Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ramon Caceres is active.

Publication


Featured researches published by Ramon Caceres.


annual computer security applications conference | 2005

Building a MAC-based security architecture for the Xen open-source hypervisor

Reiner Sailer; Trent Jaeger; Enriquillo Valdez; Ramon Caceres; Ronald Perez; Stefan Berger; John Linwood Griffin; L. van Doorn

We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high assurance have been proven useful for high-security environments that prioritize security over performance and code reuse, our approach aims at commercial security where near-zero performance overhead, non-intrusive implementation, and usability are of paramount importance. sHype enforces strong isolation at the granularity of a virtual machine, thus providing a robust foundation on which higher software layers can enact finer-grained controls. We provide the rationale behind the sHype design and describe and evaluate our implementation for the Xen open-source hypervisor


Operating Systems Review | 2008

TVDc: managing security in the trusted virtual datacenter

Stefan Berger; Ramon Caceres; Dimitrios Pendarakis; Reiner Sailer; Enriquillo Valdez; Ronald Perez; Wayne Schildhauer; Deepa Srinivasan

Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and applications, in different virtual machines (VMs) on shared physical hardware platforms. However, when coupled with the ease of VM migration, this trend increases the potential surface for security attacks. Further, the simplified management of VMs, including creation, cloning and migration, makes it imperative to monitor and guarantee the integrity of software components running within VMs.n This paper presents the IBM Trusted Virtual Datacenter (TVDc) technology developed to address the need for strong isolation and integrity guarantees, thus significantly enhancing security and systems management capabilities, in virtualized environments. It signifies the first effort to incorporate trusted computing technologies directly into virtualization and systems management software. We present and discuss various components that constitute TVDc: the Trusted Platform Module (TPM), the virtual TPM, the IBM hypervisor security architecture (sHype) and the associated systems management software.


international conference on mobile systems, applications, and services | 2005

Reincarnating PCs with portable SoulPads

Ramon Caceres; Casey Carter; Chandrasekhar Narayanaswami; Mandayam Thondanur Raghunath

The ability to walk up to any computer, personalize it, and use it as ones own has long been a goal of mobile computing research. We present SoulPad, a new approach based on carrying an auto-configuring operating system along with a suspended virtual machine on a small portable device. With this approach, the computer boots from the device and resumes the virtual machine, thus giving the user access to his personal environment, including previously running computations. SoulPad has minimal infrastructure requirements and is therefore applicable to a wide range of conditions, particularly in developing countries. We report our experience implementing SoulPad and using it on a variety of hardware configurations. We address challenges common to systems similar to SoulPad, and show that the SoulPad model has significant potential as a mobility solution.


annual computer security applications conference | 2006

Shamon: A System for Distributed Mandatory Access Control

Jonathan M. McCune; Trent Jaeger; Stefan Berger; Ramon Caceres; Reiner Sailer

We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies across a distributed set of machines. The Shamon enables local reference monitor guarantees to be attained for a set of reference monitors on these machines. We implement a prototype system on the Xen hypervisor with a trusted MAC virtual machine built on Linux 2.6 whose reference monitor design requires only 13 authorization checks, only 5 of which apply to normal processing (others are for policy setup). We show that, through our architecture, distributed computations can be protected and controlled coherently across all the machines involved in the computation


Operating Systems Review | 2007

A layered approach to simplified access control in virtualized systems

Bryan D. Payne; Reiner Sailer; Ramon Caceres; Ronald Perez; Wenke Lee

In this work, we show how the abstraction layer created by a hypervisor, or virtual machine monitor, can be leveraged to reduce the complexity of mandatory access control policies throughout the system. Policies governing access control decisions in todays systems are complex and monolithic. Achieving strong security guarantees often means restricting usability across the entire system, which is a primary reason why mandatory access controls are rarely deployed. Our architecture uses a hypervisor and multiple virtual machines to decompose policies into multiple layers. This simplifies the policies and their enforcement, while minimizing the overall impact of security on the system. We show that the overhead of decomposing system policies into distinct policies for each layer can be negligible. Our initial implementation confirms that such layering leads to simpler security policies and enforcement mechanisms as well as a more robust layered trusted computing base. We hope that this work serves to start a dialog regarding the use of mandatory access controls within a hypervisor for both increasing security and improving manageability.


international conference on mobile systems, applications, and services | 2006

Pegboard: a framework for developing mobile applications

Danny Soroker; Ramon Caceres; Danny Dig; Andreas Schade; Susan L. Spraragen; Alpana Tiwari

Tool support for mobile application development can significantly improve programmer productivity and software quality. Pegboard is a novel tooling framework that extends the Eclipse integrated development environment to support the development of mobile distributed applications. Its extensible design supports multiple application models and the orchestration of external tooling components throughout the development cycle. In this paper we describe Pegboards architecture and implementation, and show how it improves the development experience through organization, visualization, simplification and guidance. We also discuss insights gained from interviewing software developers, including early users of Pegboard.


Information Systems Management | 2005

Deriving Long-Term Value from Context-Aware Computing

Guruduth Banavar; Jay Black; Ramon Caceres; Maria R. Ebling; Edie Stern; Joseph L. Kannry

Abstract Modern businesses are increasingly dynamic in nature, which creates a need for computer systems that can sense and respond to rapid changes in the environment, or “context,” of the enterprise. This article presents the authors vision of a context “ecosystem” that helps enterprises, applications, and developers respond to these dynamic changes and derive long-term value from context information. the ecosystem includes providers of raw context information, components that derive more abstract context information from lower level sources, middleware that provides systematic context services to applications, development tools, and contextaware applications.


usenix security symposium | 2006

vTPM: virtualizing the trusted platform module

Stefan Berger; Ramon Caceres; Kenneth Alan Goldman; Ronald Perez; Reiner Sailer; Leendert van Doorn


hot topics in system dependability | 2005

Trusted virtual domains: toward secure distributed services

John Linwood Griffin; Trent Jaeger; Ronald Perez; Reiner Sailer; Leendert van Doorn; Ramon Caceres


Archive | 2004

Portable personal computing environment technologies

Mandayam Thondanur Raghunath; Chandrasekhar Narayanaswami; Ramon Caceres; Stefan Berger

Researchain Logo
Decentralizing Knowledge