Efficient software-based fault isolation
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Component-oriented software technology
Object-oriented software composition
Dynamic class loading in the Java virtual machine
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Multitasking without comprimise: a virtual machine evolution
OOPSLA '01 Proceedings of the 16th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Component Software: Beyond Object-Oriented Programming
Component Software: Beyond Object-Oriented Programming
COM and .NET Component Services: Migrating from COM+ to .NET
COM and .NET Component Services: Migrating from COM+ to .NET
Professional Java Server Programming J2EE 1.3 Edition
Professional Java Server Programming J2EE 1.3 Edition
Shared Source Cli Essentials
Trustworthy components-compositionality and prediction
Journal of Systems and Software - Special issue on: Component-based software engineering
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
The Eclipse 3.0 platform: adopting OSGi technology
IBM Systems Journal
Secure and Reliable Java-Based Middleware - Challenges and Solutions
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Scaling J2EE™ application servers with the Multi-tasking Virtual Machine
Software—Practice & Experience - Research Articles
Microreboot — A technique for cheap recovery
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Towards a new isolation abstraction for OSGi
Proceedings of the 1st workshop on Isolation and integration in embedded systems
A retrospective on software component quality models
ACM SIGSOFT Software Engineering Notes
Dependable distributed OSGi environment
Proceedings of the 3rd workshop on Middleware for service oriented computing
Using fail-stop proxies for enhancing services isolation in the OSGi service platform
Proceedings of the 3rd workshop on Middleware for service oriented computing
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms
CBSE '08 Proceedings of the 11th International Symposium on Component-Based Software Engineering
A Practical Approach for Finding Stale References in a Dynamic Service Platform
CBSE '08 Proceedings of the 11th International Symposium on Component-Based Software Engineering
R-OSGi: distributed applications through software modularization
Proceedings of the ACM/IFIP/USENIX 2007 International Conference on Middleware
Sharing the runtime representation of classes across class loaders
ECOOP'05 Proceedings of the 19th European conference on Object-Oriented Programming
Virtualization of service gateways in multi-provider environments
CBSE'06 Proceedings of the 9th international conference on Component-Based Software Engineering
Applying dependability aspects on top of "aspectized" software layers
Proceedings of the tenth international conference on Aspect-oriented software development
A self-healing component sandbox for untrustworthy third party code execution
CBSE'10 Proceedings of the 13th international conference on Component-Based Software Engineering
Hi-index | 0.00 |
When dealing with dynamic component environments such as the OSGi Service Platform, where components can come from different sources and may be known only during runtime, evaluating third party components trustworthiness at runtime is difficult. The traditional namespace based isolation and the security mechanisms provided in the Java platform (the base platform for OSGi) can restrict the access of such components but can not provide fault isolation. In this paper we present a dynamic component isolation approach for the OSGi platform, based on a recently standardized Java mechanism. When an untrusted component is activated during runtime, it is isolated in a fault contained environment but it can still collaborate with the application. If it is observed that the untrusted code does not bring any threat to the application, at runtime it can be dynamically promoted to the safe environment. Tests have been performed in a controlled environment where misbehaving components hosted in the sandbox were not able to disturb the main application.