{"id":"https://openalex.org/W2956485969","doi":"https://doi.org/10.1109/icc.2019.8761196","title":"Exploiting Java Stack Forensics for Runtime Monitoring of IoT Services","display_name":"Exploiting Java Stack Forensics for Runtime Monitoring of IoT Services","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2956485969","doi":"https://doi.org/10.1109/icc.2019.8761196","mag":"2956485969"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761196","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761196","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048187599","display_name":"Yanfang Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I23171815","display_name":"Zhengzhou University of Light Industry","ror":"https://ror.org/05fwr8z16","country_code":"CN","type":"education","lineage":["https://openalex.org/I23171815"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan-fang Mao","raw_affiliation_strings":["Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou, China","institution_ids":["https://openalex.org/I23171815"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100354848","display_name":"Yang Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101979694","display_name":"Junliang Chen","orcid":"https://orcid.org/0000-0002-7147-2625"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun-liang Chen","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110626480","display_name":"Kong-yang Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kong-yang Zhao","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048187599"],"corresponding_institution_ids":["https://openalex.org/I23171815"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06887665,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"41","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8730581998825073},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.7693307399749756},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.6786211133003235},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.6309202909469604},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.49336138367652893},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4811640679836273},{"id":"https://openalex.org/keywords/runtime-verification","display_name":"Runtime verification","score":0.48102885484695435},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.4362950623035431},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4241238236427307},{"id":"https://openalex.org/keywords/runtime-system","display_name":"Runtime system","score":0.41881436109542847},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.38512712717056274},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36659860610961914},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3541424870491028},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16579601168632507},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.15553772449493408},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.10478875041007996},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.07811647653579712}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8730581998825073},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7693307399749756},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.6786211133003235},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.6309202909469604},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.49336138367652893},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4811640679836273},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.48102885484695435},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.4362950623035431},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4241238236427307},{"id":"https://openalex.org/C2780870223","wikidata":"https://www.wikidata.org/wiki/Q1004415","display_name":"Runtime system","level":2,"score":0.41881436109542847},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.38512712717056274},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36659860610961914},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3541424870491028},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16579601168632507},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.15553772449493408},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.10478875041007996},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.07811647653579712}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761196","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761196","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W156975870","https://openalex.org/W1487623084","https://openalex.org/W1538122302","https://openalex.org/W1641762327","https://openalex.org/W1963581527","https://openalex.org/W2012929681","https://openalex.org/W2101623441","https://openalex.org/W2118558829","https://openalex.org/W2460736843","https://openalex.org/W2512457951","https://openalex.org/W2579276500","https://openalex.org/W2585173259","https://openalex.org/W2600360640","https://openalex.org/W2744934275","https://openalex.org/W2792801185","https://openalex.org/W6606420401","https://openalex.org/W6637110787"],"related_works":["https://openalex.org/W1537002606","https://openalex.org/W4307888121","https://openalex.org/W4226215696","https://openalex.org/W4224692222","https://openalex.org/W2072754671","https://openalex.org/W4247959794","https://openalex.org/W2749562936","https://openalex.org/W2119424404","https://openalex.org/W3163325258","https://openalex.org/W2136651729"],"abstract_inverted_index":{"Internet":[0],"of":[1,52,63,69,91,101,104,125,157,165,184],"Things":[2],"(IoT)":[3],"services":[4,71],"play":[5],"an":[6,112],"increasingly":[7],"important":[8],"role":[9],"in":[10,17,24,45,57,137,151],"modern":[11],"society":[12],"with":[13,200],"the":[14,60,66,78,99,132,140,179,182,185,194],"more":[15],"deployment":[16],"critical":[18],"infrastructures.":[19],"Ensuring":[20],"IoT":[21,105,149,158],"systems":[22],"operating":[23],"a":[25,32,40,119,123,168],"secure":[26],"and":[27,34,75,116,139,190,198,204],"safe":[28],"environment":[29],"is":[30,55,72,128,171,187,196],"becoming":[31],"mandatory":[33],"urgent":[35],"requirement.":[36],"We":[37,110,130],"have":[38],"proposed":[39],"non-intrusive":[41],"runtime":[42,51,67,102,155],"monitoring":[43,68,103,156],"mechanism":[44],"our":[46],"previous":[47],"work,":[48],"but":[49],"only":[50],"C":[53,92],"applications":[54],"considered":[56],"it.":[58],"With":[59],"widely":[61],"use":[62],"Java":[64,70,94,120,161],"applications,":[65],"quite":[73],"essential":[74],"important.":[76],"However,":[77],"existing":[79],"memory":[80],"forensics":[81],"on":[82,88],"user":[83],"processes":[84],"are":[85,144],"mainly":[86],"focused":[87],"native":[89],"stack":[90,169,186],"or":[93,173],"heap,":[95],"which":[96,143],"cannot":[97],"meet":[98],"requirements":[100],"services.":[106],"In":[107],"this":[108],"paper,":[109],"propose":[111],"approach":[113],"to":[114,134,147,181],"dump":[115],"semantically":[117],"reconstruct":[118,176],"stack,":[121],"where":[122],"history":[124],"executed":[126],"methods":[127,136],"obtained.":[129],"show":[131,192],"algorithms":[133],"extract":[135],"calling":[138],"associated":[141],"parameters,":[142],"further":[145],"encapsulated":[146],"be":[148],"events":[150],"XML":[152],"format":[153],"for":[154],"services,":[159],"from":[160,178],"stacks.":[162],"The":[163],"challenge":[164],"determining":[166],"whether":[167],"frame":[170],"interpreted":[172],"compiled":[174],"when":[175],"frames":[177],"bottom":[180],"top":[183],"solved.":[188],"Experiments":[189],"evaluations":[191],"that":[193],"reconstruction":[195],"feasible":[197],"effective,":[199],"low":[201],"resource":[202],"occupation":[203],"real-time":[205],"responses.":[206]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
