Publications

ConMonitor: Lightweight Container Protection with Virtualization and VM Functions

Published in SoCC, 2024

This paper is about container isolation.

Recommended citation: Shaowen Xu, Qihang Zhou, Zhicong Zhang, Xiaoqi Jia, Donglin Liu, Heqing Huang, Haichao Du, and Zhenyu Song. 2024. ConMonitor: Lightweight Container Protection with Virtualization and VM Functions. In Proceedings of the 2024 ACM Symposium on Cloud Computing (SoCC 24). Association for Computing Machinery, New York, NY, USA, 755–773. https://doi.org/10.1145/3698038.3698520
Download Paper

SEDSpec: Securing Emulated Devices by Enforcing Execution Specification

Published in DSN, 2024

This paper is about protecting the emulated Devices

Recommended citation: Y. Chen et al., "SEDSpec: Securing Emulated Devices by Enforcing Execution Specification," 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, Australia, 2024, pp. 522-534, doi: 10.1109/DSN58291.2024.00056. keywords: {Performance evaluation;Runtime;Automation;Instruments;Emulation;Prototypes;Object recognition;device emulation;anomaly detection;execution specification;program analysis}
Download Paper

Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch

Published in ACSAC, 2023

This paper is about generating access control rules.

Recommended citation: Shaowen Xu, Qihang Zhou, Heqing Huang, Xiaoqi Jia, Haichao Du, Yang Chen, and Yamin Xie. 2023. Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch. In Proceedings of the 39th Annual Computer Security Applications Conference (ACSAC 23). Association for Computing Machinery, New York, NY, USA, 229–240. https://doi.org/10.1145/3627106.3627137
Download Paper | Download Slides