{"id":"https://openalex.org/W2065448121","doi":"https://doi.org/10.1145/1998582.1998601","title":"Safe side effects commitment for OS-level virtualization","display_name":"Safe side effects commitment for OS-level virtualization","publication_year":2011,"publication_date":"2011-06-14","ids":{"openalex":"https://openalex.org/W2065448121","doi":"https://doi.org/10.1145/1998582.1998601","mag":"2065448121"},"language":"en","primary_location":{"id":"doi:10.1145/1998582.1998601","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1998582.1998601","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM international conference on Autonomic computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017433912","display_name":"Zhiyong Shan","orcid":null},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyong Shan","raw_affiliation_strings":["Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Stony Brook University, Beijing, China","Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Stony Brook University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Stony Brook University, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Stony Brook University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100327844","display_name":"Xin Wang","orcid":"https://orcid.org/0000-0001-8639-3818"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xin Wang","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111960386","display_name":"Tzi\u2010cker Chiueh","orcid":null},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tzi-cker Chiueh","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109258303","display_name":"Xiaofeng Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Meng","raw_affiliation_strings":["Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Beijing, China","Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Beijing, China#TAB#","institution_ids":["https://openalex.org/I78988378"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017433912"],"corresponding_institution_ids":["https://openalex.org/I78988378"],"apc_list":null,"apc_paid":null,"fwci":1.5311,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.82633575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"120"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8552093505859375},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8054094314575195},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.6930482983589172},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5264445543289185},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5056493282318115},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.4433787167072296},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.43859240412712097},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4380735158920288},{"id":"https://openalex.org/keywords/serialization","display_name":"Serialization","score":0.4338107109069824},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.4291216731071472},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.41944822669029236},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3926265239715576},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3708306550979614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3297646939754486},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.26480501890182495}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8552093505859375},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8054094314575195},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.6930482983589172},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5264445543289185},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5056493282318115},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.4433787167072296},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.43859240412712097},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4380735158920288},{"id":"https://openalex.org/C52723943","wikidata":"https://www.wikidata.org/wiki/Q1127410","display_name":"Serialization","level":2,"score":0.4338107109069824},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.4291216731071472},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.41944822669029236},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3926265239715576},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3708306550979614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3297646939754486},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.26480501890182495},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1998582.1998601","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1998582.1998601","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th ACM international conference on Autonomic computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W31137683","https://openalex.org/W114793137","https://openalex.org/W182375779","https://openalex.org/W1518811650","https://openalex.org/W1552906779","https://openalex.org/W1572904055","https://openalex.org/W1581009051","https://openalex.org/W1761672165","https://openalex.org/W1937713330","https://openalex.org/W1956767865","https://openalex.org/W1974322070","https://openalex.org/W2005878528","https://openalex.org/W2065418752","https://openalex.org/W2101451533","https://openalex.org/W2103499520","https://openalex.org/W2138357890","https://openalex.org/W2140953464","https://openalex.org/W2142902108","https://openalex.org/W2151135920","https://openalex.org/W2152172333","https://openalex.org/W2157657700","https://openalex.org/W2164170013","https://openalex.org/W2284416727","https://openalex.org/W2295705535","https://openalex.org/W2471373840","https://openalex.org/W2913264117","https://openalex.org/W4245671428"],"related_works":["https://openalex.org/W2469507153","https://openalex.org/W2008790809","https://openalex.org/W2439951656","https://openalex.org/W2768892939","https://openalex.org/W2469346691","https://openalex.org/W3211525895","https://openalex.org/W2765174411","https://openalex.org/W2965893286","https://openalex.org/W2991580804","https://openalex.org/W2810666735"],"abstract_inverted_index":{"A":[0],"common":[1],"application":[2],"of":[3,27,44,94,103,128,134,212,218,289,306,309,324],"virtual":[4],"machines":[5],"(VM)":[6],"is":[7,30,34,53,313],"to":[8,41,57,69,84,98,146,194],"use":[9],"and":[10,22,114,117,142,166,182,215,292],"then":[11,183],"throw":[12],"away,":[13],"basically":[14],"treating":[15],"a":[16,19,78,131,151,156,188,228,251,269,286],"VM":[17,67,79,97,270],"like":[18],"completely":[20],"isolated":[21],"disposable":[23],"entity.":[24],"The":[25],"disadvantage":[26],"this":[28,74],"approach":[29,154,323],"that":[31,169,210,221,258,317],"if":[32],"there":[33,52],"no":[35,54],"malicious":[36,87,115,148,185,202,264],"activity,":[37],"the":[38,45,62,66,70,92,99,153,196,216,219,245,259,278,282,304,310,320,325],"user":[39],"has":[40,122,285],"re-do":[42],"all":[43],"work":[46],"in":[47],"her":[48],"actual":[49],"workspace":[50],"since":[51],"easy":[55],"way":[56],"commit":[58],"(i.e.,":[59],"merge)":[60],"only":[61],"benign":[63,113,119],"updates":[64],"within":[65],"back":[68],"host":[71],"environment.":[72],"In":[73,302],"work,":[75],"we":[76],"develop":[77],"commitment":[80],"system":[81],"called":[82],"Secom":[83,101,121,177,243,283,311],"automatically":[85],"eliminate":[86,263],"state":[88,107,265],"changes":[89,108,266],"when":[90,200],"merging":[91],"contents":[93],"an":[95],"OS-level":[96,139,253],"host.":[100],"consists":[102],"three":[104,123],"steps:":[105],"grouping":[106],"into":[109,180],"clusters,":[110,116,203],"distinguishing":[111],"between":[112],"committing":[118,268],"clusters.":[120],"novel":[124],"features.":[125],"First,":[126],"instead":[127],"relying":[129],"on":[130,187,244],"huge":[132],"volume":[133],"log":[135],"data,":[136],"it":[137,204],"leverages":[138],"information":[140,145],"flow":[141],"malware":[143,208,236,299],"behavior":[144,230],"recognize":[147],"changes.":[149],"As":[150],"result,":[152],"imposes":[155],"smaller":[157,287],"performance":[158,273],"overhead.":[159],"Second,":[160],"different":[161,213],"from":[162],"existing":[163,235],"intrusion":[164],"detection":[165,237],"recovery":[167],"systems":[168],"detect":[170],"compromised":[171],"OS":[172],"objects":[173,179,186],"one":[174],"by":[175,190,234,319],"one,":[176],"classifies":[178],"clusters":[181],"identifies":[184],"cluster":[189,191],"basis.":[192],"Third,":[193],"reduce":[195],"false":[197,290,307],"positive":[198],"rate":[199],"identifying":[201],"simultaneously":[205],"considers":[206,227],"two":[207],"behaviors":[209],"are":[211],"types":[214],"origin":[217],"processes":[220],"exhibit":[222],"these":[223],"behaviors,":[224],"rather":[225],"than":[226,316],"single":[229],"alone":[231],"as":[232],"done":[233],"methods.":[238],"We":[239],"have":[240],"successfully":[241],"implemented":[242],"Feather-weight":[246],"Virtual":[247],"Machine":[248],"(FVM)":[249],"system,":[250],"Windows-based":[252],"virtualization":[254],"system.":[255],"Experiments":[256],"show":[257],"prototype":[260,284,312],"can":[261,294],"effectively":[262],"while":[267],"with":[271,277],"small":[272],"degradation.":[274],"Moreover,":[275],"compared":[276],"commercial":[279,326],"anti-malware":[280],"tools,":[281],"number":[288,305],"negatives":[291],"thus":[293],"more":[295],"thoroughly":[296],"clean":[297],"up":[298],"side":[300],"effects.":[301],"addition,":[303],"positives":[308],"also":[314],"lower":[315],"achieved":[318],"on-line":[321],"behavior-based":[322],"tools.":[327]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
