DC FieldValueLanguage
dc.contributor.authorBargmann, Christian Frank-
dc.contributor.authorTropmann-Frick, Marina-
dc.date.accessioned2020-09-02T15:40:47Z-
dc.date.available2020-09-02T15:40:47Z-
dc.date.issued2019-12-04-
dc.identifier.issn1613-0073en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12738/4989-
dc.description.abstractContainer virtualization has become the tool of choice for running isolated applications in cloud environments. Linux-Containers virtualize at the operating system level, with multiple containers running atop the operating system kernel directly. Therefore, threats to one container are potentially threats to many others. Especially for PaaS and Serverless providers, the secure execution of untrusted workloads on their platform in order to mitigate software vulnerabilities from spreading has high priority. Containers face a variety of different threats, vulnerabilities and historical weaknesses that need to be considered and defended against. This paper presents current approaches to securing container workloads. gVisor, Kata Containers and Firecracker are presented and compared with each other. Although sandbox containers have different attack surfaces such as the container daemon process, network, or storage, this paper focuses on the Linux kernel itself as a vulnerability in sandbox containers and examines how each approach implements protection.en
dc.language.isoenen_US
dc.publisherRWTH Aachenen_US
dc.relation.ispartofCEUR workshop proceedingsen_US
dc.subject.ddc004: Informatiken_US
dc.titleA survey on secure container isolation approaches for multi-tenant container workloads and serverless computingen
dc.typeinProceedingsen_US
dc.relation.conferenceWorkshop on Software Quality Analysis, Monitoring, Improvement, and Applications 2019en_US
dc.description.versionPeerRevieweden_US
local.contributorPerson.editorBudimac, Zoran-
local.contributorPerson.editorKoteska, Bojana-
tuhh.container.endpage1:10en_US
tuhh.container.startpage1:1en_US
tuhh.container.volume2508en_US
tuhh.oai.showtrueen_US
tuhh.publication.instituteDepartment Informatiken_US
tuhh.publication.instituteFakultät Technik und Informatiken_US
tuhh.publisher.urlhttps://ceur-ws.org/Vol-2508/paper-bar.pdf-
tuhh.publisher.urlhttp://nbn-resolving.de/urn:nbn:de:0074-2508-8-
tuhh.relation.ispartofseriesEighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications - SQAMIA 2019 : Ohrid, North Macedonia, 22-25.09.2019 : proceedingsen_US
tuhh.type.opusInProceedings (Aufsatz / Paper einer Konferenz etc.)-
dc.rights.cchttps://creativecommons.org/licenses/by/4.0/en_US
dc.type.casraiConference Paper-
dc.type.dinicontributionToPeriodical-
dc.type.drivercontributionToPeriodical-
dc.type.statusinfo:eu-repo/semantics/publishedVersionen_US
dcterms.DCMITypeText-
item.languageiso639-1en-
item.fulltextNo Fulltext-
item.creatorGNDBargmann, Christian Frank-
item.creatorGNDTropmann-Frick, Marina-
item.tuhhseriesidEighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications - SQAMIA 2019 : Ohrid, North Macedonia, 22-25.09.2019 : proceedings-
item.openairetypeinProceedings-
item.grantfulltextnone-
item.creatorOrcidBargmann, Christian Frank-
item.creatorOrcidTropmann-Frick, Marina-
item.seriesrefEighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications - SQAMIA 2019 : Ohrid, North Macedonia, 22-25.09.2019 : proceedings-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_5794-
crisitem.author.deptDepartment Informatik-
crisitem.author.deptDepartment Informatik-
crisitem.author.orcid0000-0003-1623-5309-
crisitem.author.parentorgFakultät Technik und Informatik-
crisitem.author.parentorgFakultät Technik und Informatik-
Appears in Collections:Publications without full text
Show simple item record

Page view(s)

107
checked on Jan 13, 2025

Google ScholarTM

Check

HAW Katalog

Check

Add Files to Item

Note about this record


This item is licensed under a Creative Commons License Creative Commons