SoK: A comprehensive analysis and evaluation of docker container attack and defense mechanisms

MS Haq, TD Nguyen, AŞ Tosun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Container-based applications are increasingly favored for their efficiency in software
development, deployment, and operation across various platforms. However, the growing …

Secquant: Quantifying container system call exposure

S Jang, S Song, B Tak, S Suneja, MV Le, C Yue… - … on Research in …, 2022 - Springer
Despite their maturity and popularity, security remains a critical concern in container
adoption. To address this concern, secure container runtimes have emerged, offering …

SWAT4J: Generating System Call Allowlist for Java Container Attack Surface Reduction

Y Xu, M Zhou, Q Gao, S Zhang… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
With the widespread use of container technology, attackers may invade the kernel by
maliciously executing certain system calls, causing damage to the host and other containers …

An optimal active defensive security framework for the container-based cloud with deep reinforcement learning

Y Li, H Hu, W Liu, X Yang - Electronics, 2023 - mdpi.com
Due to the complexity of attack scenarios in the container-based cloud environment and the
continuous changes in the state of microservices, the effectiveness of active defense …

Skynet: a Cyber-Aware Intrusion Tolerant Overseer

T Freitas, J Soares, ME Correia… - 2023 53rd Annual IEEE …, 2023 - ieeexplore.ieee.org
The increasing level of sophistication of cyber attacks which are employing cross-cutting
strategies that leverage multi-domain attack surfaces, including but not limited to, software …

A Hierarchical Namespace Approach for Multi-Tenancy in Distributed Clouds

M Simić, J Dedeić, M Stojkov, I Prokić - IEEE Access, 2024 - ieeexplore.ieee.org
The micro cloud model offers cloud behavior at the edge of the network. It allows dynamic
organization of the resources, closer to the users and the data. One of the crucial problems …

Hodor: Shrinking attack surface on node. js via system call limitation

W Wang, X Lin, J Wang, W Gao, D Gu, W Lv… - Proceedings of the 2023 …, 2023 - dl.acm.org
Node. js applications are becoming more and more widely adopted on the server side, partly
due to the convenience of building these applications on top of the runtime provided by …

Keep Your Transactions On Short Leashes

B Yee - arXiv preprint arXiv:2206.11974, 2022 - arxiv.org
The adversary's goal in mounting Long Range Attacks (LRAs) is to fool potential victims into
using and relying on a side chain, ie, a false, alternate history of transactions, and into …

Gyroidos: Packaging linux with a minimal surface

F Wruck, V Sarafov, F Jakobsmeier… - Proceedings of the 2022 …, 2022 - dl.acm.org
Separation of privilege domains is crucial when building secure system architectures for
Cyber-Physical systems. The bar for a successful attack can be raised significantly and the …

Data-Centric Analysis of Security and Privacy of Containerized Applications

MS Haq - 2024 - search.proquest.com
Containerization has revolutionized software development and deployment by providing
lightweight and portable encapsulations of applications and their dependencies …