Search

Class Transformations for Transparent Distribution of Java Applications

By: Phil McGachey, Antony L. Hosking, J. Eliot B. Moss

Abstract

The indirection of object accesses is a common theme for target domains as diverse as transparent distribution, persistence, and program instrumentation. Virtualizing accesses to fields and methods (by redirecting calls through accessor and indirection methods) allows interposition of arbitrary code, extending the functionality of an application beyond that intended by the original developer. We present class modifications performed by our RuggedJ transparent distribution platform for standard Java virtual machines. RuggedJ abstracts over the location of objects by implementing a single object model for local and remote objects. However the implementation of this model is complicated by the presence of native and system code; classes loaded by Java's bootstrap class loader can be rewritten only in a limited manner, and so cannot be modified to conform to RuggedJ's complex object model. We observe that system code comprises the majority of a given Java application: an average of 78% in the applications we study. We consider the constraints imposed upon pervasive class transformation within Java, and present a framework for systematically rewriting arbitrary applications. Our system accommodates all system classes, allowing both user and system classes alike to be referenced using a single object model.

Keywords

distribution, partitioning, program transformation, object model

Cite as:

Phil McGachey, Antony L. Hosking, J. Eliot B. Moss, “Class Transformations for Transparent Distribution of Java Applications”, Journal of Object Technology, Volume 10, (2011), pp. 9:1-35, doi:10.5381/jot.2011.10.1.a9.

PDF | DOI | BiBTeX | Tweet this | Post to CiteULike | Share on LinkedIn