An Object Proxy‐Based Dynamic Layer Replacement to Protect IoMT Applications
B Han, Z Yin-Liang… - Security and …, 2019 - Wiley Online Library
B Han, Z Yin-Liang, Z Chang-Peng
Security and Communication Networks, 2019•Wiley Online LibraryThe Internet of medical things (IoMT) has become a promising paradigm, where the
invaluable additional data can be collected by the ordinary medical devices when
connecting to the Internet. The deep understanding of symptoms and trends can be provided
to patients to manage their lives and treatments. However, due to the diversity of medical
devices in IoMT, the codes of healthcare applications may be manipulated and tangled by
malicious devices. In addition, the linguistic structures for layer activation in languages …
invaluable additional data can be collected by the ordinary medical devices when
connecting to the Internet. The deep understanding of symptoms and trends can be provided
to patients to manage their lives and treatments. However, due to the diversity of medical
devices in IoMT, the codes of healthcare applications may be manipulated and tangled by
malicious devices. In addition, the linguistic structures for layer activation in languages …
The Internet of medical things (IoMT) has become a promising paradigm, where the invaluable additional data can be collected by the ordinary medical devices when connecting to the Internet. The deep understanding of symptoms and trends can be provided to patients to manage their lives and treatments. However, due to the diversity of medical devices in IoMT, the codes of healthcare applications may be manipulated and tangled by malicious devices. In addition, the linguistic structures for layer activation in languages cause controls of layer activation to be part of program’s business logic, which hinders the dynamic replacement of layers. Therefore, to solve the above critical problems in IoMT, in this paper, a new approach is firstly proposed to support the dynamic replacement of layer in IoMT applications by incorporating object proxy into virtual machine (VM). Secondly, the heap and address are used to model the object and object evolution to guarantee the feasibility of the approach. After that, we analyze the influences of field access and method invocation and evaluate the risk and safety of the application when these constraints are satisfied. Finally, we conduct the evaluations by extending Java VM to validate the effectiveness of the proposal.
Wiley Online Library
Showing the best result for this search. See all results