miércoles, 15 de mayo de 2013

java instrumentation tutorial

A tale of Java bytecode instrumentation + LiveRebel (Part 4)
A tale of Java bytecode instrumentation + LiveRebel (Part 4)

java instrumentation tutorial


A tale of Java bytecode instrumentation + LiveRebel (Part 4)



Descripcion del Video
Part 3 - youtu.be/gVctdNIu6s8

Thermostat: An Open Source Instrumentation Tool for the HotSpot JVM



Descripcion del Video
"Thermostat is a new instrumentation tool for Oracle's HotSpot JVM that is both scalable and extensible and provides an out-of-the-box solution for monitoring, diagnosing, profiling, and controlling the JVM. Thermostat's main goal is to be a distributed instrumentation tool, and Thermostat aims to make it easy to monitor the Java VM over a range of possible scenarios and use cases, from simple local applications to complex cloud-oriented PaaS stacks. This presentation describes Red Hat's extensible model for collecting JVM and system monitoring data side by side, and attendees will learn about the features that make Thermostat unique. It also describes Red Hat's Eclipse plug-in and standalone Swing and command-line clients." Copyright © 2013 Oracle and/or its affiliates. Oracle® is a registered trademark of Oracle and/or its affiliates. All rights reserved. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the "Materials"). The Materials are provided "as is" without any warranty of any kind, either express or implied, including without limitation warranties of merchantability, fitness for a particular purpose, and non-infringement.

A tale of Java bytecode instrumentation (Part 1)



Descripcion del Video
????? ??????? (??????? ???????? ZeroTurnaround, JRebel Product Lead), JRebel ?? JUG KPI ??????????? goo.gl/tf8Ox Part 2 - youtu.be/DByR8bmhghI

Using Instrumentation to Find Vulnerabilities in Java EE Applications



Descripcion del Video
Java EE is the platform of choice for critical applications—exactly the ones targeted by groups such as Anonymous and organized crime. However, discovery of software vulnerabilities has always been a costly and error-prone process. In this session, Aspect Security discusses its discovery of a way to use the Java Instrumentation API to perform "intrinsic analysis"—finding vulnerabilities from within a running application. Its approach is simple to implement and powerful, enabling developers to find security flaws without headaches and false alarms. The company has created a Java agent that runs in your app server and discovers vulnerabilities passively as you develop and test, without requiring anyone to attack your code. Aspect Security will be releasing a free version of its technology. Copyright © 2013 Oracle and/or its affiliates. Oracle® is a registered trademark of Oracle and/or its affiliates. All rights reserved. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the "Materials"). The Materials are provided "as is" without any warranty of any kind, either express or implied, including without limitation warranties of merchantability, fitness for a particular purpose, and non-infringement.

Dynamic Instrumentation of Java Statically Defined Tracing



Descripcion del Video
Java statically defined tracing (JSDT) enables programmers to statically add probes to their code and activate them when required, using as a framework Oracle Solaris' DTrace feature. JSDT follows user-land statically defined tracing (USDT) for C/C++, but in Java it can be taken further: let's use the Java Attach API and the class-redefinition capabilities to turn static into dynamic. In this session, hear how to easily use the DTrace framework to dynamically instrument a running Java program with JSDT probes. Gain tremendous tracing power with no static change to the code, no recompile, and no performance impact when the probes are not activated. Copyright © 2013 Oracle and/or its affiliates. Oracle® is a registered trademark of Oracle and/or its affiliates. All rights reserved. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the "Materials"). The Materials are provided "as is" without any warranty of any kind, either express or implied, including without limitation warranties of merchantability, fitness for a particular purpose, and non-infringement.

Comentarios de los Videos java instrumentation tutorial


El Ajo de huesos y cuantas funciones para el código ejecutable, a vuelto a calentarla.

No hay comentarios:

Publicar un comentario