2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW) 2017
DOI: 10.1109/icdcsw.2017.66
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging the Serverless Architecture for Securing Linux Containers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 4 publications
0
21
0
Order By: Relevance
“…AWS Lambda is being used to support a wider range of applications and use cases [2], [3], [4], [5], [6]. Yan [6]. While using Virtual Machines or containers for serving models is the norm, the use of serverless for model inferencing has been previously proposed [22], [23].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…AWS Lambda is being used to support a wider range of applications and use cases [2], [3], [4], [5], [6]. Yan [6]. While using Virtual Machines or containers for serving models is the norm, the use of serverless for model inferencing has been previously proposed [22], [23].…”
Section: Related Workmentioning
confidence: 99%
“…Serverless platforms promise new capabilities that make writing scalable microservices easier and cost effective, positioning themselves as the next step in the evolution of cloud computing architectures. It has been utilized to support a wider range of applications [2], [3], [4], [5], [6].…”
Section: Introductionmentioning
confidence: 99%
“…The power of serverless computing has been leveraged for providing security for various systems and infrastructures. A mechanism for securing Linux containers has been proposed in [39]. Serverless services have also been utilized for intrusion detection.…”
Section: Securitymentioning
confidence: 99%
“…Regarding serverless and FaaS security, some initial works are starting to provide isolation at microservices and Serverless computing. Recently, Bila et al [32] propose a policy-based improvement in the serverless architecture to guarantying and rebuilding vulnerable containers, that can be included as part of the security orchestration. Containers might have built-in vulnerabilities because of wrong configurations or just by the fact of including executable binaries with security flaws.…”
Section: Security and Privacymentioning
confidence: 99%