{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:05Z","timestamp":1755974405595,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T00:00:00Z","timestamp":1716940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["No.22qntd1004"],"award-info":[{"award-number":["No.22qntd1004"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.62272495"],"award-info":[{"award-number":["No.62272495"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alibaba project","award":["No.20925056"],"award-info":[{"award-number":["No.20925056"]}]},{"DOI":"10.13039\/501100006374","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["No.2023B1515020054"],"award-info":[{"award-number":["No.2023B1515020054"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1804002"],"award-info":[{"award-number":["2019YFB1804002"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,29]]},"DOI":"10.1145\/3686540.3686544","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T12:23:04Z","timestamp":1730982184000},"page":"26-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["eGBox: A Secure Shell Runtime based on eBPF"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5422-7407","authenticated-orcid":false,"given":"Yuan","family":"Zhong","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, , Sun Yat-Sen University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4891-4971","authenticated-orcid":false,"given":"Pengfei","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, , Sun Yat-Sen University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1761-9044","authenticated-orcid":false,"given":"Huxing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the Workshop on Hot Topics in Operating Systems, HotOS 2019","author":"Baumann A.","year":"2019","unstructured":"Baumann, A., Appavoo, J., Krieger, O. and Roscoe, T. 2019. A fork() in the road. Proceedings of the Workshop on Hot Topics in Operating Systems, HotOS 2019, Bertinoro, Italy, May 13-15, 2019 (2019), 14\u201322."},{"key":"e_1_3_2_1_2_1","volume-title":"Symposium On Usable Privacy and Security, SOUPS \u201913","author":"Beckerle M.","year":"2013","unstructured":"Beckerle, M. and Martucci, L.A. 2013. Formal definitions for usable access control rule sets from goals to metrics. Symposium On Usable Privacy and Security, SOUPS \u201913, Newcastle, United Kingdom, July 24-26, 2013 (2013), 2:1-2:11."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT53264.2022.9716317"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.51"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00011"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 14th Conference on Systems Administration (LISA 2000","author":"Cowan C.","year":"2000","unstructured":"Cowan, C., Beattie, S., Kroah-Hartman, G., Pu, C., Wagle, P. and Gligor, V.D. 2000. SubDomain: Parsimonious Server Security. Proceedings of the 14th Conference on Systems Administration (LISA 2000), New Orleans, Louisiana, USA, December 3-8, 2000 (2000), 355\u2013368."},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Drewry W.","year":"2012","unstructured":"Drewry, W. 2012. Dynamic seccomp policies (using BPF filters). Retrieved December. 18, (2012), 2019."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_9_1","unstructured":"Findlay W. Barrera D. and Somayaji A. 2021. BPFContain: Fixing the Soft Underbelly of Container Security. arXiv:2102.06972 [cs]. (Feb. 2021)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009","author":"Frank M.","year":"2009","unstructured":"Frank, M., Streich, A.P., Basin, D.A. and Buhmann, J.M. 2009. A probabilistic approach to hybrid role mining. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 (2009), 101\u2013111."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4018\/jsse.2012100103"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"e_1_3_2_1_13_1","volume-title":"Guide to attribute based access control (abac) definition and considerations (draft). NIST special publication. 800, 162","author":"Hu V.C.","year":"2013","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Friedman, A.R., Lang, A.J., Cogdell, M.M., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K., and others 2013. Guide to attribute based access control (abac) definition and considerations (draft). NIST special publication. 800, 162 (2013), 1\u201354."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2007 Linux symposium","author":"Keniston J.","year":"2007","unstructured":"Keniston, J., Mavinakayanahalli, A., Panchamukhi, P. and Prasad, V. 2007. Ptrace, utrace, uprobes: Lightweight, dynamic tracing of user apps. Proceedings of the 2007 Linux symposium (2007), 215\u2013224."},{"key":"e_1_3_2_1_15_1","unstructured":"Larabel M. and Tippett M. 2011. Phoronix test suite. Phoronix Media [Online]. Available: http:\/\/www. phoronix-test-suite. com\/.[Accessed June 2016]. (2011)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Usenix","author":"McCanne S.","year":"1993","unstructured":"McCanne, S. and Jacobson, V. 1993. The BSD Packet Filter: A New Architecture for User-level Packet Capture. Proceedings of the Usenix Winter 1993 Technical Conference, San Diego, California, USA, January 1993 (1993), 259\u2013270."},{"key":"e_1_3_2_1_17_1","volume-title":"13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008","author":"Molloy I.M.","year":"2008","unstructured":"Molloy, I.M., Chen, H., Li, T., Wang, Q., Li, N., Bertino, E., Calo, S.B. and Lobo, J. 2008. Mining roles with semantic meanings. 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings (2008), 21\u201330."},{"key":"e_1_3_2_1_18_1","volume-title":"17th ACM Symposium on Access Control Models and Technologies, SACMAT \u201912","author":"Molloy I.M.","year":"2012","unstructured":"Molloy, I.M., Park, Y. and Chari, S. 2012. Generative models for access control policies: applications to role mining over logs with attribution. 17th ACM Symposium on Access Control Models and Technologies, SACMAT \u201912, Newark, NJ, USA - June 20 - 22, 2012 (2012), 45\u201356."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Patil A. and Patil D. 2019. An Analysis Report on Green Cloud Computing Current Trends and Future Research Challenges. SSRN Electronic Journal. (Jan. 2019) 813\u2013820. DOI:https:\/\/doi.org\/10.2139\/ssrn.3355151.","DOI":"10.2139\/ssrn.3355151"},{"key":"e_1_3_2_1_20_1","volume-title":"ACM Symposium on Cloud Computing","author":"Romero F.","year":"2021","unstructured":"Romero, F., Chaudhry, G.I., Goiri, I., Gopa, P., Batum, P., Yadwadkar, N.J., Fonseca, R., Kozyrakis, C. and Bianchini, R. 2021. Faa \\ textdollarT: A Transparent Auto-Scaling Cache for Serverless Applications. SoCC \u201921: ACM Symposium on Cloud Computing, Seattle, WA, USA, November 1 - 4, 2021 (2021), 122\u2013137."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3113\/JSOA.2018.0299"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359805"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60206-5"},{"key":"e_1_3_2_1_24_1","first-page":"139","article-title":"Implementing SELinux as a Linux security module","volume":"1","author":"Smalley S.","year":"2001","unstructured":"Smalley, S., Vance, C. and Salamon, W. 2001. Implementing SELinux as a Linux security module. NAI Labs Report. 1, 43 (2001), 139.","journal-title":"NAI Labs Report."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03213-1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369048"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Xu Z. and Stoller S.D. 2014. Mining Attribute-Based Access Control Policies from Logs. Data and Applications Security and Privacy XXVIII. V. Atluri and G. Pernul eds. Springer Berlin Heidelberg. 276\u2013291.","DOI":"10.1007\/978-3-662-43936-4_18"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 6th USENIX Security Symposium","author":"Ylonen T.","year":"1996","unstructured":"Ylonen, T. 1996. SSH\u2013secure login connections over the Internet. Proceedings of the 6th USENIX Security Symposium (1996), 40\u201352."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-022-01076-5"}],"event":{"name":"BDSIC 2024: 2024 6th International Conference on Big-data Service and Intelligent Computation","acronym":"BDSIC 2024","location":"Hong Kong Hong Kong"},"container-title":["Proceedings of the 2024 6th International Conference on Big-data Service and Intelligent Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686540.3686544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686540.3686544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:21:51Z","timestamp":1755973311000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686540.3686544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,29]]},"references-count":29,"alternative-id":["10.1145\/3686540.3686544","10.1145\/3686540"],"URL":"https:\/\/doi.org\/10.1145\/3686540.3686544","relation":{},"subject":[],"published":{"date-parts":[[2024,5,29]]},"assertion":[{"value":"2024-09-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}