Proceedings of the 34th Annual Computer Security Applications Conference 2018
DOI: 10.1145/3274694.3274720
|View full text |Cite
|
Sign up to set email alerts
|

A Measurement Study on Linux Container Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0
7

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 89 publications
(51 citation statements)
references
References 21 publications
0
43
0
7
Order By: Relevance
“…The authors detailed some real-world scenarios for the vulnerabilities and how they could be exploited and proposed possible fixes. Lin et al [92] created a dataset of 223 exploits that are effective on container platforms. Then, they evaluated the security of different Linux containers using a subset of those exploits.…”
Section: A Vulnerabilities Exploits and Toolsmentioning
confidence: 99%
“…The authors detailed some real-world scenarios for the vulnerabilities and how they could be exploited and proposed possible fixes. Lin et al [92] created a dataset of 223 exploits that are effective on container platforms. Then, they evaluated the security of different Linux containers using a subset of those exploits.…”
Section: A Vulnerabilities Exploits and Toolsmentioning
confidence: 99%
“…They also propose possible fixes and discuss the adoption of Docker by platform-as-a-service (PaaS) providers. Lin et al [18] study 11 exploits that can successfully bypass the isolation provided by the container to achieve privilege escalation. The authors then propose a defense mechanism to defeat those identified privilege escalation exploits.…”
Section: Related Workmentioning
confidence: 99%
“…Os critérios utilizados foram baseados no guia de segurança de contêineres [NIST 2017], no modelo de ameaças [Sultan et al 2019] e na revisão de falhas de segurança em contêineres Linux [Lin et al 2018]. Uma análise visando restringir a quantidade de critérios foi realizada para definir um foco inicial na pesquisa deste artigo, que pode ser ampliado a medida que as análises de cada critério são finalizadas.…”
Section: Critérios De Análiseunclassified