{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:02:12Z","timestamp":1761919332792,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,24]],"date-time":"2010-05-24T00:00:00Z","timestamp":1274659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0717544CNS-0914845CNS-0905246"],"award-info":[{"award-number":["CNS-0717544CNS-0914845CNS-0905246"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-07-1-0527"],"award-info":[{"award-number":["FA9550-07-1-0527"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,24]]},"DOI":"10.1145\/1815695.1815717","type":"proceedings-article","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T12:21:27Z","timestamp":1277209287000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Operating system virtualization"],"prefix":"10.1145","author":[{"given":"Oren","family":"Laadan","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY"}]},{"given":"Jason","family":"Nieh","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY"}]}],"member":"320","published-online":{"date-parts":[[2010,5,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 2000 USENIX Security Symposium","author":"Acharya A.","year":"2000","unstructured":"A. Acharya and M. Raje . MAPbox: Using Parameterized Behavior Classes to Confine Applications . In Proceedings of the 2000 USENIX Security Symposium , Denver, CO , Aug. 2000 . A. Acharya and M. Raje. MAPbox: Using Parameterized Behavior Classes to Confine Applications. In Proceedings of the 2000 USENIX Security Symposium, Denver, CO, Aug. 2000."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821533"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 1995 USENIX Winter Conference","author":"Berman A.","year":"1995","unstructured":"A. Berman , V. Bourassa , and E. Selberg . TRON: Process-Specific File Protection for the UNIX Operating System . In Proceedings of 1995 USENIX Winter Conference , New Orleans, LA , Jan. 1995 . A. Berman, V. Bourassa, and E. Selberg. TRON: Process-Specific File Protection for the UNIX Operating System. In Proceedings of 1995 USENIX Winter Conference, New Orleans, LA, Jan. 1995."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400109"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851861"},{"key":"e_1_3_2_1_7_1","unstructured":"How to Break Out of a Chroot Jail. http:\/\/www.bpfh.net\/simes\/computing\/chroot-break.html.  How to Break Out of a Chroot Jail. http:\/\/www.bpfh.net\/simes\/computing\/chroot-break.html."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1045502.1045548"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS)","author":"Dasgupta P.","year":"2000","unstructured":"P. Dasgupta and T. Boyd . Virtualizing Operating System for Seamless Disributed Environments . In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS) , Nov. 2000 . P. Dasgupta and T. Boyd. Virtualizing Operating System for Seamless Disributed Environments. In Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS), Nov. 2000."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Fraser T.","year":"1999","unstructured":"T. Fraser , L. Badger , and M. Feldman . Hardening COTS Software with Generic Software Wrappers . In Proceedings of the IEEE Symposium on Security and Privacy , Oakland, CA , May 1999 . T. Fraser, L. Badger, and M. Feldman. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel . Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools . In Proceedings of the Network and Distributed Systems Security Symposium , San Diego, CA , Feb. 2003 . T. Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. In Proceedings of the Network and Distributed Systems Security Symposium, San Diego, CA, Feb. 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"Garfinkel T.","year":"2004","unstructured":"T. Garfinkel , B. Pfaff , and M. Rosenblum . Ostia: A Delegating Architecture for Secure System Call Interposition . In Proceedings of the Network and Distributed Systems Security Symposium , San Diego, CA , Feb. 2004 . T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In Proceedings of the Network and Distributed Systems Security Symposium, San Diego, CA, Feb. 2004."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 1998 USENIX Annual Technical Conference","author":"Ghormley D. P.","year":"1998","unstructured":"D. P. Ghormley , D. Petrou , S. H. Rodriguez , and T. E. Anderson . SLIC: An Extensibility System for Commodity Operating Systems . In Proceedings of the 1998 USENIX Annual Technical Conference , Berkeley, CA , June 1998 . D. P. Ghormley, D. Petrou, S. H. Rodriguez, and T. E. Anderson. SLIC: An Extensibility System for Commodity Operating Systems. In Proceedings of the 1998 USENIX Annual Technical Conference, Berkeley, CA, June 1998."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 1996 USENIX Annual Technical Conferemce","author":"Goldberg I.","year":"1996","unstructured":"I. Goldberg , D. Wagner , R. Thomas , and E. A. Brewer . A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker . In Proceedings of the 1996 USENIX Annual Technical Conferemce , San Jose, CA , July 1996 . I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker. In Proceedings of the 1996 USENIX Annual Technical Conferemce, San Jose, CA, July 1996."},{"key":"e_1_3_2_1_15_1","unstructured":"Hackbench. http:\/\/developer.osdl.org\/craiger\/hackbench.  Hackbench. http:\/\/developer.osdl.org\/craiger\/hackbench."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Jain K.","year":"2000","unstructured":"K. Jain and R. Sekar . User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement . In Proceedings of the Network and Distributed System Security Symposium , San Diego, California , Feb. 2000 . K. Jain and R. Sekar. User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement. In Proceedings of the Network and Distributed System Security Symposium, San Diego, California, Feb. 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168626"},{"key":"e_1_3_2_1_19_1","volume-title":"Watson. Jails: Confining the Omnipotent Root. In Proceedings of the 2nd International SANE Conference","author":"Kamp P.-H.","year":"2000","unstructured":"P.-H. Kamp and R. N. M. Watson. Jails: Confining the Omnipotent Root. In Proceedings of the 2nd International SANE Conference , Maastricht, The Netherlands , May 2000 . P.-H. Kamp and R. N. M. Watson. Jails: Confining the Omnipotent Root. In Proceedings of the 2nd International SANE Conference, Maastricht, The Netherlands, May 2000."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of 1992 USENIX Winter Conference","author":"Krell E.","year":"1992","unstructured":"E. Krell and B. Krishnamurthy . COLA: Customized Overlaying . In Proceedings of 1992 USENIX Winter Conference , San Francisco, CA , Jan. 1992 . E. Krell and B. Krishnamurthy. COLA: Customized Overlaying. In Proceedings of 1992 USENIX Winter Conference, San Francisco, CA, Jan. 1992."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1364385.1364410"},{"key":"e_1_3_2_1_22_1","unstructured":"PID Namespaces in the 2.6.24 Kernel. http:\/\/lwn.net\/Articles\/259217\/.  PID Namespaces in the 2.6.24 Kernel. http:\/\/lwn.net\/Articles\/259217\/."},{"key":"e_1_3_2_1_23_1","volume-title":"The Design and Implementation of the 4.4BSD Operating System","author":"McKusick M.","year":"1996","unstructured":"M. McKusick , K. Bostic , M. J. Karels , and J. S. Quarterman . The Design and Implementation of the 4.4BSD Operating System . Addison-Wesley , 1996 . M. McKusick, K. Bostic, M. J. Karels, and J. S. Quarterman. The Design and Implementation of the 4.4BSD Operating System. Addison-Wesley, 1996."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060323"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361073"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 19th Large Installation System Administration Conference (LISA)","author":"Potter S.","year":"2005","unstructured":"S. Potter and J. Nieh . Reducing Downtime Due to System Maintenance and Upgrades . In Proceedings of the 19th Large Installation System Administration Conference (LISA) , San Diego, CA , Dec. 2005 . S. Potter and J. Nieh. Reducing Downtime Due to System Maintenance and Upgrades. In Proceedings of the 19th Large Installation System Administration Conference (LISA), San Diego, CA, Dec. 2005."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 18th Large Installation System Administration Conference (LISA)","author":"Price D.","year":"2004","unstructured":"D. Price and A. Tucker . Solaris Zones: Operating Systems Support for Consolidating Commercial Workloads . In Proceedings of the 18th Large Installation System Administration Conference (LISA) , Atlanta, GA , Nov. 2004 . D. Price and A. Tucker. Solaris Zones: Operating Systems Support for Consolidating Commercial Workloads. In Proceedings of the 18th Large Installation System Administration Conference (LISA), Atlanta, GA, Nov. 2004."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 12th USENIX Security Symposium","author":"Provos N.","year":"2003","unstructured":"N. Provos . Improving Host Security with System Call Policies . In Proceedings of the 12th USENIX Security Symposium , Washington, DC , Aug. 2003 . N. Provos. Improving Host Security with System Call Policies. In Proceedings of the 12th USENIX Security Symposium, Washington, DC, Aug. 2003."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060324"},{"key":"e_1_3_2_1_30_1","unstructured":"B. K. Schmidt. Supporting Ubiquitous Computing with Stateless Consoles and Computation Caches. PhD thesis CS Department Stanford University 2000.   B. K. Schmidt. Supporting Ubiquitous Computing with Stateless Consoles and Computation Caches . PhD thesis CS Department Stanford University 2000."},{"key":"e_1_3_2_1_31_1","series-title":"Professional Computing Series","volume-title":"Advanced Programming in the UNIX Environment","author":"Stevens W. R.","year":"1993","unstructured":"W. R. Stevens . Advanced Programming in the UNIX Environment . Professional Computing Series . Addison-Wesley , 1993 . W. R. Stevens. Advanced Programming in the UNIX Environment. Professional Computing Series. Addison-Wesley, 1993."},{"key":"e_1_3_2_1_32_1","unstructured":"Parallels Virtuozzo Containers. http:\/\/www.parallels.com\/products\/virtuozzo.  Parallels Virtuozzo Containers. http:\/\/www.parallels.com\/products\/virtuozzo."},{"key":"e_1_3_2_1_33_1","unstructured":"VMware Inc. http:\/\/www.vmware.com.  VMware Inc. http:\/\/www.vmware.com."},{"key":"e_1_3_2_1_34_1","unstructured":"Linux VServer Project. http:\/\/www.linux-vserver.org.  Linux VServer Project. http:\/\/www.linux-vserver.org."},{"key":"e_1_3_2_1_35_1","volume-title":"An Approach for Confinement of Untrusted Applications. Master's thesis","author":"Wagner D.","year":"1999","unstructured":"D. Wagner . Janus : An Approach for Confinement of Untrusted Applications. Master's thesis , University of California , Berkeley, Aug . 1999 . D. Wagner. Janus: An Approach for Confinement of Untrusted Applications. Master's thesis, University of California, Berkeley, Aug. 1999."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060308"},{"key":"e_1_3_2_1_37_1","unstructured":"Microsoft Application Virtualization. http:\/\/www.microsoft.com\/systemcenter\/appv\/default.mspx.  Microsoft Application Virtualization. http:\/\/www.microsoft.com\/systemcenter\/appv\/default.mspx."}],"event":{"name":"SYSTOR '10: The 3rd Annual Haifa Experimental Systems Conference","acronym":"SYSTOR '10","location":"Haifa Israel"},"container-title":["Proceedings of the 3rd Annual Haifa Experimental Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815695.1815717","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1815695.1815717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:43Z","timestamp":1750246783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815695.1815717"}},"subtitle":["practice and experience"],"short-title":[],"issued":{"date-parts":[[2010,5,24]]},"references-count":36,"alternative-id":["10.1145\/1815695.1815717","10.1145\/1815695"],"URL":"https:\/\/doi.org\/10.1145\/1815695.1815717","relation":{},"subject":[],"published":{"date-parts":[[2010,5,24]]},"assertion":[{"value":"2010-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}