2022 IEEE 47th Conference on Local Computer Networks (LCN) 2022
DOI: 10.1109/lcn53696.2022.9843536
|View full text |Cite
|
Sign up to set email alerts
|

Unobtrusive Mechanism Interception

Abstract: Networked systems and applications are often based on proprietary hardware/software components that manufacturers might not be willing to adapt or update if new requirements arise. We present mechanism interception, a novel approach to unobtrusively add or modify functionality to/of an existing networked system or application without touching any proprietary components. Behavioral changes are achieved by functionality-enhancing yet unobtrusive interceptors, i.e., components introduced between systems and their… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…In this demo, we replace TTCloud with a versatile gateway based on open source software and components-off-the-shelf (COTS) hardware to allow dynamic reconfiguration of all TTs and to have a common basis for the automated analysis of collected data based on the novel concept of unobtrusive mechanism interception [5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this demo, we replace TTCloud with a versatile gateway based on open source software and components-off-the-shelf (COTS) hardware to allow dynamic reconfiguration of all TTs and to have a common basis for the automated analysis of collected data based on the novel concept of unobtrusive mechanism interception [5].…”
Section: Introductionmentioning
confidence: 99%
“…Especially in congested frequency bands, operating a TT network without collision avoidance is problematic, often resulting in poor reliability. To add or modify the functionality of an existing networked system, we rely on the novel approach of unobtrusive mechanism interception [5]. Therefore, we distinguish between system, i.e., components containing proprietary or other nonchangeable parts, and environment, i.e., components containing modifiable parts under our control.…”
Section: Introductionmentioning
confidence: 99%