2009 IEEE/IFIP International Conference on Dependable Systems &Amp; Networks 2009
DOI: 10.1109/dsn.2009.5270296
|View full text |Cite
|
Sign up to set email alerts
|

I-JVM: a Java Virtual Machine for component isolation in OSGi

Abstract: The OSGi framework is a Java-based, centralized, component oriented platform. It is being widely adopted as an execution environment for the development of extensible applications. However, current Java Virtual Machines are unable to isolate components from each other. For instance, a malicious component can freeze the complete platform by allocating too much memory or alter the behavior of other components by modifying shared variables. This paper presents I-JVM, a Java Virtual Machine that provides a lightwe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(39 citation statements)
references
References 23 publications
(25 reference statements)
0
34
0
Order By: Relevance
“…This leads to the problem, that a single application can cause a system crash, for instance when allocating too much memory. A way to isolate applications in OSGi platforms has been presented in [13].…”
Section: A Applicationsmentioning
confidence: 99%
“…This leads to the problem, that a single application can cause a system crash, for instance when allocating too much memory. A way to isolate applications in OSGi platforms has been presented in [13].…”
Section: A Applicationsmentioning
confidence: 99%
“…However, their work is focused on CPU usage and does not consider other resources, such as memory or I/O. Exploring the Java heap to obtain useful information about resource consumption has been proposed in [37,40]. As in our work, they account objects to the resource principal being explored (in their case to OSGi bundles) the first time an object is reached.…”
Section: Related Workmentioning
confidence: 99%
“…Computations in the second mechanism occur only on demand but are intensive because they involve traversing the graph of living objects in the heap. The accounting policy follows the paradigm of assigning objects to the component that is holding them and, if an object is reachable from more than one component, it is accounted to either one randomly, as suggested in [37]. In this paper, we call this second mechanism Heap Exploration.…”
Section: An Adaptive Monitoring Framework Within the Containermentioning
confidence: 99%
See 1 more Smart Citation
“…A number of systems rely on run-time mechanisms for achieving isolation, most using either deep-copy or special message heaps for communication, e.g. [7,9,11,12]. Of these, O-Kilim [12], which builds directly on the PhD work of the first author of this paper [6], is the closest to Siaam: it places no constraint on transferred object graphs, but at the expense of a complex programming model and no programmer support, in contrast to Siaam.…”
Section: Related Work and Conclusionmentioning
confidence: 99%