S Jang, S Song, B Tak, S Suneja, MV Le, C Yue… - … on Research in …, 2022 - Springer
Despite their maturity and popularity, security remains a critical concern in container adoption. To address this concern, secure container runtimes have emerged, offering …
Y Xu, M Zhou, Q Gao, S Zhang… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
With the widespread use of container technology, attackers may invade the kernel by maliciously executing certain system calls, causing damage to the host and other containers …
Y Li, H Hu, W Liu, X Yang - Electronics, 2023 - mdpi.com
Due to the complexity of attack scenarios in the container-based cloud environment and the continuous changes in the state of microservices, the effectiveness of active defense …
The increasing level of sophistication of cyber attacks which are employing cross-cutting strategies that leverage multi-domain attack surfaces, including but not limited to, software …
The micro cloud model offers cloud behavior at the edge of the network. It allows dynamic organization of the resources, closer to the users and the data. One of the crucial problems …
W Wang, X Lin, J Wang, W Gao, D Gu, W Lv… - Proceedings of the 2023 …, 2023 - dl.acm.org
Node. js applications are becoming more and more widely adopted on the server side, partly due to the convenience of building these applications on top of the runtime provided by …
B Yee - arXiv preprint arXiv:2206.11974, 2022 - arxiv.org
The adversary's goal in mounting Long Range Attacks (LRAs) is to fool potential victims into using and relying on a side chain, ie, a false, alternate history of transactions, and into …
F Wruck, V Sarafov, F Jakobsmeier… - Proceedings of the 2022 …, 2022 - dl.acm.org
Separation of privilege domains is crucial when building secure system architectures for Cyber-Physical systems. The bar for a successful attack can be raised significantly and the …
Containerization has revolutionized software development and deployment by providing lightweight and portable encapsulations of applications and their dependencies …