A behavioral approach to worm detection
Proceedings of the 2004 ACM workshop on Rapid malcode
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
Proceedings of the 14th ACM conference on Computer and communications security
Secure Sharing of an ICT Infrastructure through Vinci
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
ACM Transactions on Information and System Security (TISSEC)
"Out-of-the-Box" monitoring of VM-based high-interaction honeypots
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Hi-index | 0.00 |
General-purpose operating systems provide a rich computing environmentboth to the user and the attacker. The declining cost ofhardware and the growing security concerns of software necessitatea revalidation of the many assumptions made in network servicearchitectures. Enforcing sound design principles while retainingusability and flexibility is key to practical security. Poly2 is anapproach to build a hardened framework for network services fromcommodity hardware and software. Guided by well-known securitydesign principles such as least common mechanism and economyof mechanism, and driven by goals such as psychological acceptabilityand immediate usability, Poly2 provides a secure platformfor network services. It also serves as a testbed for severalsecurity-related research areas such as intrusion detection, forensics,and high availability. This paper discusses the overall designand philosophy of Poly2, presents an initial implementation, andoutlines future work.