Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

Internet of intelligence: A survey on the enabling technologies, applications, and challenges

Q Tang, FR Yu, R Xie, A Boukerche… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The Internet of Intelligence is conceived as an emerging networking paradigm, which will
make intelligence as easy to obtain as information. This paper provides an overview of the …

Container security: Issues, challenges, and the road ahead

S Sultan, I Ahmad, T Dimitriou - IEEE access, 2019 - ieeexplore.ieee.org
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …

Edge computing perspectives: Architectures, technologies, and open security issues

M Caprolu, R Di Pietro, F Lombardi… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Edge and Fog Computing will be increasingly pervasive in the years to come due to the
benefits they bring in many specific use-case scenarios over traditional Cloud Computing …

Docker ecosystem–vulnerability analysis

A Martin, S Raponi, T Combe, R Di Pietro - Computer Communications, 2018 - Elsevier
Cloud based infrastructures have typically leveraged virtualization. However, the need for
always shorter development cycles, continuous delivery and cost savings in infrastructures …

A measurement study on linux container security: Attacks and countermeasures

X Lin, L Lei, Y Wang, J Jing, K Sun… - Proceedings of the 34th …, 2018 - dl.acm.org
Linux container mechanism has attracted a lot of attention and is increasingly utilized to
deploy industry applications. Though it is a consensus that the container mechanism is not …

Overcoming security challenges in microservice architectures

T Yarygina, AH Bagge - 2018 IEEE Symposium on Service …, 2018 - ieeexplore.ieee.org
The microservice architectural style is an emerging trend in software engineering that allows
building highly scalable and flexible systems. However, current state of the art provides only …

The state‐of‐the‐art in container technologies: Application, orchestration and security

E Casalicchio, S Iannucci - Concurrency and Computation …, 2020 - Wiley Online Library
Containerization is a lightweight virtualization technology enabling the deployment and
execution of distributed applications on cloud, edge/fog, and Internet‐of‐Things platforms …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

Confine: Automated system call policy generation for container attack surface reduction

S Ghavamnia, T Palit, A Benameur… - … on Research in Attacks …, 2020 - usenix.org
Reducing the attack surface of the OS kernel is a promising defense-in-depth approach for
mitigating the fragile isolation guarantees of container environments. In contrast to …