Search For:

Displaying 1-8 out of 8 total
Shuttle: Facilitating Inter-Application Interactions for OS-Level Virtualization
Found in: IEEE Transactions on Computers
By Zhiyong Shan,Xin Wang,Tzi-cker Chiueh
Issue Date:May 2014
pp. 1220-1233
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However, multiple-member applications required for forming a system may need to occa...
 
Malware Clearance for Secure Commitment of OS-Level Virtual Machines
Found in: IEEE Transactions on Dependable and Secure Computing
By Zhiyong Shan, Xin Wang, Tzi-cker Chiueh
Issue Date:March 2013
pp. 70-83
A virtual machine(VM) can be simply created upon use and disposed upon the completion of the tasks or the detection of error. The disadvantage of this approach is that if there is no malicious activity, the user has to redo all of the work in her actual wo...
 
Enforcing Mandatory Access Control in Commodity OS to Disable Malware
Found in: IEEE Transactions on Dependable and Secure Computing
By Zhiyong Shan,Xin Wang,Tzi-cker Chiueh
Issue Date:July 2012
pp. 540-554
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusab...
 
Compatible and Usable Mandatory Access Control for Good-enough OS Security
Found in: Electronic Commerce and Security, International Symposium
By Zhiyong Shan
Issue Date:May 2009
pp. 246-250
OS compromise is one of the most serious computer security problems today, but still not being resolved. Although people proposed different kinds of methods, they could not be accepted by most users who are non-expert due to the lack of compatibility and u...
 
Facilitating inter-application interactions for OS-level virtualization
Found in: Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments (VEE '12)
By Tzi-cker Chiueh, Xin Wang, Xiaofeng Meng, Zhiyong Shan
Issue Date:March 2012
pp. 75-86
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However, multiple-member applications required for forming a system may need to occa...
     
Virtualizing system and ordinary services in Windows-based OS-level virtual machines
Found in: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC '11)
By Tzi-cker Chiueh, Xin Wang, Zhiyong Shan
Issue Date:March 2011
pp. 579-583
OS-level virtualization incurs smaller start-up and run-time overhead than HAL-based virtualization and thus forms an important building block for developing fault-tolerant and intrusion-tolerant applications. A complete implementation of OS-level virtuali...
     
Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing
Found in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11)
By Tzi-cker Chiueh, Xin Wang, Zhiyong Shan
Issue Date:March 2011
pp. 135-144
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusab...
     
Confining windows inter-process communications for OS-level virtual machine
Found in: Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems (VDTS '09)
By Tzi-cker Chiueh, Yang Yu, Zhiyong Shan
Issue Date:March 2009
pp. 30-35
As OS-level virtualization technology usually imposes little overhead on virtual machine start-up and running, it provides an excellent choice for building intrusion/fault tolerant applications that require redundancy and frequent invocation. When developi...
     
 1