Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch S Xu, Q Zhou, H Huang, X Jia, H Du, Y Chen, Y Xie Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | 3 | 2023 |
ConMonitor: Lightweight Container Protection with Virtualization and VM Functions S Xu, Q Zhou, Z Zhang, X Jia, D Liu, H Huang, H Du, Z Song Proceedings of the 2024 ACM Symposium on Cloud Computing, 755-773, 2024 | | 2024 |
SummSlim: A Universal and Automated Approach for Debloating Container Images Z Zhang, H Huang, S Xu, Q Zhou, T Zhang, X Jia, W Zhang 2024 IEEE 30th International Conference on Parallel and Distributed Systems …, 2024 | | 2024 |
SEDSpec: Securing Emulated Devices by Enforcing Execution Specification Y Chen, S Zhang, X Jia, Q Zhou, H Huang, S Xu, H Du 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems …, 2024 | | 2024 |