Modeling and Virtualization for Secure Computing Environments

  • Kazuhiko Kato
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4846)


Modeling and virtualization are typical methodologies used to develop efficient security enhancement techniques. Modeling approximates complex human or software behaviors with limited resources and enables effective analysis of usage patterns. Virtualization allows simulating existing computing resources, adding some capabilities such as access control and/or modifying semantics. Thus entities accessing computer resources are handled by modeling, whereas the resources themselves can be managed through virtualization. This invited talk describes our approaches and experiences that takes advantage of both methodologies.


Intrusion Detection Intrusion Detection System Software Circulation Secure Software Software Behavior 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Abe, H., Oyama, Y., Oka, M., Kato, K.: Optimization of intrusion detection system based on static analyses. IPSJ Transactions on Advanced Computing Systems(In Japanese) 45(SIG 3(ACS 5)), 11–20 (March 2004)Google Scholar
  2. 2.
    Kato, K., Oyama, Y.: Softwarepot: An encapsulated transferable file system for secure software circulation. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 112–132. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Oka, M., Oyama, Y., Abe, H., Kato, K.: Anomaly detection using layered networks based on eigen co-occurrence matrix. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 223–237. Springer, Heidelberg (2004)Google Scholar
  4. 4.
    Oyama, Y., Kanda, K., Kato, K.: Design and implementation of secure software execution system softwarepot. Computer Software(In Japanese) 19(6), 2–12 (2002)Google Scholar
  5. 5.
    Wagner, D., Dean, D.: Intrusion detection via static analysis. In: Proc. IEEE Symposium on Security and Privacy, pp. 156–168 (May 2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Kazuhiko Kato
    • 1
  1. 1.Department of Computer Science, University of Tsukuba, Tennodai 1-1-1, Tsukuba, Ibaraki 305-8573Japan

Personalised recommendations