Completely Unanticipated Dynamic Adaptation of Software

Total Page:16

File Type:pdf, Size:1020Kb

Completely Unanticipated Dynamic Adaptation of Software Completely Unanticipated Dynamic Adaptation of Software A thesis submitted to the University of Dublin, Trinity College, in fulfilment of the requirements for the degree of Doctor of Philosophy (Computer Science) John Keeney Distributed Systems Group, Department of Computer Science, Trinity College, University of Dublin. October 2004 Declaration I, the undersigned, declare that this work has not previously been submitted to this or any other University, and that unless otherwise stated, it is entirely my own work. John Keeney ___________________________________ May 2005 ii Permission to Lend and/or Copy I, the undersigned, agree that Trinity College Library may lend or copy this thesis upon request. John Keeney ___________________________________ May 2005 iii Acknowledgments Firstly, I must thank my supervisor Prof. Vinny Cahill, who prised this thesis out of me with his subtle but effective prodding. Thanks for the support and guidance over the years while still letting me get on with my procrastination. Thanks to Microsoft Research Ltd., for the happy days that comes from financial support, as Donal and myself ploughed the long furrow. Thanks to the Coyote team, Tilman, Peter, Jim, and Barry who introduced me to the big bad world of reflection, and brought metatypes to us all. In particular Barry for Iguana/J, without which this thesis would not have been possible. In addition thanks to Mads for his help and guidance with ALICE, and for his useful and insightful comments to improve the thesis. Thanks to the buckos in DSG for keeping me idle all these years, while I was keeping them idle too. I bet you guys won't read the rest of this thesis! Thanks to the Girlies (that includes Owen and Paul) for the sanity. Special thanks to my family for me, for the support, and the instilled desire to achieve. Most of all, thanks to Niamh for the "minds". I promise I'll come home and shave now. iv Summary Dynamic adaptation of software behaviour refers to the act of changing the behaviour of some part of a software system as it executes, without stopping or restarting it. It is difficult to dynamically adapt software if the need for adaptation arises while the software is executing, and especially so if the program is compiled and the source code is unavailable. Ideally, it would be possible for adaptations to be applied to a running application without any anticipation of the adaptation itself, preparation of the location for that adaptation, or even anticipation of the need for some adaptation. Even with the best planning and foresight it is virtually impossible to anticipate at design and production stages all of the dynamic behaviour adaptations that may be required for a piece software, especially if the need for adaptation is triggered by unpredictable and erratic changes in the operating context, the application's resources and demands, and the users’ requirements. The need for dynamic adaptation arises in various circumstances, from the very simple desire to dynamically customise a piece of software to suit current needs, through to a necessity to continually evolve a long-running program as its requirements and operating context change. These adaptations may simply involve pre- or post-processing of operations, for example, to support consistency checking, through to dynamically adapting the core behaviours of an application as its operating context or requirements change, for example to support dynamic upgrading or repair of the system. While it may be necessary to adapt the core functional behaviours of an application, it may also be necessary to change or insert new non-functional behaviours that do not change what the software does, but rather how it does it. Examples here include dynamically inserting debugging or tracing statements, through to making some object in an application persistent or remotely accessible. To perform these changes it should not be necessary to restart the application, or indeed have access to the source code of the application since the core problem domain being modelled by the application has not changed. v If dynamic adaptation is to be completely unanticipated, the management and control of the adaptation process must also be dynamically adaptable. It is unrealistic to expect an adaptation framework using a hard-coded, static, or inflexible approach to adaptation management, to perform adequately in a generalised manner. Only by decoupling the adaptation mechanism from the adaptation control, and dynamically specifying and adapting the adaptation control strategies, can completely unforeseen dynamic adaptation of running software become a realistic goal. This thesis provides an in depth discussion of unanticipated dynamic adaptation, introduces the term “completely unanticipated dynamic adaptation” to refer to adaptations where all properties of the adaptation can remain unanticipated until during runtime, and identifies the set of requirements that must be met to achieve this. This thesis presents the Chisel adaptation framework, and demonstrates that a general- purpose, context-aware dynamic adaptation framework is achievable. This system can be used to perform almost any unforeseen behavioural adaptation without stopping the application, and without changing the application itself. In this system a human-readable, dynamically updatable policy script was chosen as the favoured approach to drive the adaptation mechanism in a responsive manner by monitoring changes in the user, application, and environmental context. The Chisel framework also demonstrates that behavioural reflection, using the managed but unforeseen dynamic selection of Iguana/J metatypes, is a valid and powerful technique for completely unanticipated dynamic software adaptation. In addition, the Chisel framework provides a structured mechanism to allow a user to inspect and probe the internal operation of compiled software without access to the software's source code to allow that software to be adapted or extended as appropriate. To evaluate Chisel and validate our claims, a number of examples and case studies are used, including the use of the Chisel framework to dynamically adapt an off the shelf network application, as it ran, to use ALICE, a middleware for mobile computing environments, and how, using an Iguana/J metatype to implement a snap-on non-functional behaviour to implement a naming mechanism for individual objects, those named objects can be individually adapted or queried as context sources. vi Contents CHAPTERTU 1 INTRODUCTIONUT ............................................................................... 20 1.1TU Aims and objectivesUT .......................................................................................................21 1.2TU Completely unanticipated dynamic software adaptationUT ..........................................22 1.2.1TU Software adaptation and evolutionUT ...........................................................................22 1.2.2TU Anticipation of the adaptation's attributesUT ................................................................24 AdaptationTU anticipated at design and production stageUT ................................................25 AdaptationTU anticipated at compile-timeUT ........................................................................25 AdaptationTU anticipated at the start of runtimeUT ...............................................................26 AdaptationTU anticipated at load-timeUT ..............................................................................26 AdaptationTU anticipation during executionUT .....................................................................27 SummaryTU of anticipation of an adaptation's characteristicsUT ..........................................27 1.2.3TU Completely unanticipated dynamic adaptationUT ........................................................28 ButTU completely unanticipated dynamic adaptation must itself be anticipatedUT ..............28 1.3TU MotivationUT ......................................................................................................................29 1.4TU Dynamic adaptation using metatypesUT ..........................................................................31 1.4.1TU What is a metatypeUT ...................................................................................................31 1.5TU Policy-based management of adaptationsUT ...................................................................32 1.6TU The Chisel adaptation frameworkUT ...............................................................................33 1.7TU General-purpose dynamic adaptation supportUT ...........................................................34 1.8TU ContributionsUT .................................................................................................................35 vii 1.9TU Orthogonal research topicUT ............................................................................................36 1.10TU Thesis roadmapUT ...........................................................................................................37 CHAPTERTU 2 RELATED WORK ON ADAPTABLE SYSTEMSUT ............................. 38 2.1TU Adaptation using reflective techniquesUT ........................................................................39 2.1.1TU IguanaUT .......................................................................................................................40 MetatypesTU and IguanaUT ...................................................................................................40
Recommended publications
  • Jpype Documentation Release 0.7.0
    JPype Documentation Release 0.7.0 Steve Menard, Luis Nell and others Jul 22, 2019 Contents 1 Parts of the documentation 3 1.1 Installation................................................3 1.2 User Guide................................................6 1.3 QuickStart Guide............................................. 17 1.4 API Reference.............................................. 27 1.5 JImport.................................................. 34 1.6 Changelog................................................ 36 1.7 Developer Guide............................................. 40 2 Indices and tables 53 Python Module Index 55 Index 57 i ii JPype Documentation, Release 0.7.0 JPype is a Python module to provide full access to Java from within Python. It allows Python to make use of Java only libraries, exploring and visualization of Java structures, development and testing of Java libraries, scientific computing, and much more. By gaining the best of both worlds using Python for rapid prototyping and Java for strong typed production code, JPype provides a powerful environment for engineering and code development. This is achieved not through re-implementing Python, as Jython/JPython has done, but rather through interfacing at the native level in both virtual machines. This shared memory based approach achieves decent computing preformance, while providing the access to the entirety of CPython and Java libraries. Contents 1 JPype Documentation, Release 0.7.0 2 Contents CHAPTER 1 Parts of the documentation 1.1 Installation JPype is available either as a pre-compiled binary for Anaconda, or may be build from source though several methods. 1.1.1 Binary Install JPype can be installed as pre-compiled binary if you are using the Anaconda Python stack. Binaries are available for Linux, OSX, ad windows are available on conda-forge.
    [Show full text]
  • Chargeurs De Classes Java (Classloader)
    http://membres-liglab.imag.fr/donsez/cours Chargeurs de classes Java (ClassLoader) Didier Donsez Université Joseph Fourier - Grenoble 1 PolyTech’Grenoble - LIG/ADELE [email protected] [email protected] 06/06/2009 Licence Cette présentation est couverte par le contrat Creative Commons By NC ND http://creativecommons.org/licenses/by-nc-nd/2.0/fr/ Didier Donsez, 2002-2009, ClassLoaders Donsez,2002-2009, Didier 2 06/06/2009 Kequoi ca un chargeur de classes ? Son rôle est 1) de charger le bytecode d’une classe depuis un artéfact (archive Java, répertoire distant …) 2) communiquer le bytecode à la machine virtuelle Didier Donsez, 2002-2009, ClassLoaders Donsez,2002-2009, Didier 4 06/06/2009 Pourquoi utiliser les chargeurs de classes Classes non présentes dans le CLASSPATH URLClassLoader, AppletClassLoader, … ex: WEB-INF/classes et WEB-INF/lib d’une WebApp ex: CODEBASE d’une applet, … Déchargement et Mise à jour du bytecode lors de l’exécution de la VM (runtime) Chargeurs de OSGi Modification du ByteCode à la volée au chargement Instrumentation AOP (Aspect Oriented Programming) BCEL, ASM Protection Chargement de ressources associées à la classe properties, images, … Recherche de Service Providers ou de Drivers META-INF/services (java.util.ServiceLoader de 6.0) Didier Donsez, 2002-2009, ClassLoaders Donsez,2002-2009, Didier 5 06/06/2009 Principe de la délégation (Java 2) Tout chargeur a un chargeur parent sauf le chargeur primordial Tout chargeur vérifie si la classe à charger n’a pas déjà été chargée par un chargeur
    [Show full text]
  • How Java Works JIT, Just in Time Compiler Loading .Class Files The
    How Java works JIT, Just In Time Compiler ● The java compiler takes a .java file and generates a .class file ● JVM ultimately translates bytecode into native code, each time ➤ The .class file contains Java bytecodes, the assembler the same bytecodes are processed, the translation into native language for Java programs code must be made ➤ Bytecodes are executed in a JVM (java virtual machine), ➤ If we can cache translated code we can avoid re-translating the valid bytecodes are specified by Sun the same bytecode sequence • What if third parties create platform/OS specific codes? ➤ Why not just translate the entire .java program into native code? ● The JVM interprets the bytecodes ➤ JVM is platform/OS specific, must ultimately run the code ● Still need the JVM, the JIT works in conjunction with the JVM, not in place of it ➤ Different JVMs will have different performance, JITs are part of the overall JDK/Java performance ● How are classes loaded into the JVM? Can this be thwarted? Duke CPS 108 14.1 Duke CPS 108 14.2 Loading .class files The ClassLoader ● The bytecode verifier “proves theorems” about the bytecodes ● The “Primordial” loader is built-in to the JVM being loaded into the JVM ➤ Sometimes called the “default” loader, but it’s not ➤ These bytecodes may come from a non-Java source, e.g., extensible or customizable the way other loaders are compile Ada into bytecodes (why?) ➤ Loads classes from the platform on which the JVM runs ● This verification is a static analysis of properties such as: (what are loader and JVM written in?) ➤
    [Show full text]
  • An Empirical Evaluation of Osgi Dependencies Best Practices in the Eclipse IDE Lina Ochoa, Thomas Degueule, Jurgen Vinju
    An Empirical Evaluation of OSGi Dependencies Best Practices in the Eclipse IDE Lina Ochoa, Thomas Degueule, Jurgen Vinju To cite this version: Lina Ochoa, Thomas Degueule, Jurgen Vinju. An Empirical Evaluation of OSGi Dependencies Best Practices in the Eclipse IDE. 15th International Conference on Mining Software Repositories, May 2018, Gothenburg, Sweden. 10.1145/3196398.3196416. hal-01740131 HAL Id: hal-01740131 https://hal.archives-ouvertes.fr/hal-01740131 Submitted on 27 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. An Empirical Evaluation of OSGi Dependencies Best Practices in the Eclipse IDE Lina Ochoa Thomas Degueule Jurgen Vinju Centrum Wiskunde & Informatica Centrum Wiskunde & Informatica Centrum Wiskunde & Informatica Amsterdam, Netherlands Amsterdam, Netherlands Amsterdam, Netherlands [email protected] [email protected] Eindhoven University of Technology Eindhoven, Netherlands [email protected] ABSTRACT that can be implemented and tested independently. This also fos- OSGi is a module system and service framework that aims to fill ters reuse by allowing software components to be reused from one Java’s lack of support for modular development. Using OSGi, devel- system to the other, or even to be substituted by one another pro- opers divide software into multiple bundles that declare constrained vided that they satisfy the appropriate interface expected by a client.
    [Show full text]
  • Kawa - Compiling Dynamic Languages to the Java VM
    Kawa - Compiling Dynamic Languages to the Java VM Per Bothner Cygnus Solutions 1325 Chesapeake Terrace Sunnyvale CA 94089, USA <[email protected]> Abstract: in a project in conjunction with Java. A language im- plemented on top of Java gives programmers many of Many are interested in Java for its portable bytecodes the extra-linguistic benefits of Java, including libraries, and extensive libraries, but prefer a different language, portable bytecodes, web applets, and the existing efforts especially for scripting. People have implemented other to improve Java implementations and tools. languages using an interpreter (which is slow), or by translating into Java source (with poor responsiveness The Kawa toolkit supports compiling and running vari- for eval). Kawa uses an interpreter only for “simple” ous languages on the Java Virtual Machine. Currently, expressions; all non-trivial expressions (such as function Scheme is fully supported (except for a few difficult fea- definitions) are compiled into Java bytecodes, which are tures discussed later). An implementation of ECMA- emitted into an in-memory byte array. This can be saved Script is coming along, but at the time of writing it is for later, or quickly loaded using the Java ClassLoader. not usable. Kawa is intended to be a framework that supports mul- Scheme [R RS] is a simple yet powerful language. It tiple source languages. Currently, it only supports is a non-pure functional language (i.e. it has first-class Scheme, which is a lexically-scoped language in the Lisp functions, lexical scoping, non-lazy evaluation, and side family. The Kawa dialect of Scheme implements almost effects).
    [Show full text]
  • Components: Concepts and Techniques
    Software Engineering 2005 Components: Concepts and Techniques Martin Bravenboer Department of Information and Computing Sciences Universiteit Utrecht [email protected] October 19, 2005 1 Concepts 2 Component-based Software Engineering Developing a software system from prefabricated parts • From custom-made to standard software • Required in all industries • No replication: different configurations • Cross-cuts the software engineering: – Requirements, deployment, versioning, configuration, building, maintenance, architecture, design • Aspects: both technical and market-related – Time to market, competitiveness. – Stimulation of marketplace 3 Dreaming in Components • Maturity of software engineering • Components of different vendors working together – Requires protocols between components • Marketplace – Sell components – Provide services – Infrastructure – Service provider • Reduce need for skilled system programmers – Component architects, assemblers Has taken almost 40 years to take off! 4 Components according to Czarnecki “Building blocks from which different software systems can be composed.” • Component is a natural concept – Not constructed, artificial – Definition is futile. • Component is part of a production process • What a component is, depends on the production process. – e.g. not necessarily binary Economic pressure towards standardized solutions 5 Components according to Szyperski Very strict definition of software component 1. Unit of composition 2. Unit of independent deployment 3. Contractually specified interfaces • Deployment,
    [Show full text]
  • Towards Integrating Modeling and Programming Languages: the Case of UML and Java⋆
    Towards Integrating Modeling and Programming Languages: The Case of UML and Java? Patrick Neubauer, Tanja Mayerhofer, and Gerti Kappel Business Informatics Group, Vienna University of Technology, Austria {neubauer, mayerhofer, gerti}@big.tuwien.ac.at Abstract. Today, modeling and programming constitute separate activities car- ried out using modeling respectively programming languages, which are neither well integrated with each other nor have a one-to-one correspondence. As a con- sequence, platform and implementation details, such as the usage of existing software components and libraries, are usually introduced on code level only. This impedes accurate model-level analyses that take platform-specific decisions into account as well as the direct deployment of executable models on the target platform. In this work we present an approach for integrating existing software libraries with fUML models—an executable variant of UML models for which a standardized virtual machine exists—not only at design time but also at runtime. As a result of that, the modeler is empowered with the capabilities provided by existing software libraries on model level. Our approach is evaluated based on unit tests and initial case studies available in the ReMoDD repository that assess the correctness, performance, and completeness of our implementation. 1 Introduction Back in 1966, the first object-oriented programming language was born. Its name is SIMULA and it combined modeling and programming in a unified approach, that is one of the strengths provided by object-orientation [4]. Carrying this idea further, the language BETA, which was developed based on SIMULA and DELTA, was designed for supporting both designing and programming systems.
    [Show full text]
  • Analysing Class Loading Conflicts on Weblogic
    Class Loading Conflicts in JVM This guide shows how to analyze and avoid potential problems caused by class loading conflicts. The content is structured in the following sections, the first one gives a little introduction to the Classloader model in Weblogic [1], following the installation of Classloader Analysis Tool (CAT) [1] is shown and then two examples that shows the use of CAT on a real application is presented. Class loading in Weblogic Summarizing the class loading process in just some lines is hard so in this guide the focus is talking about hierarchies and the delegation model. Concept Definition Hierarchies The classloader in an application server such as Weblogic is based on the model defined by the JVM, which means a hierarchical model that on Weblogic is organized as a tree with these levels: bootstrap class loader, extension class loader, system classpath classloader, application specific classloaders (this includes Weblogic server) [1]. In the previous tree, bootstrap class loader is the root and application specific classloaders are the leaves [1]. Delegation model A common question that arises when Java application servers are used is why is my application using the wrong class? This is because the delegation model, which states “The classloader implementation first checks its cache to see if the requested class has already been loaded. This class verification improves performance in that its cached memory copy is used instead of repeated loading of a class from disk. If the class is not found in its cache, the current classloader asks its parent for the class. Only if the parent cannot load the class does the classloader attempt to load the class.
    [Show full text]
  • Understanding the Java Classloader Skill Level: Introductory
    Understanding the Java ClassLoader Skill Level: Introductory Greg Travis ([email protected]) Programmer 24 Apr 2001 This tutorial provides an overview of the Java ClassLoader and takes you through the construction of an example ClassLoader that automatically compiles your code before loading it. You'll learn exactly what a ClassLoader does, and what you need to do to create your own. Section 1. Tutorial tips Should I take this tutorial? The Java ClassLoader is a crucial, but often overlooked, component of the Java run-time system. It is the class responsible for finding and loading class files at run time. Creating your own ClassLoader lets you customize the JVM in useful and interesting ways, allowing you to completely redefine how class files are brought into the system. This tutorial provides an overview of the Java ClassLoader and takes you through the construction of an example ClassLoader that automatically compiles your code before loading it. You'll learn exactly what a ClassLoader does and what you need to do to create your own. A basic understanding of Java programming, including the ability to create, compile, and execute simple command-line Java programs, as well as an understanding of the class file paradigm is sufficient background to take this tutorial. Upon completion of this tutorial, you will know how to: Understanding the Java ClassLoader © Copyright IBM Corporation 1994, 2005. All rights reserved. Page 1 of 19 developerWorks® ibm.com/developerWorks • Expand the functionality of the JVM • Create a custom ClassLoader • Learn how to integrate a custom ClassLoader into your Java application • Modify your ClassLoader to accommodate the Java 2 release Section 2.
    [Show full text]
  • Supporting Resource Awareness in Managed Runtime Environment Inti Yulien Gonzalez Herrera
    Supporting resource awareness in managed runtime environment Inti Yulien Gonzalez Herrera To cite this version: Inti Yulien Gonzalez Herrera. Supporting resource awareness in managed runtime environment. Soft- ware Engineering [cs.SE]. Université Rennes 1, 2015. English. NNT : 2015REN1S090. tel-01308660 HAL Id: tel-01308660 https://tel.archives-ouvertes.fr/tel-01308660 Submitted on 28 Apr 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. ANNÉE 2015 THÈSE / UNIVERSITÉ DE RENNES 1 sous le sceau de l’Université Européenne de Bretagne pour le grade de DOCTEUR DE L’UNIVERSITÉ DE RENNES 1 Mention : Informatique École doctorale Matisse présentée par Inti Yulien GONZALEZ HERRERA préparée à l’unité de recherche INRIA Rennes Bretagne Atlantique Thèse soutenue à Rennes Supporting le 14 Décembre 2015 devant le jury composé de : Vivien QUÉMA resource awareness LIG laboratory – Grenoble INP/ENSIMAG / Rapporteur Gilles MULLER in managed runtime Whisper team – LIP6 / Rapporteur Gaël THOMAS environments. Samovar Laboratory – Telecom SudParis / Examinateur Laurent RÉVEILLÈRE LaBRI – Université de Bordeaux / Examinateur Isabelle PUAUT IRISA – Université de Rennes 1 / Examinatrice Olivier BARAIS Professor, IRISA – Université de Rennes 1 / Directeur de thèse Johann BOURCIER Maître de conférences, IRISA – Université de Rennes 1 / Co-directeur de thèse Hay una historia familiar que me impactó muchísimo.
    [Show full text]
  • CICS JVM Server Application Isolation
    CICS JVM Server Application Isolation Masterarbeit Lehrstuhl für Technische Informatik Wilhelm-Schickard-Institut für Informatik Mathematisch-Naturwissenschaftliche Fakultät Universität Tübingen Dipl.-Ing. (FH) Robert Harbach Betreuer: Prof. Dr.-Ing. Wilhelm G. Spruth Tag der Anmeldung: 1. Oktober 2011 Tag der Abgabe: 30. März 2012 Executive Summary The Java Virtual Machine (JVM) is able to host multiple simultaneously execut- ing transaction programs. Since a JVM is not capable to provide full application isolation however, the common practice found in most Java application servers implies to run one JVM per program. Due to the fact, that this implies an overhead of computational resources, several, most often proprietary, solutions for application isolation in JVMs have been proposed in the past. This paper outlines isolation properties of a new Java Virtual Machine (JVM) type, called a JVM Server, which implements the OSGi framework, and is in- tegrated into the System z architecture Customer Control Information System (CICS). It is shown that this approach resolves two application isolation issues: The CICS environment enables transaction safe execution of tasks. In addition, inclusion of the OSGi Framework provides namespace isolation based on class loading. However, several issues remain unsolved. They arise from the use of Java system classes, OSGi specific functions, resource exhaustion, and the use of the Java Native Interface (JNI). This paper proposes solutions to these isolation exposures. Some employ func- tions of the OSGi security layer. Others utilise existing CICS services for pro- gram control which would have to be implemented differently on other Java Transaction Servers. 1 Erklärung Hiermit bestätige ich, dass ich diese Masterarbeit selbstständig und nur mit Hilfe der angegebenen Quellen und Hilfsmittel verfasst habe.
    [Show full text]
  • How Java Works
    How Java works ● The java compiler takes a .java file and generates a .class file ➤ The .class file contains Java bytecodes, the assembler language for Java programs ➤ Bytecodes are executed in a JVM (java virtual machine), the valid bytecodes are specified by Sun • What if third parties create platform/OS specific codes? ● The JVM interprets the bytecodes ➤ JVM is platform/OS specific, must ultimately run the code ➤ Different JVMs will have different performance, JITs are part of the overall JDK/Java performance Duke CPS 108 14.1 JIT, Just In Time Compiler ● JVM ultimately translates bytecode into native code, each time the same bytecodes are processed, the translation into native code must be made ➤ If we can cache translated code we can avoid re-translating the same bytecode sequence ➤ Why not just translate the entire .java program into native code? ● Still need the JVM, the JIT works in conjunction with the JVM, not in place of it ● How are classes loaded into the JVM? Can this be thwarted? Duke CPS 108 14.2 Loading .class files ● The bytecode verifier “proves theorems” about the bytecodes being loaded into the JVM ➤ These bytecodes may come from a non-Java source, e.g., compile Ada into bytecodes (why?) ● This verification is a static analysis of properties such as: ➤ .class file format (including magic number 0xCAFEBABE) ➤ Methods/instances used properly, parameters correct ➤ Stack doesn’t underflow/overflow ➤ … ● Verification is done by the JVM, not changeable as is, for example, the ClassLoader http://securingjava.com http://java.sun.com/sfaq/verifier.html
    [Show full text]