Using virtual machines to do cross-layer damage assessment

Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In this paper, we present an approach that uses virtual machines to do "out-of-the-box" cross-layer damage assessment, an indispensable part of security/risk management. To resolve the con ict between fine-grained damage assessment and the response time requirements of service requests, we present a new production environment damage assessment architecture. We have implemented a major portion of the architecture and done preliminary evaluation. Contribu- tions of our system include combining instruction and OS level taint tracking, and efficient "what-if" damage assess- ment methods.

Original languageEnglish (US)
Title of host publicationProceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
Pages29-38
Number of pages10
DOIs
StatePublished - Dec 1 2008
Event1st ACM Workshop on Virtual Machine Security, VMSec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08 - Alexandria, VA, United States
Duration: Oct 27 2008Oct 31 2008

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Other

Other1st ACM Workshop on Virtual Machine Security, VMSec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08
CountryUnited States
CityAlexandria, VA
Period10/27/0810/31/08

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Using virtual machines to do cross-layer damage assessment'. Together they form a unique fingerprint.

Cite this