Trusted Software Monitoring Research Based on Dynamic Proxy

被引:0
|
作者
Li, Cai-mao [1 ]
Chen, Shao-fan [1 ]
Wu, Han-wei [1 ]
Chen, Jing [1 ]
机构
[1] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Peoples R China
关键词
Dynamic proxy; Monitor; Trusted software; AOP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper studied how to monitor trusted software behavior based on dynamic proxy. First, it analyzed the dynamic proxy mechanism, putted forward the dynamic proxy monitor model, then researched how to weave the interceptor code in software monitor based on dynamic proxy, showed the weaving process of monitoring code. Finally, it shows that dynamic proxy can make trusted software have strong behavior monitoring control ability.
引用
收藏
页码:791 / 797
页数:7
相关论文
共 50 条
  • [1] Research on Software Trusted Dynamic Measurement
    Hao, Rui
    Peng, Xinguang
    Xiu, Lei
    [J]. MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1869 - +
  • [2] Research of Software Dynamic Trusted Measurement Method
    Hao, Rui
    Peng, Xinguang
    Xiu, Lei
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2614 - 2617
  • [3] Trusted Software Behavior Monitoring Model Based on Agent
    Li, Caimao
    Chen, Shaofan
    Wu, Hanwei
    Chen, Jing
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 420 - 423
  • [4] Research on Evaluation Index System of Trusted Software
    Ding, Shuai
    Yang, Shanlin
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 7964 - 7967
  • [5] Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem
    Huang, Haoxiang
    Zhang, Jianbiao
    Hu, Jun
    Fu, Yingfang
    Qin, Chenggang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3306 - 3320
  • [6] Research on state space reduction of behavior-based trusted dynamic measurement
    [J]. Zhuang, L. (zhuanglu686@aliyun.com), 1600, Science Press (37):
  • [7] Static and Dynamic Verification Method of Trusted Embedded Software Systems
    Huang, Bo
    Xu, Yong
    Wu, Guoqing
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 67 - 71
  • [8] Research on trusted full-proxy homomorphic transmission mechanism for satellite communication
    Ding Yi
    Shen Wei
    Li Jie
    Cheng Zijing
    Jin Jun
    Sun Jianing
    [J]. CHINESE SPACE SCIENCE AND TECHNOLOGY, 2020, 40 (04) : 84 - 96
  • [9] Research directions for automated software verification: Using trusted hardware
    Devanbu, P
    Stubblebine, S
    [J]. AUTOMATED SOFTWARE ENGINEERING, 12TH IEEE INTERNATIONAL CONFERENCE, PROCEEDINGS, 1997, : 274 - 279
  • [10] AN INTERACTIVE GIS-BASED SOFTWARE FOR DYNAMIC MONITORING OF RIVERS
    Yetik, M. K.
    Yuceer, M.
    Karadurmus, E.
    Semizer, E.
    Calimli, A.
    Berber, R.
    [J]. JOURNAL OF ENVIRONMENTAL PROTECTION AND ECOLOGY, 2014, 15 (04): : 1767 - 1778