[go: up one dir, main page]

WO2000068790A1 - An operating system interface method - Google Patents

An operating system interface method Download PDF

Info

Publication number
WO2000068790A1
WO2000068790A1 PCT/IL1999/000236 IL9900236W WO0068790A1 WO 2000068790 A1 WO2000068790 A1 WO 2000068790A1 IL 9900236 W IL9900236 W IL 9900236W WO 0068790 A1 WO0068790 A1 WO 0068790A1
Authority
WO
WIPO (PCT)
Prior art keywords
hook
response
call
system call
manager
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IL1999/000236
Other languages
French (fr)
Inventor
Nadav Cohen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Reality Bytes R & D Ltd
Original Assignee
Reality Bytes R & D Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Reality Bytes R & D Ltd filed Critical Reality Bytes R & D Ltd
Priority to AU37265/99A priority Critical patent/AU3726599A/en
Priority to PCT/IL1999/000236 priority patent/WO2000068790A1/en
Publication of WO2000068790A1 publication Critical patent/WO2000068790A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

Definitions

  • This invention relates to a method for interfacing computer applications to a computer's operating system.
  • the present invention relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules.
  • This method includes the steps of: providing a hook manager for managing hooking and unhooking of system calls by application programs or kernel modules; and passing control to at least one hook before a system call or after a system response.
  • an operating system is a substantially centralized software entity running on an externally monolithic aggregate of a computer and its associated peripheral devices (e.g. printer, display, etc.).
  • an operating system is a distributed ensemble of like or linked software entities strategically proliferated into a distributed processing architecture (e.g. a shuffle exchange, a hyper cube, an array processor, a client server network system, etc.).
  • the operating system receives system calls from application programs or from kernel modules. Likewise, the operating system directs system responses to applications programs or to kernel modules. Accordingly, a hook manager is provided, by the present invention, to evaluate an aspect of each system call or system response. The evaluation takes each intercepted call or response, and either passes it on to its expected destination or diverts it to an alternative destination.
  • the manager is just another applications program. From the vantage of an applications program, the manager is the operating system. Most importantly, from the vantage of a software developer, the manager provides a convenient way to externally expand the services provided by an operating system, and to externally resolve incompatibilities between an application program and an operating system.
  • features of an applications program are specifically built to conform to a special feature of an operating system. Thereafter, there is a desire to use this applications program with another operating system that does not include this special feature.
  • the manager intercepts all system calls. When the system call is for the special feature, the manager diverts the call to an external "special feature emulator".
  • the manager diverts a specific class of system calls to a call-log application where these systems calls are recorded, and thereafter routed via the manager to their original destination, the operating system.
  • An applications program is thereby provided data, e.g. the call-log record, for the needed analysis.
  • the provided manager may be a single centralized entity operating as an intermediary to the operating system of an externally monolithic aggregate of a computer and its associated peripheral devices.
  • the manager may a like numbered ensemble of co-managers assigned one co-manager per operating system entity.
  • the "software" manager of the present invention may create and assign task specific, process specific, or call specific "supervisor” software entities to any whole or partial application program, or even to any group of application programs.
  • the present invention does not provide any new functionality to the overall computer hardware-software conglomerate. Rather, the present invention allows for many of the known or desired functions to be incorporated into the conglomerate, in an independent modular manner. This facilitates the upward compatibility of both operating systems and applications programs. This facility is especially cost efficient when operating systems or applications programs embody special features, as is commonly the case. Since it is never known in advance which of these features will survive as industry standards and which will lapse into oblivion, the present invention provides an efficient facile solution for those who have invested man-years into utilizing options destined for oblivion.
  • the present invention provides a rapid development track for the marketing of new system-like utility features, which have not heretofore been incorporated into operating systems.
  • This rapid development track may prove to be useful to the developers of standard accepted operating systems, as a means for introducing new features and for testing their acceptance in the market.
  • This rapid development track may also prove to be useful to small specialty-type developers, who provide peculiar emulation or conversion software routines to clients switching from one operating system to a different operating system.
  • FIG. 1 is a block diagram of a systems-architecture
  • Fig. 2 is a flowchart of a complete system call and system response cycle.
  • FIG. 1 shows a block diagram of a systems-architecture wherein a processor
  • the processor 1 has an input modality interface 2 and an output modality interface 3.
  • the processor includes an operating system 4, a hook manager 5, a set of application programs 6, and a set of kernel modules 7.
  • the present invention relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules. This method includes the steps of:
  • passing control includes copying additional infomiation to at least one hook.
  • additional information include systems state information, process memory information, kernel tables, response status, etc.
  • hooking includes calling an application program interface (API) to receive system calls or to no longer receive system calls.
  • the hook manager includes an application program interface (API) allowing receiving of system responses or discontinuing receiving of system responses.
  • managing includes using the hook manager for: (a) building a chain of hooks in response to requests by an application program or kernel module to receive system calls; and (b) removing a hook from said chain of hooks, in response to requests by an application program or kernel module to no longer receive system calls.
  • a "chain” is an organization or structure such as a list, a stack, a tree, a net-like graph, etc.
  • building a chain of hooks is in sequential order based on when the requests are received.
  • removing a hook is in a non-last-in-first-out (non-LIFO) fashion.
  • the hook manager is an application program or a kernel module or a part thereof.
  • passing control includes an interim step selected from the list: (a) a hook under management of a hook manager gaining access to the system call or system response;
  • Fig. 2 shows a flowchart of a complete system call and system response cycle.
  • a query step "ARE THERE ANY PRE-CALL HOOKS?" 21 is imposed. If there are pre-call hooks, then "GET A HOOK FROM THE HOOK CHAIN" 22. "IF THIS IS THE END OF THE CHAIN” 23, then make the original call at 24 to the operating system 4; otherwise perform optional tests or processing at 25 and return to 22. "Optional tests or processing” may include checking for permissions, setting a processing delay or priority, etc.
  • the present invention relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules, the method comprising the steps of:
  • the present invention also relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules, the method comprising the steps of: (a) intercepting a system response 31 made to an application program or to a kernel module;
  • the expression "determined hook” relates to the notion “determining” using an algorithm, as is commonly used in operating systems security, scheduling, etc. For example, determining to assign, verify, or certify a most recent state of. status of. modification of, or systems characterization of a system related user, file, or resource.
  • intercepting includes providing a hook manager.
  • the hook manager includes an application program interface
  • the hook manager is an application program or a kernel module or a part thereof.
  • passing control includes an interim step selected from the list:
  • the present invention relates to an operating system 4 20 interface-apparatus comprising systems-architecture having a processor 1 for executing application programs 6 or kernel modules 7, wherein said systems-architecture includes:
  • a hook manager 5 for managing hooking and unhooking of system calls by application programs or kernel modules; and 2 5 • a controller (in 1 or 4) for passing to at least one hook before a system call or after a system response.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

In a systems-architecture having a processor for executing application programs or kernel modules, an operating system interface method including the steps of: providing a hook manager for managing hooking and unhooking of system calls by application programs or kernel modules; and passing control to at least one hook before a system call or after a system response. The manager provides a convenient way to externally expand services provided by an operating system, or to externally resolve incompatibilities between an application program and an operating system.

Description

An Operating System Interface Method
FIELD OF THE INVENTION
This invention relates to a method for interfacing computer applications to a computer's operating system.
BACKGROUND OF THE INVENTION The internal operational organization of today's computer is the culmination of numerous simultaneous engineering considerations. These considerations have brought an ensemble of organizational tools to the task of developing and maintaining software constructed systems. Simultaneously, there is evolving in the computer environment mutual design considerations for computational efficiency, systems security, functional modularity for increasing maintenance and compatibility, etc.
One area, of the presently accepted software architecture design, which has been held in a relatively static state, is the interfacing between a central operating system and peripheral applications programs. Given the present complexity of operating systems and of applications programs, adding of functions to either an operating system or to an application program is a complex undertaking, which often requires global systems-scale testing procedures. There is a need in the art for a method of adding functions in a way that does not require such a cumbersome level of testing. Furthermore, there is a need in the art for a method of interfacing with an operating system in a way that does not contribute to the complexity of such testing. SUMMARY OF THE INVENTION
The present invention relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules. This method includes the steps of: providing a hook manager for managing hooking and unhooking of system calls by application programs or kernel modules; and passing control to at least one hook before a system call or after a system response.
Operating systems are designed to run on a specific computer architecture. In the context of the preferred embodiment of the present invention, an operating system is a substantially centralized software entity running on an externally monolithic aggregate of a computer and its associated peripheral devices (e.g. printer, display, etc.). In the context of other embodiments of the present invention, an operating system is a distributed ensemble of like or linked software entities strategically proliferated into a distributed processing architecture (e.g. a shuffle exchange, a hyper cube, an array processor, a client server network system, etc.).
In each respective architecture, the operating system receives system calls from application programs or from kernel modules. Likewise, the operating system directs system responses to applications programs or to kernel modules. Accordingly, a hook manager is provided, by the present invention, to evaluate an aspect of each system call or system response. The evaluation takes each intercepted call or response, and either passes it on to its expected destination or diverts it to an alternative destination.
By this evaluation and diversion, a general use interfacing with an operating system is provided in a way that does not contribute to the complexity of either operating system testing or applications program testing.
From the vantage of the operating system, the manager is just another applications program. From the vantage of an applications program, the manager is the operating system. Most importantly, from the vantage of a software developer, the manager provides a convenient way to externally expand the services provided by an operating system, and to externally resolve incompatibilities between an application program and an operating system.
According to one common scenario, features of an applications program are specifically built to conform to a special feature of an operating system. Thereafter, there is a desire to use this applications program with another operating system that does not include this special feature. According to the present invention, the manager intercepts all system calls. When the system call is for the special feature, the manager diverts the call to an external "special feature emulator".
According to another common scenario, there is a need to analysis the efficiency of an operating system is a specific environment. According to the present invention, the manager diverts a specific class of system calls to a call-log application where these systems calls are recorded, and thereafter routed via the manager to their original destination, the operating system. An applications program is thereby provided data, e.g. the call-log record, for the needed analysis. Returning to the issue of defining a "manager" with respect to a specific computer architecture environment, the provided manager may be a single centralized entity operating as an intermediary to the operating system of an externally monolithic aggregate of a computer and its associated peripheral devices. For an operating system that is a distributed ensemble of like or linked software entities strategically proliferated into a distributed processing architecture, the manager may a like numbered ensemble of co-managers assigned one co-manager per operating system entity.
Not unlike human management models, the "software" manager of the present invention may create and assign task specific, process specific, or call specific "supervisor" software entities to any whole or partial application program, or even to any group of application programs.
Those versed in the art should appreciate that ostensibly the present invention does not provide any new functionality to the overall computer hardware-software conglomerate. Rather, the present invention allows for many of the known or desired functions to be incorporated into the conglomerate, in an independent modular manner. This facilitates the upward compatibility of both operating systems and applications programs. This facility is especially cost efficient when operating systems or applications programs embody special features, as is commonly the case. Since it is never known in advance which of these features will survive as industry standards and which will lapse into oblivion, the present invention provides an efficient facile solution for those who have invested man-years into utilizing options destined for oblivion.
Furthermore, the present invention provides a rapid development track for the marketing of new system-like utility features, which have not heretofore been incorporated into operating systems. This rapid development track may prove to be useful to the developers of standard accepted operating systems, as a means for introducing new features and for testing their acceptance in the market. This rapid development track may also prove to be useful to small specialty-type developers, who provide peculiar emulation or conversion software routines to clients switching from one operating system to a different operating system.
BRIEF DESCRIPTION OF THE DRAWINGS
In order to understand the invention and to see hov. it may be carried out in practice, a preferred embodiment will now be described, by way of non-limiting example only, with reference to the accompanying drawings, in which: Fig. 1 is a block diagram of a systems-architecture; and
Fig. 2 is a flowchart of a complete system call and system response cycle.
DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT Fig. 1 shows a block diagram of a systems-architecture wherein a processor
1 has an input modality interface 2 and an output modality interface 3. The processor includes an operating system 4, a hook manager 5, a set of application programs 6, and a set of kernel modules 7. The present invention relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules. This method includes the steps of:
(a) providing a hook manager for managing hooking and unhooking of system calls by application programs or kernel modules; and
(b) passing control to at least one hook before a system call or after a system response.
According to an embodiment of the present invention, passing control includes copying additional infomiation to at least one hook. Examples of "additional information" include systems state information, process memory information, kernel tables, response status, etc.
According to an embodiment of the present invention, hooking includes calling an application program interface (API) to receive system calls or to no longer receive system calls. According to an embodiment of the present invention, the hook manager includes an application program interface (API) allowing receiving of system responses or discontinuing receiving of system responses.
According to an embodiment of the present invention, managing includes using the hook manager for: (a) building a chain of hooks in response to requests by an application program or kernel module to receive system calls; and (b) removing a hook from said chain of hooks, in response to requests by an application program or kernel module to no longer receive system calls.
In the context of the present invention, a "chain" is an organization or structure such as a list, a stack, a tree, a net-like graph, etc.
According to one variation of the present invention, building a chain of hooks is in sequential order based on when the requests are received. According to another variation of the present invention, removing a hook is in a non-last-in-first-out (non-LIFO) fashion. According to an embodiment of the present invention, the hook manager is an application program or a kernel module or a part thereof.
According to an embodiment of the present invention, passing control includes an interim step selected from the list: (a) a hook under management of a hook manager gaining access to the system call or system response;
(b) logging the system call or system response;
(c) filtering the system call or system response;
(d) encrypting or decrypting the system call or system response; (e) compressing or decompressing the system call or system response;
(f) modifying, or altering, or replacing the system call or system response; or
(g) delaying the system call or system response.
Fig. 2 shows a flowchart of a complete system call and system response cycle.
Starting at a "BEGIN" 20, a query step "ARE THERE ANY PRE-CALL HOOKS?" 21 is imposed. If there are pre-call hooks, then "GET A HOOK FROM THE HOOK CHAIN" 22. "IF THIS IS THE END OF THE CHAIN" 23, then make the original call at 24 to the operating system 4; otherwise perform optional tests or processing at 25 and return to 22. "Optional tests or processing" may include checking for permissions, setting a processing delay or priority, etc.
Symmetrically, but starting from an operating system response to entry point 30, initiates a post processing a query step "ARE THERE ANY POST-CALL HOOKS?" 31. If there are post-call hooks, then "GET A HOOK FROM THE HOOK CHAIN" 32. "IF THIS IS THE END OF THE CHAIN" 33, then return to 40; otherwise perform optional tests or processing at 35 and return to 32. Again, "optional tests or processing" may include checking for permissions, setting a processing delay or priority, etc. The present invention relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules, the method comprising the steps of:
(a) intercepting a system call 21 made by an application program or by a kernel module;
(b) in a hook chain, determining 22 which of the hooks is permitted to receive control before or after the system call;
(c) if there is at least one determined hook, then selecting at least one of the determined hooks; and (d) passing control to the at least one hook of the selected hooks.
The present invention also relates to an operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules, the method comprising the steps of: (a) intercepting a system response 31 made to an application program or to a kernel module;
(b) in a hook chain, determining 32 which of the hooks is permitted to receive control before or after the system response;
(c) if there is at least one determined hook, then selecting at least one of the determined hooks; and
(d) passing control to the at least one hook of the selected hooks.
It should be appreciated that a system call and a system response are substantially equivalent with respect to functionality and complexity, in the context of the present invention.
In the context of the present invention, the expression "determined hook" relates to the notion "determining" using an algorithm, as is commonly used in operating systems security, scheduling, etc. For example, determining to assign, verify, or certify a most recent state of. status of. modification of, or systems characterization of a system related user, file, or resource. According to an embodiment of the present invention, intercepting includes providing a hook manager. Furthermore, according to one variation of the present invention, the hook manager includes an application program interface
5 (API). According to another variation of the present invention, the hook manager is an application program or a kernel module or a part thereof.
According to the preferred embodiment of the present invention, passing control includes an interim step selected from the list:
(a) a hook under management of a hook manager gaining access to the l o system call or a system response;
(b) logging the system call or a system response;
(c) filtering the system call or a system response;
(d) encrypting or decrypting the system call or a system response;
(e) compressing or decompressing the system call or a system response;
15 (f) modifying, or altering, or replacing the system call or a system response; or (g) delaying the system call or a system response.
Furthermore, the present invention relates to an operating system 4 20 interface-apparatus comprising systems-architecture having a processor 1 for executing application programs 6 or kernel modules 7, wherein said systems-architecture includes:
• a hook manager 5 for managing hooking and unhooking of system calls by application programs or kernel modules; and 25 • a controller (in 1 or 4) for passing to at least one hook before a system call or after a system response.
In the method claims which follow, alphabetic characters used to designate claim steps are provided for convenience only and do not imply any particular order 30 of performing the steps .

Claims

CLAIMS:
1. An operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules, the method comprising the steps of: (a) providing a hook manager for managing hooking and unhooking of system calls by application programs or kernel modules; and (b) passing control to at least one hook before a system call or after a system response.
2. The method according to claim 1 wherein passing control includes copying additional information to at least one hook.
3. The method according to claim 1 wherein hooking includes calling an application program interface (API) to receive system calls.
4. The method according to claim 1 wherein unhooking includes calling an application program interface (API) to no longer receive system calls. 5. The method according to claim 1 wherein the hook manager includes an application program interface (API) allowing receiving of system responses.
6. The method according to claim 1 wherein the hook manager includes an application program interface (API) discontinuing receiving of system responses.
7. The method according to claim 1 wherein managing includes using the hook manager for:
(a) building a chain of hooks in response to requests by an application program or kernel module to receive system calls; and
(b) removing a hook from said chain of hooks, in response to requests by an application program or kernel module to no longer receive system calls. 8. The method according to claim 7 wherein building a chain of hooks is in sequential order based on when the requests are received.
9. The method according to claim 7 wherein removing is in a non-last-in-first-out (non-LIFO) fashion.
10. The method according to claim 1 wherein the hook manager is an application program or a kernel module or a part thereof. - lu ¬
ll. The method according to claim 1 wherein passing control includes an interim step selected from the list:
(a) a hook under management of a hook manager gaining access to the system call or system response; (b) logging the system call or system response;
(c) filtering the system call or system response;
(d) encrypting or decrypting the system call or system response;
(e) compressing or decompressing the system call or system response;
(f) modifying, or altering, or replacing the system call or system response; or
(g) delaying the system call or system response.
12. An operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules, the method comprising the steps of: (a) intercepting a system call made by an application program or by a kernel module;
(b) in a hook chain, determining which of the hooks is permitted to receive control before or after the system call;
(c) if there is at least one determined hook, then selecting at least one of the determined hooks; and
(d) passing control to the at least one hook of the selected hooks.
13. The method according to claim 12 wherein intercepting includes providing a hook manager.
14. The method according to claim 13 wherein the hook manager includes an application program interface (API).
15. The method according to claim 13 wherein the hook manager is an application program or a kernel module or a part thereof.
16. The method according to claim 12 wherein passing control includes an interim step selected from the list: (a) a hook under management of a hook manager gaining access to the system call or a system response;
(b) logging the system call or a system response;
(c) filtering the system call or a system response; (d) encrypting or decrypting the system call or a system response;
(e) compressing or decompressing the system call or a system response;
(f) modifying, or altering, or replacing the system call or a system response; or
(g) delaying the system call or a system response.
17. An operating system interface method, for use in a systems-architecture having a processor for executing application programs or kernel modules, the method comprising the steps of: (a) intercepting a system response made to an application program or to a kernel module;
(b) in a hook chain, determining which of the hooks is permitted to receive control before or after the system response;
(c) if there is at least one determined hook, then selecting at least one of the determined hooks; and
(d) passing control to the at least one hook of the selected hooks.
18. The method according to claim 17 wherein intercepting includes providing a hook manager.
19. The method according to claim 18 wherein the hook manager includes an application program interface (API).
20. The method according to claim 18 wherein the hook manager is an application program or a kernel module or a part thereof.
21. The method according to claim 17 wherein passing control includes an interim step selected from the list: (a) a hook under management of a hook manager gaining access to a system call or the system response;
(b) logging a system call or the system response;
(c) filtering a system call or the system response; (d) encrypting or decrypting a system call or the system response;
(e) compressing or decompressing a system call or the system response;
(f) modifying, or altering, or replacing a system call or the system response or
(g) delaying a system call or the system response.
22. An operating system interface-apparatus comprising systems-architecture having a processor for executing application programs or kernel modules, wherein said systems-architecture includes:
(a) a hook manager for managing hooking and unhooking of system calls by application programs or kernel modules; and
(b) a controller for passing to at least one hook before a system call or after a system response.
PCT/IL1999/000236 1999-05-06 1999-05-06 An operating system interface method Ceased WO2000068790A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU37265/99A AU3726599A (en) 1999-05-06 1999-05-06 An operating system interface method
PCT/IL1999/000236 WO2000068790A1 (en) 1999-05-06 1999-05-06 An operating system interface method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IL1999/000236 WO2000068790A1 (en) 1999-05-06 1999-05-06 An operating system interface method

Publications (1)

Publication Number Publication Date
WO2000068790A1 true WO2000068790A1 (en) 2000-11-16

Family

ID=11062714

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL1999/000236 Ceased WO2000068790A1 (en) 1999-05-06 1999-05-06 An operating system interface method

Country Status (2)

Country Link
AU (1) AU3726599A (en)
WO (1) WO2000068790A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2367926A (en) * 2000-05-31 2002-04-17 Siemens Inf & Comm Networks Interfacing a service component to a native API
US7130261B1 (en) 2000-05-31 2006-10-31 Siemens Communications, Inc. Hierarchical dependability for open distributed environments
WO2014209359A1 (en) * 2013-06-28 2014-12-31 Hewlett-Packard Development Company, L.P. Hook framework
CN104360888A (en) * 2014-11-29 2015-02-18 中国航空工业集团公司第六三一研究所 System call secondary expanding method oriented to partition operating system
US9424420B2 (en) 2013-08-02 2016-08-23 Red Hat, Inc. Restricting application binary interfaces

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5454086A (en) * 1992-08-11 1995-09-26 International Business Machines Corporation Dynamic program analyzer facility

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5454086A (en) * 1992-08-11 1995-09-26 International Business Machines Corporation Dynamic program analyzer facility

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JONES M B: "Interposition agents: transparently interposing user code at the system interface", 14TH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, ASHVILLE, NC, USA; OPERATING SYSTEMS REVIEW, vol. 27, no. 5, 5 December 1993 (1993-12-05) - 8 December 1993 (1993-12-08), USA, pages 80 - 93, XP002126575, ISSN: 0163-5980, Retrieved from the Internet <URL:http://www.acm.org/pubs/articles/proceedings/ops/168619/p80-jones/p80-jones.pdf> [retrieved on 19991222] *
MRKOR, KAI-UWE: "NACHGEHAKT WINDOWS-NACHRICHTEN FILTERN MIT HOOK-FUNTIONEN", C'T MAGAZIN FÜR COMPUTER TECHNIK, no. 5, DE,VERLAG HEINZ HEISE GMBH., HANNOVER, pages 272-274,276,278,280-281, XP000800884, ISSN: 0724-8679 *
RUSSINOVICH M ET AL: "EXAMINING VXD SERVICE HOOKING", DR. DOBB'S JOURNAL, vol. 21, no. 5, May 1996 (1996-05-01), US,SAN MATEO, CA, pages 32,34,36 - 37, XP002035779 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2367926A (en) * 2000-05-31 2002-04-17 Siemens Inf & Comm Networks Interfacing a service component to a native API
US7130261B1 (en) 2000-05-31 2006-10-31 Siemens Communications, Inc. Hierarchical dependability for open distributed environments
WO2014209359A1 (en) * 2013-06-28 2014-12-31 Hewlett-Packard Development Company, L.P. Hook framework
US10545775B2 (en) 2013-06-28 2020-01-28 Micro Focus Llc Hook framework
US9424420B2 (en) 2013-08-02 2016-08-23 Red Hat, Inc. Restricting application binary interfaces
CN104360888A (en) * 2014-11-29 2015-02-18 中国航空工业集团公司第六三一研究所 System call secondary expanding method oriented to partition operating system

Also Published As

Publication number Publication date
AU3726599A (en) 2000-11-21

Similar Documents

Publication Publication Date Title
Cao et al. A scalable multicloud storage architecture for cloud-supported medical internet of things
Thain et al. Condor and the Grid
Grimshaw et al. Wide area computing: resource sharing on a large scale
CN111641675A (en) Multi-tenant access service implementation method, device, equipment and storage medium
US20010016867A1 (en) Framework system and method for testing server performance
US20160014238A1 (en) System and Method for Testing Applications with a Load Tester and Testing Translator
CN108595983B (en) A hardware architecture and application context integrity measurement method based on hardware security isolation execution environment
CN110320378A (en) Application method, device, equipment and computer readable storage medium are tested in Quality Control
CN110442502A (en) A kind of method, apparatus buried a little, equipment and storage medium
Hunold et al. Autotuning MPI collectives using performance guidelines
Mukute et al. Control plane performance benchmarking and feature analysis of popular open-source 5g core networks: Openairinterface, open5gs, and free5gc
WO2000068790A1 (en) An operating system interface method
JPH07244644A (en) Agent management system
CN114253823B (en) Distributed test method and related equipment
CN113535544A (en) Running method of sub-application to be debugged, computer equipment and device
CN112583877B (en) Resource information processing method and device, storage medium and electronic equipment
Álvarez et al. Integrating schedulability analysis and sdl in an object-oriented methodology for embedded real-time systems
CN114218073A (en) Interface testing method, device, server and medium
CN118760462B (en) A production-research collaboration system and application method
JP7753048B2 (en) Communication device diagnostic system and communication device diagnostic method
Balsamo et al. Università Ca’Foscari di Venezia
Santos et al. Integrating infrastructures for manufacturing a comparative analysis
CN111258879A (en) Service test scheduling method and device based on page acquisition and intelligent terminal
US20160188872A1 (en) Method and system for runtime injection of secure applications
Dong Test case reduction technique for BPEL-based testing

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase