Intercepting and Instrumenting COM Applications

نویسندگان

  • Galen C. Hunt
  • Michael L. Scott
چکیده

Binary standard object models, such as Microsoft’s Component Object Model (COM) enable the development of not just reusable components, but also an incredible variety of useful component services through run-time interception of binary standard interfaces. Interception of binary components can be used for conformance testing, debugging, profiling, transaction management, serialization and locking, cross-standard middleware interoperability, automatic distributed partitioning, security enforcement, clustering, just-in-time activation, and transparent component aggregation. We describe the implementation of an interception and instrumentation system tested on over 300 COM binary components, 700 unique COM interfaces, 2 million lines of code, and on 3 major commercial-grade applications including Microsoft PhotoDraw 2000. The described system serves as the foundation for the Coign Automatic Distributed Partitioning System (ADPS), the first ADPS to automatically partition and distribute binary applications. While the techniques described in this paper were developed specifically for COM, they have relevance to other object models with binary standards, such as individual CORBA implementations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intercepting Filter Approach to Injection Flaws

The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy’s increasing dependence on web-based systems. We propose an intercepting filter approach to mitigate the risk of injection flaw exploitationone of the most dangerous methods of attacking web applications. The proposed approach can be implem...

متن کامل

Instrumenting Android and Java Applications as Easy as abc

Program instrumentation is a widely used mechanism in different software engineering areas. It can be used for creating profilers and debuggers, for detecting programming errors at runtime, or for securing programs through inline reference monitoring. This paper presents a tutorial on instrumenting Android applications using Soot and the AspectBench compiler (abc). We show how two wellknown mon...

متن کامل

Developing Scalable Applications with Vampir, VampirServer and VampirTrace

This paper presents some scalability studies of the performance analysis tools Vampir and VampirTrace. The usability is analyzed with data collected from real applications, i.e. the thirteen applications contained in the SPEC MPI 1.0 benchmark suite. The analysis covers all phases of performance analysis: instrumenting the application, collecting the performance data, and finally viewing and an...

متن کامل

Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation

Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabilities. A lightweight solution is presented in this paper to tackle such illegal memory accesses dynamically in C/C++ based applications. We propose a new and effective method of instrumenting an app...

متن کامل

The Effect of Liquidity and Credit Risk on the Relationship be-tween Business Activities and Fluctuations in the Price of all Com-panies Listed on the Tehran Stock Exchange

In this study business operations and liquidity and credit risk on price fluctuations on the stock exchange since 2010 to 2013 has been Tehran distance. The sample consisted of 76 company The systematic elimination method is selected. The company had a total of 304 years, in this study, the hypothesis of linear regression and correlation to analyse the data and test hypotheses Eviews software i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999