{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:56Z","timestamp":1750307336031,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T00:00:00Z","timestamp":1308009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,14]]},"DOI":"10.1145\/1998582.1998601","type":"proceedings-article","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T13:47:14Z","timestamp":1308664034000},"page":"111-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Safe side effects commitment for OS-level virtualization"],"prefix":"10.1145","author":[{"given":"Zhiyong","family":"Shan","sequence":"first","affiliation":[{"name":"Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Stony Brook University, Beijing, China"}]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Tzi-cker","family":"Chiueh","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Xiaofeng","family":"Meng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Data Engineering and Knowledge Engineering (Renmin University of China), MOE, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2011,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134766"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 2nd International SANE Conference","author":"Kamp Poul-Henning","year":"2000","unstructured":"Poul-Henning Kamp and Robert N. M. Watson . Jails: Confining the omnipotent root . In Proceedings of the 2nd International SANE Conference , 2000 . Poul-Henning Kamp and Robert N. M. Watson. Jails: Confining the omnipotent root. In Proceedings of the 2nd International SANE Conference, 2000."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273025"},{"key":"e_1_3_2_1_4_1","first-page":"241","volume-title":"Proceedings of the 18th Large Installation System Administration Conference (LISA","author":"Price Daniel","year":"2004","unstructured":"Daniel Price , Andrew Tucker . Solaris Zones : Operating system support for consolidating commercial workloads . In Proceedings of the 18th Large Installation System Administration Conference (LISA 2004 ), pages 241 -- 254 . Daniel Price, Andrew Tucker. Solaris Zones: Operating system support for consolidating commercial workloads. In Proceedings of the 18th Large Installation System Administration Conference (LISA 2004), pages 241--254."},{"key":"e_1_3_2_1_5_1","unstructured":"OpenVZ. Unique features of OpenVZ. http:\/\/openvz.org\/documentation\/tech\/features.  OpenVZ. Unique features of OpenVZ. http:\/\/openvz.org\/documentation\/tech\/features."},{"key":"e_1_3_2_1_6_1","unstructured":"SWsoft. Virtuozzo server virtualization. http:\/\/www.swsoft.com\/en\/products\/virtuozzo.  SWsoft. Virtuozzo server virtualization. http:\/\/www.swsoft.com\/en\/products\/virtuozzo."},{"key":"e_1_3_2_1_7_1","first-page":"265","volume-title":"Proceedings of 12th Annual Network and Distributed System Security Symposium","author":"Sun Weiqing","year":"2005","unstructured":"Weiqing Sun , Zhenkai Liang , R. Sekar , and V.N. Venkatakrishnan . One-way isolation: An effective approach for realizing safe execution environments . In Proceedings of 12th Annual Network and Distributed System Security Symposium , 2005 , pages 265 -- 278 . Weiqing Sun, Zhenkai Liang, R. Sekar, and V.N. Venkatakrishnan. One-way isolation: An effective approach for realizing safe execution environments. In Proceedings of 12th Annual Network and Distributed System Security Symposium, 2005, pages 265--278."},{"key":"e_1_3_2_1_9_1","unstructured":"Symantec Inc http:\/\/www.symantec.com\/business\/security_response\/threatexplorer\/threats.jsp.  Symantec Inc http:\/\/www.symantec.com\/business\/security_response\/threatexplorer\/threats.jsp."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945467"},{"key":"e_1_3_2_1_11_1","unstructured":"Microsoft Security Bulletins http:\/\/www.microsoft.com\/technet\/security\/current.aspx.  Microsoft Security Bulletins http:\/\/www.microsoft.com\/technet\/security\/current.aspx."},{"key":"e_1_3_2_1_12_1","unstructured":"Michael Howard. Fending Off Future Attacks by Reducing Attack Surface. http:\/\/msdn.microsoft.com\/en-us\/library\/ms972812.aspx 2003.  Michael Howard. Fending Off Future Attacks by Reducing Attack Surface. http:\/\/msdn.microsoft.com\/en-us\/library\/ms972812.aspx 2003."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346280"},{"key":"e_1_3_2_1_14_1","unstructured":"Offensive Computing http:\/\/www.offensivecomputing.net\/.  Offensive Computing http:\/\/www.offensivecomputing.net\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.16"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation","author":"Cully Brendan","year":"2008","unstructured":"Brendan Cully , Geoffrey Lefebvre , Dutch Meyer , Mike Feeley , Norm Hutchinson , Andrew Warfield , \"Remus : High Availability via Asynchronous Virtual Machine Replication \". In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation , 2008 . Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, Andrew Warfield, \"Remus: High Availability via Asynchronous Virtual Machine Replication\". In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/DSN.2003.1209932","volume-title":"Proceedings of the 2003 International Conference on Dependable Systems and Networks","author":"Zhu Ninging","year":"2003","unstructured":"Ninging Zhu and Tzi-cker Chiueh. Design, implementation , and evaluation of repairable file service . In Proceedings of the 2003 International Conference on Dependable Systems and Networks , pages 217 -- 226 , June 2003 . Ninging Zhu and Tzi-cker Chiueh. Design, implementation, and evaluation of repairable file service. In Proceedings of the 2003 International Conference on Dependable Systems and Networks, pages 217--226, June 2003."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of USENIX Security Symposium, Washington DC","author":"Paleari Roberto","year":"2010","unstructured":"Roberto Paleari , Lorenzo Martignoni , Emanuele Passerini , Drew Davidson , Matt Fredrikson , Jon Giffin , Somesh Jha , \"Automatic generation of remediation procedures for malware \", In Proceedings of USENIX Security Symposium, Washington DC , August 2010 . Roberto Paleari, Lorenzo Martignoni, Emanuele Passerini, Drew Davidson, Matt Fredrikson, Jon Giffin, Somesh Jha, \"Automatic generation of remediation procedures for malware\", In Proceedings of USENIX Security Symposium, Washington DC, August 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.37"},{"key":"e_1_3_2_1_21_1","first-page":"19","volume-title":"Proceedings of the 15th conference on USENIX Security Symposium","author":"Kirda Engin","year":"2006","unstructured":"Engin Kirda , Christopher Kruegel , Greg Banks , Giovanni Vigna , Richard A. Kemmerer , Behavior-based spyware detection , In Proceedings of the 15th conference on USENIX Security Symposium , p. 19 -- 19 , July 31 - August 04, 2006 , Vancouver, B.C., Canada. Engin Kirda, Christopher Kruegel, Greg Banks, Giovanni Vigna, Richard A. Kemmerer, Behavior-based spyware detection, In Proceedings of the 15th conference on USENIX Security Symposium, p.19--19, July 31-August 04, 2006, Vancouver, B.C., Canada."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.187"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1052676.1052680"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855768.1855790"},{"key":"e_1_3_2_1_26_1","first-page":"117","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation","author":"Verbowski Chad","year":"2006","unstructured":"Chad Verbowski , Emre Kiciman , Arunvijay Kumar , Brad Daniels , Shan Lu , Juhan Lee , Yi-Min Wang , Roussi Roussev , Flight data recorder: monitoring persistent-state interactions to improve systems management , In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation , p. 117 -- 130 , November 06-08, 2006 , Seattle, WA. Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, Roussi Roussev, Flight data recorder: monitoring persistent-state interactions to improve systems management, In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, p.117--130, November 06-08, 2006, Seattle, WA."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_26"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_3"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966932"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.224"}],"event":{"name":"ICAC '11: 8th International Conference on Autonomic Computing","sponsor":["IEEE","University of Arizona University of Arizona","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Karlsruhe Germany","acronym":"ICAC '11"},"container-title":["Proceedings of the 8th ACM international conference on Autonomic computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998582.1998601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1998582.1998601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:14Z","timestamp":1750244774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998582.1998601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,14]]},"references-count":30,"alternative-id":["10.1145\/1998582.1998601","10.1145\/1998582"],"URL":"https:\/\/doi.org\/10.1145\/1998582.1998601","relation":{},"subject":[],"published":{"date-parts":[[2011,6,14]]},"assertion":[{"value":"2011-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}