Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alexander Yip is active.

Publication


Featured researches published by Alexander Yip.


symposium on operating systems principles | 2007

Information flow control for standard OS abstractions

Maxwell N. Krohn; Alexander Yip; Micah Z. Brodsky; Natan Cliffer; M. Frans Kaashoek; Eddie Kohler; Robert Tappan Morris

Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity, DIFC allows trusted code to protect untrusted software from unexpected malicious inputs. In either case, only bugs in the trusted code, which tends to be small and isolated, can lead to security violations. We present Flume, a new DIFC model that applies at the granularity of operating system processes and standard OS abstractions (e.g., pipes and file descriptors). Flume was designed for simplicity of mechanism, to ease DIFCs use in existing applications, and to allow safe interaction between conventional and DIFC-aware processes. Flume runs as a user-level reference monitor onLinux. A process confined by Flume cannot perform most system calls directly; instead, an interposition layer replaces system calls with IPCto the reference monitor, which enforces data flowpolicies and performs safe operations on the processs behalf. We ported a complex web application (MoinMoin Wiki) to Flume, changingonly 2% of the original code. Performance measurements show a 43% slowdown on read workloadsand a 34% slowdown on write workloads, which aremostly due to Flumes user-level implementation.


symposium on operating systems principles | 2009

Improving application security with data flow assertions

Alexander Yip; Xi Wang; Nickolai Zeldovich; M. Frans Kaashoek

Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. Resin provides policy objects, which programmers use to specify assertion code and metadata; data tracking, which allows programmers to associate assertions with application data, and to keep track of assertions as the data flow through the application; and filter objects, which programmers use to define data flow boundaries at which assertions are checked. Resins runtime checks data flow assertions by propagating policy objects along with data, as that data moves through the application, and then invoking filter objects when data crosses a data flow boundary, such as when writing data to the network or a file. Using Resin, Web application programmers can prevent a range of problems, from SQL injection and cross-site scripting, to inadvertent password disclosure and missing access control checks. Adding a Resin assertion to an application requires few changes to the existing application code, and an assertion can reuse existing code and data structures. For instance, 23 lines of code detect and prevent three previously-unknown missing access control vulnerabilities in phpBB, a popular Web forum application. Other assertions comprising tens of lines of code prevent a range of vulnerabilities in Python and PHP applications. A prototype of Resin incurs a 33% CPU overhead running the HotCRP conference management application.


networked systems design and implementation | 2014

Network virtualization in multi-tenant datacenters

Teemu Koponen; Keith E. Amidon; Peter J. Balland; Martin Casado; Anupam Chanda; Bryan J. Fulton; Igor Ganichev; Jesse E. Gross; Natasha Gude; Paul S. Ingram; Ethan J. Jackson; Andrew Lambeth; Romain F. Lenglet; Shih-Hao Li; Amar Padmanabhan; Justin Pettit; Ben Pfaff; Rajiv Ramanathan; Scott Shenker; Alan Shieh; Jeremy Stribling; Pankaj Thakkar; Dan Wendlandt; Alexander Yip; Ronghua Zhang


Archive | 2011

Network virtualization apparatus and method with a table mapping engine

Teemu Koponen; Pankaj Thakkar; Martin Casado; W. Andrew Lambeth; Alexander Yip; Jeremy Stribling


Archive | 2011

Hierarchical managed switch architecture

Martin Casado; Teemu Koponen; Pankaj Thakkar; W. Andrew Lambeth; Alexander Yip; Keith E. Amidon; Paul S. Ingram


Archive | 2011

Method and apparatus for robust packet distribution among hierarchical managed switching elements

Martin Casado; Teemu Koponen; Pankaj Thakkar; W. Andrew Lambeth; Alexander Yip; Keith E. Amidon; Paul S. Ingram


usenix annual technical conference | 2003

Multiprocessor Support for Event-Driven Programs.

Nickolai Zeldovich; Alexander Yip; Frank Dabek; Robert Tappan Morris; David Mazières; M. Frans Kaashoek


european conference on computer systems | 2009

Privacy-preserving browser-side scripting with BFlow

Alexander Yip; Neha Narula; Maxwell N. Krohn; Robert Tappan Morris


HotNets | 2007

World Wide Web Without Walls

Micah Z. Brodsky; Maxwell N. Krohn; Robert Tappan Morris; Michael Walfish; Alexander Yip


Archive | 2012

Chassis controllers for converting universal flows

Teemu Koponen; Pankaj Thakkar; Natasha Gude; W. Andrew Lambeth; Amar Padmanabhan; Alan Shieh; Jeremy Stribling; Alexander Yip; Ronghua Zhang; Martin Casado

Collaboration


Dive into the Alexander Yip's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Robert Tappan Morris

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Maxwell N. Krohn

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge