduct behavior computation experiments.",
keywords = "Security properties, Software behavior computation, Specification",
author = "Rick Linger and Mark Pleszkoch and Stacy Prowell and Kirk Sayre and {Scott Ankrum}, T.",
year = "2013",
doi = "10.1145/2459976.2460025",
language = "English",
isbn = "9781450316873",
series = "ACM International Conference Proceeding Series",
booktitle = "8th Annual Cyber Security and Information Intelligence Research Workshop",
note = "8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013 ; Conference date: 08-01-2013 Through 10-01-2013",
}