{"id":"https://openalex.org/W4404135824","doi":"https://doi.org/10.1145/3686540.3686544","title":"eGBox: A Secure Shell Runtime based on eBPF","display_name":"eGBox: A Secure Shell Runtime based on eBPF","publication_year":2024,"publication_date":"2024-05-29","ids":{"openalex":"https://openalex.org/W4404135824","doi":"https://doi.org/10.1145/3686540.3686544"},"language":"en","primary_location":{"id":"doi:10.1145/3686540.3686544","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3686540.3686544","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3686540.3686544","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100310779","display_name":"Yuan Zhong","orcid":"https://orcid.org/0009-0009-5422-7407"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Zhong","raw_affiliation_strings":["School of Computer Science and Engineering, , Sun Yat-Sen University, China"],"raw_orcid":"https://orcid.org/0009-0009-5422-7407","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, , Sun Yat-Sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335066","display_name":"Pengfei Chen","orcid":"https://orcid.org/0000-0003-4891-4971"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Chen","raw_affiliation_strings":["School of Computer Science and Engineering, , Sun Yat-Sen University, China"],"raw_orcid":"https://orcid.org/0000-0003-4891-4971","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, , Sun Yat-Sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065561980","display_name":"Huxing Zhang","orcid":"https://orcid.org/0009-0007-1761-9044"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huxing Zhang","raw_affiliation_strings":["Alibaba Group, China"],"raw_orcid":"https://orcid.org/0009-0007-1761-9044","affiliations":[{"raw_affiliation_string":"Alibaba Group, China","institution_ids":["https://openalex.org/I45928872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100310779"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21996985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"26","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6737222671508789},{"id":"https://openalex.org/keywords/shell","display_name":"Shell (structure)","score":0.5130492448806763},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3331397771835327},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1298225224018097}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6737222671508789},{"id":"https://openalex.org/C2781052500","wikidata":"https://www.wikidata.org/wiki/Q2230313","display_name":"Shell (structure)","level":2,"score":0.5130492448806763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3331397771835327},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1298225224018097},{"id":"https://openalex.org/C147176958","wikidata":"https://www.wikidata.org/wiki/Q77590","display_name":"Civil engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3686540.3686544","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3686540.3686544","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3686540.3686544","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3686540.3686544","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1751574796","display_name":null,"funder_award_id":"No.62272495","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G3021213543","display_name":null,"funder_award_id":"2019YFB1804002","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G386865829","display_name":null,"funder_award_id":"No.22qntd1004","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G7842232286","display_name":null,"funder_award_id":"No.2023B1515020054","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1516432943","https://openalex.org/W1594706025","https://openalex.org/W1991941172","https://openalex.org/W2023953679","https://openalex.org/W2093804985","https://openalex.org/W2111111494","https://openalex.org/W2115482638","https://openalex.org/W2138381338","https://openalex.org/W2154765153","https://openalex.org/W2817857516","https://openalex.org/W2914982603","https://openalex.org/W2962744771","https://openalex.org/W2991141347","https://openalex.org/W3008629209","https://openalex.org/W3013012709","https://openalex.org/W4214588958","https://openalex.org/W4246253341","https://openalex.org/W4283328089","https://openalex.org/W6630914723","https://openalex.org/W6631402485","https://openalex.org/W6680775976","https://openalex.org/W6681485941","https://openalex.org/W6684248733","https://openalex.org/W6761124157"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Cloud":[0],"systems":[1],"that":[2,118,176],"offer":[3],"remote":[4,165],"data":[5],"and":[6,41,72,96,140,163],"computational":[7],"access":[8,22,186],"through":[9,133],"networks":[10],"face":[11],"significant":[12],"security":[13,32,47,57,215],"challenges.":[14],"Secure":[15],"SHell":[16],"session":[17],"(SSH)":[18],"is":[19,62],"a":[20,30,45,55,115,120,201],"popular":[21],"method,":[23],"but":[24],"its":[25],"login":[26],"information":[27],"leakage":[28],"presents":[29,200],"substantial":[31],"threat,":[33],"allowing":[34],"attackers":[35],"to":[36,66,136,205],"exploit":[37],"identities":[38],"of":[39,69,192,216],"users":[40],"disrupt":[42],"systems.":[43],"As":[44],"result,":[46],"remains":[48],"paramount":[49],"in":[50,59,75,93,184],"cloud-system":[51],"operations.":[52],"Access":[53,78],"control,":[54],"vital":[56],"mechanism":[58],"operating":[60,218],"systems,":[61],"increasingly":[63],"challenging":[64],"due":[65],"the":[67,73,169,193,213,217],"complexity":[68],"control":[70,144,187],"mechanisms":[71],"difficulty":[74],"developing":[76],"precise":[77],"Control":[79],"Lists":[80],"(ACLs).":[81],"Traditional":[82],"ACLs":[83],"require":[84],"extensive":[85],"resources":[86],"for":[87,196],"each":[88],"user":[89,138,166],"or":[90],"role,":[91],"falter":[92],"complex":[94],"scenarios,":[95],"risk":[97],"system":[98,122,125,142,149,170],"vulnerability":[99],"by":[100],"granting":[101],"excessive":[102],"privileges.":[103],"To":[104],"address":[105],"these":[106],"issues,":[107],"this":[108],"paper":[109],"introduces":[110],"eBPF-based":[111],"Guarded":[112],"Box":[113],"(eGBox),":[114],"novel":[116],"solution":[117],"combines":[119],"lightweight":[121],"call":[123,143,171],"restriction":[124],"with":[126],"machine":[127],"learning.":[128],"eGBox":[129,160,199],"utilizes":[130],"rule":[131],"learning":[132],"itemset":[134],"mining":[135],"analyze":[137],"behavior":[139,167],"generate":[141],"lists,":[145],"thereby":[146,211],"significantly":[147],"reducing":[148],"vulnerability.":[150],"By":[151],"employing":[152],"extended":[153],"Berkeley":[154],"Packet":[155],"Filter":[156],"(eBPF)":[157],"program":[158],"hooks,":[159],"effectively":[161],"audits":[162],"restricts":[164],"at":[168],"level.":[172],"The":[173],"results":[174],"demonstrate":[175],"eGBox's":[177],"rule-mining":[178],"algorithm":[179],"achieves":[180],"over":[181],"99%":[182],"accuracy":[183],"generating":[185],"policies,":[188],"using":[189],"only":[190],"40%":[191],"log":[194],"entries":[195],"mining.":[197],"Additionally,":[198],"lower":[202],"overhead":[203],"compared":[204],"established":[206],"tools,":[207],"such":[208],"as":[209],"AppArmor,":[210],"enhancing":[212],"overall":[214],"system.":[219]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
