Exploiting Java']Java Stack Forensics for Runtime Monitoring of IoT Services

被引:0
|
作者
Mao, Yan-fang [1 ,2 ]
Zhang, Yang [1 ]
Chen, Jun-liang [1 ]
Zhao, Kong-yang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
[2] Zhengzhou Univ Light Ind, Software Engn Coll, Zhengzhou, Henan, Peoples R China
来源
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2019年
基金
中国国家自然科学基金;
关键词
Runtime Monitoring; and JVM Stack; and Memory Forensics; and Semantic Reconstruction; MEMORY FORENSICS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) services play an increasingly important role in modern society with the more deployment in critical infrastructures. Ensuring IoT systems operating in a secure and safe environment is becoming a mandatory and urgent requirement. We have proposed a non-intrusive runtime monitoring mechanism in our previous work, but only runtime of C applications is considered in it. With the widely use of Java applications, the runtime monitoring of Java services is quite essential and important. However, the existing memory forensics on user processes are mainly focused on native stack of C or Java heap, which cannot meet the requirements of runtime monitoring of IoT services. In this paper, We propose an approach to dump and semantically reconstruct a Java stack, where a history of executed methods is obtained. We show the algorithms to extract methods in calling and the associated parameters, which are further encapsulated to be IoT events in XML format for runtime monitoring of IoT services, from Java stacks. The challenge of determining whether a stack frame is interpreted or compiled when reconstruct frames from the bottom to the top of the stack is solved. Experiments and evaluations show that the reconstruction is feasible and effective, with low resource occupation and real-time responses.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] An overview of the runtime verification tool Java']Java PathExplorer
    Havelund, K
    Rosu, G
    FORMAL METHODS IN SYSTEM DESIGN, 2004, 24 (02) : 189 - 215
  • [42] Automatically exploiting implicit parallelism in Java']Java
    Bik, AJC
    Gannon, DB
    CONCURRENCY-PRACTICE AND EXPERIENCE, 1997, 9 (06): : 579 - 619
  • [43] PAL: Exploiting Java']Java annotations for parallelism
    Danelutto, Marco
    Pasin, Marcelo
    Vanneschi, Marco
    Dazzi, Patrizio
    Laforenza, Domenico
    Presti, Luigi
    ACHIEVEMENTS IN EUROPEAN RESEARCH ON GRID SYSTEMS, 2008, : 83 - +
  • [44] Exploiting Java']Java™ technology with the SAS® software
    Walters, B
    PROCEEDINGS OF THE TWENTY-SECOND ANNUAL SAS USERS GROUP INTERNATIONAL CONFERENCE, 1997, : 865 - 869
  • [45] Goldilocks: A race and transaction-aware Java']Java runtime
    Elmas, Tayfun
    Qadeer, Shaz
    Tasiran, Serdar
    ACM SIGPLAN NOTICES, 2007, 42 (06) : 245 - 255
  • [46] Testing Program Segments to Detect Runtime Exceptions in Java']Java
    Rao, Lei
    Liu, Shaoying
    Liu, Ai
    STRUCTURED OBJECT-ORIENTED FORMAL LANGUAGE AND METHOD, SOFL+MSVL 2022, 2023, 13854 : 93 - 105
  • [47] Static check analysis for Java']Java stack inspection
    Chang, Byeong-Mo
    ACM SIGPLAN NOTICES, 2006, 41 (03) : 40 - 48
  • [48] Advanced runtime adaptation for java
    Faculty of Informatics, University of Lugano, Lugano, CH-6900, Switzerland
    GPCE - Proc. Int. ACM SIGPLAN Conf. Generative Program. Compon. Eng., (85-94):
  • [49] Measurement and analysis of runtime profiling data for Java']Java programs
    Horgan, J
    Power, J
    Waldron, J
    FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 122 - 130
  • [50] Cutting Java']Java Expressions into Lines for Detecting their Evaluation at Runtime
    Kume, Izuru
    Shibayama, Etsuya
    Nakamura, Masahide
    Nitta, Naoya
    2019 2ND INTERNATIONAL CONFERENCE ON GEOINFORMATICS AND DATA ANALYSIS (ICGDA 2019), 2019, : 37 - 46