Legacy code is a major problem for critical infrastructure, as the protocols and encryption techniques used to protect data become more vulnerable as computers become more powerful and attack techniques become more sophisticated. In cases where changing the code directly is no longer feasible (the source is lost, the original authors are not available, etc.), our tool can be used to replace the vulnerable code with hardened code that implements the required functionality and removes features that are no longer useful.
Our tool was presented to industry representatives at the 2017 CREDC Pacific Northwest Industry Workshop hosted by PNNL, OSU, and WSU, and we are currently incorporating the feedback we received. We plan to have a prototype of the tool ready soon.
For more information about this technology or opportunities for industrial collaboration, contact Peter Brady. More information is also available on the Related Research Activity page.
- In Development