{"id":"https://openalex.org/W2763931176","doi":"https://doi.org/10.1145/3132747.3132752","title":"WatchIT","display_name":"WatchIT","publication_year":2017,"publication_date":"2017-10-12","ids":{"openalex":"https://openalex.org/W2763931176","doi":"https://doi.org/10.1145/3132747.3132752","mag":"2763931176"},"language":"en","primary_location":{"id":"doi:10.1145/3132747.3132752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132747.3132752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th Symposium on Operating Systems Principles","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078133008","display_name":"Noam Shalev","orcid":null},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Noam Shalev","raw_affiliation_strings":["Technion, Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion, Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059238786","display_name":"Idit Keidar","orcid":"https://orcid.org/0000-0002-6417-1250"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Idit Keidar","raw_affiliation_strings":["Technion, Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion, Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024101794","display_name":"Yaron Weinsberg","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125051","display_name":"Microsoft (Israel)","ror":"https://ror.org/03819cc96","country_code":"IL","type":"company","lineage":["https://openalex.org/I1290206253","https://openalex.org/I4210125051"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yaron Weinsberg","raw_affiliation_strings":["Microsoft, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"Microsoft, Herzliya, Israel","institution_ids":["https://openalex.org/I4210125051"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041553664","display_name":"Yosef Moatti","orcid":null},"institutions":[{"id":"https://openalex.org/I4210167297","display_name":"IBM Research - Haifa","ror":"https://ror.org/05rw9t746","country_code":"IL","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210167297"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yosef Moatti","raw_affiliation_strings":["IBM Research, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"IBM Research, Haifa, Israel","institution_ids":["https://openalex.org/I4210167297"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072439455","display_name":"Elad Ben-Yehuda","orcid":null},"institutions":[{"id":"https://openalex.org/I4210167297","display_name":"IBM Research - Haifa","ror":"https://ror.org/05rw9t746","country_code":"IL","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210167297"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Elad Ben-Yehuda","raw_affiliation_strings":["IBM Research, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"IBM Research, Haifa, Israel","institution_ids":["https://openalex.org/I4210167297"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5078133008"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":0.9327,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7639447,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"515","last_page":"530"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.722335159778595},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6564657688140869},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6283561587333679},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.5459240674972534},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.5347216725349426},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.4579131007194519},{"id":"https://openalex.org/keywords/punching","display_name":"Punching","score":0.41950953006744385},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20770034193992615},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12389487028121948}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.722335159778595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6564657688140869},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6283561587333679},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.5459240674972534},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.5347216725349426},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.4579131007194519},{"id":"https://openalex.org/C2778527123","wikidata":"https://www.wikidata.org/wiki/Q11750728","display_name":"Punching","level":2,"score":0.41950953006744385},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20770034193992615},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12389487028121948},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3132747.3132752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132747.3132752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th Symposium on Operating Systems Principles","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2131370","https://openalex.org/W33933511","https://openalex.org/W114793137","https://openalex.org/W405461467","https://openalex.org/W1513374759","https://openalex.org/W1674877186","https://openalex.org/W1683061488","https://openalex.org/W1880262756","https://openalex.org/W1973738013","https://openalex.org/W1975200978","https://openalex.org/W1982470463","https://openalex.org/W2005221715","https://openalex.org/W2025809307","https://openalex.org/W2051131064","https://openalex.org/W2106353924","https://openalex.org/W2121251946","https://openalex.org/W2122646361","https://openalex.org/W2123479684","https://openalex.org/W2132339478","https://openalex.org/W2140920854","https://openalex.org/W2174706414","https://openalex.org/W2296335794","https://openalex.org/W2536759866","https://openalex.org/W2539325406","https://openalex.org/W4285719527","https://openalex.org/W6637605221"],"related_works":["https://openalex.org/W2314886821","https://openalex.org/W1993998220","https://openalex.org/W2358200898","https://openalex.org/W117490442","https://openalex.org/W4401620919","https://openalex.org/W2325765407","https://openalex.org/W2366765718","https://openalex.org/W2359733578","https://openalex.org/W618293728","https://openalex.org/W2788012436"],"abstract_inverted_index":{"System":[0],"administrators":[1,49],"have":[2],"unlimited":[3],"access":[4,50],"to":[5,18,47,51,90],"system":[6,67,94,119,122],"resources.":[7],"As":[8],"the":[9,35,52,66,77,113,137,147],"Snowden":[10],"case":[11],"highlighted,":[12],"these":[13],"permissions":[14],"can":[15],"be":[16,91,125],"exploited":[17],"steal":[19],"valuable":[20],"personal,":[21],"classified,":[22],"or":[23],"commercial":[24],"data.":[25,54],"This":[26],"problem":[27],"is":[28],"exacerbated":[29],"when":[30],"a":[31,39,58,103,133],"third":[32],"party":[33],"administers":[34],"system.":[36],"For":[37],"example,":[38],"bank":[40],"outsourcing":[41],"its":[42],"IT":[43,62,130],"would":[44],"not":[45],"want":[46],"allow":[48],"actual":[53],"We":[55],"propose":[56],"WatchIT:":[57],"strategy":[59],"that":[60],"constrains":[61],"personnel's":[63],"view":[64],"of":[65,79,115],"and":[68,108,140],"monitors":[69],"their":[70],"actions.":[71],"To":[72],"this":[73],"end,":[74],"we":[75,101],"introduce":[76],"abstraction":[78],"perforated":[80,134],"containers":[81,86],"--":[82],"while":[83],"regular":[84],"Linux":[85],"are":[87],"too":[88],"restrictive":[89],"used":[92],"by":[93,96],"administrators,":[95],"\"punching":[97],"holes\"":[98],"in":[99],"them,":[100],"strike":[102],"balance":[104],"between":[105],"information":[106],"security":[107],"required":[109],"administrative":[110],"needs.":[111],"Following":[112],"principle":[114],"least":[116],"privilege,":[117],"our":[118],"predicts":[120],"which":[121],"resources":[123],"should":[124],"accessible":[126],"for":[127,145],"handling":[128],"each":[129],"issue,":[131],"creates":[132],"container":[135],"with":[136],"corresponding":[138],"isolation,":[139],"deploys":[141],"it":[142],"as":[143],"needed":[144],"fixing":[146],"problem.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2017-10-20T00:00:00"}
