Treffer: BISM: Bytecode-Level Instrumentation for Software Monitoring

Title:
BISM: Bytecode-Level Instrumentation for Software Monitoring
Contributors:
Compiler Optimization and Run-time Systems (CORSE), Centre Inria de l'Université Grenoble Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire d'Informatique de Grenoble (LIG), Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP), Université Grenoble Alpes (UGA)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP), Université Grenoble Alpes (UGA), Laboratoire d'Informatique de Grenoble (LIG), Université Grenoble Alpes - UFR Informatique, mathématiques et mathématiques appliquées (UGA UFR IM2AG)
Source:
RV 2020 - 20th International Conference on Runtime Verification ; https://inria.hal.science/hal-03081265 ; RV 2020 - 20th International Conference on Runtime Verification, Oct 2020, Los Angeles, United States. pp.1-12
Publisher Information:
CCSD
Publication Year:
2020
Collection:
Université Grenoble Alpes: HAL
Subject Geographic:
Document Type:
Konferenz conference object
Language:
English
Rights:
info:eu-repo/semantics/OpenAccess
Accession Number:
edsbas.FA57BCA
Database:
BASE

Weitere Informationen

International audience ; BISM (Bytecode-Level Instrumentation for Software Monitoring) is a lightweight Java bytecode instrumentation tool which features an expressive high-level control-flow-aware instrumentation language. The language follows the aspect-oriented programming paradigm by adopting the joinpoint model, advice inlining, and separate instrumentation mechanisms. BISM provides joinpoints ranging from bytecode instruction to method execution, access to comprehensive context information, and instrumentation methods. BISM runs in two modes: build-time and load-time. We demonstrate BISM effectiveness using two experiments: a security scenario and a general runtime verification case. The results show that BISM instrumentation incurs low runtime and memory overheads.