SEDSpec: Securing Emulated Devices by Enforcing Execution Specification
Published in DSN, 2024
This paper is about protecting the emulated Devices
Published in DSN, 2024
This paper is about protecting the emulated Devices
Published in ACSAC, 2023
This paper is about generating access control rules.
Recommended citation: Shaowen Xu, Qihang Zhou, Heqing Huang, Xiaoqi Jia, Haichao Du, Yang Chen, and Yamin Xie. 2023. Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch. In Proceedings of the 39th Annual Computer Security Applications Conference (ACSAC 23). Association for Computing Machinery, New York, NY, USA, 229–240. https://doi.org/10.1145/3627106.3627137
Download Paper | Download Slides