Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in ACSAC, 2023
This paper is about generating access control rules.
Recommended citation: Shaowen Xu, Qihang Zhou, Heqing Huang, Xiaoqi Jia, Haichao Du, Yang Chen, and Yamin Xie. 2023. Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch. In Proceedings of the 39th Annual Computer Security Applications Conference (ACSAC 23). Association for Computing Machinery, New York, NY, USA, 229–240. https://doi.org/10.1145/3627106.3627137
Download Paper | Download Slides
Published in DSN, 2024
This paper is about protecting the emulated Devices
Recommended citation: Y. Chen et al., "SEDSpec: Securing Emulated Devices by Enforcing Execution Specification," 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, Australia, 2024, pp. 522-534, doi: 10.1109/DSN58291.2024.00056. keywords: {Performance evaluation;Runtime;Automation;Instruments;Emulation;Prototypes;Object recognition;device emulation;anomaly detection;execution specification;program analysis}
Download Paper
Published in ICPADS, 2024
This paper is about container image slim.
Recommended citation: Z. Zhang et al., "SummSlim: A Universal and Automated Approach for Debloating Container Images," in 2024 IEEE 30th International Conference on Parallel and Distributed Systems (ICPADS), Belgrade, Serbia, 2024, pp. 132-141, doi: 10.1109/ICPADS63350.2024.00027.
Download Paper
Published in SoCC, 2024
This paper is about container isolation.
Recommended citation: Shaowen Xu, Qihang Zhou, Zhicong Zhang, Xiaoqi Jia, Donglin Liu, Heqing Huang, Haichao Du, and Zhenyu Song. 2024. ConMonitor: Lightweight Container Protection with Virtualization and VM Functions. In Proceedings of the 2024 ACM Symposium on Cloud Computing (SoCC 24). Association for Computing Machinery, New York, NY, USA, 755–773. https://doi.org/10.1145/3698038.3698520
Download Paper
Published in NDSS, 2025
This paper is about protecting container applications
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.