Lic-Sec: An enhanced AppArmor Docker security profile generator

Journal of Information Security and Applications - Tập 61 - Trang 102924 - 2021
Hui Zhu1, Christian Gehrmann1
1Lunds Universitet, Sweden

Tài liệu tham khảo

Bernstein, 2014, Containers and cloud: From LXC to docker to kubernetes, IEEE Cloud Comput, 1, 81, 10.1109/MCC.2014.51 Martin, 2018, Docker ecosystem–vulnerability analysis, Comput Commun, 122, 30, 10.1016/j.comcom.2018.03.011 Guru, 2019, Survey on docker, Natl J Comput Appl Sci, 2, 5 Williams, 2018, Say goodbye to virtualization for a safer cloud Caprolu, 2019, Edge computing perspectives: Architectures, technologies, and open security issues, 116 Lin, 2018, A measurement study on linux container security: Attacks and countermeasures, 418 Bélair, 2019, Leveraging kernel security mechanisms to improve container security: a survey, 1 Loukidis-Andreou, 2018, Docker-sec: A fully automated container security enhancement mechanism, 1561 Mattetti, 2015, Securing the infrastructure and the workloads of linux containers, 559 Sandhu, 1994, Access control: principle and practice, IEEE Commun Mag, 32, 40, 10.1109/35.312842 Mayer, 2006 2019 Bui, 2015 Combe, 2016, To docker or not to docker: A security perspective, IEEE Cloud Comput, 3, 54, 10.1109/MCC.2016.100 Bacis, 2015, Dockerpolicymodules: mandatory access control for docker containers, 749 Sun, 2018, Security namespace: making linux security frameworks available to containers, 1423 De Benedictis, 2019, Integrity verification of docker containers for a lightweight cloud environment, Future Gener Comput Syst, 97, 236, 10.1016/j.future.2019.02.026 Sailer, 2004, Design and implementation of a TCG-based integrity measurement architecture., 223 Priedhorsky R, Randles T. Charliecloud: Unprivileged containers for user-defined software stacks in hpc. In Proceedings of the international conference for high performance computing, networking, storage and analysis, 2017, pp. 1–10. Azab, 2017, Enabling docker containers for high-performance and many-task computing, 279 Chelladhurai, 2016, Securing docker containers from denial of service (dos) attacks, 856 Jian, 2017, A defense method against docker escape attack, 142 Arnautov, 2016, {SCONE}: Secure linux containers with intel {SGX}, 689 Luo, 2016, Whispers between the containers: High-capacity covert channel attacks in docker, 630 Hunger C, Vilanova L, Papamanthou C, Etsion Y, Tiwari M. DATS-data containers for web applications. In Proceedings of the twenty-third international conference on architectural support for programming languages and operating systems, 2018, pp. 722–736. Hoekstra, 2013, Using innovative instructions to create trustworthy software solutions, HASP@ ISCA, 11, 2487726 Ranjbar, 2017, Synaptic: Secure and persistent connectivity for containers, 262 Kelbert, 2017, Securecloud: Secure big data processing in untrusted clouds, 282 Babar, 2017 Casalicchio, 2020, The state-of-the-art in container technologies: Application, orchestration and security, Concurr Comput: Pract Exper, 10.1002/cpe.5668 Yasrab, 2018 MP, 2016, Enhancing security of docker using linux hardening techniques, 94 Manu, 2016, A study, analysis and deep dive on cloud PAAS security in terms of docker container security, 1 Sultan, 2019, Container security: Issues, challenges, and the road ahead, IEEE Access, 7, 52976, 10.1109/ACCESS.2019.2911732 Lu, 2017, Research of penetration testing technology in docker environment Duarte, 2018, An empirical study of docker vulnerabilities and of static code analysis applicability, 27 Tunde-Onadele, 2019, A study on container vulnerability exploit detection, 121 Shu R, Gu X, Enck W. A study of security vulnerabilities on docker hub. In Proceedings of the seventh ACM on conference on data and application security and privacy, 2017, pp. 269–280. Zerouali, 2019, On the impact of outdated and vulnerable javascript packages in docker images, 619 Brady, 2020, Docker container security in cloud computing, 0975