Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Information Leakages of Docker Containers: Characterization and Mitigation Strategies

Conference Paper
Publication Date:
2023
abstract:
Compared to classic virtual machines, containers offer lightweight and dynamic execution environments. Hence, they are core building blocks for the development of future softwarized networks and cloud-native applications. However, containers still pose many security challenges, which are less understood compared to other virtualization paradigms. An important aspect often neglected concerns techniques enabling containers to leak data outside their execution perimeters, e.g., to exfiltrate sensitive information or coordinate attacks. In this paper we investigate security impacts of covert communications based on the looser isolation of memory statistics information. Our characterization indicates that the investigation of system calls should be considered a prime tool to reveal the presence of collusive attack schemes. We also elaborate on two mitigation techniques: the first entails prevention via "hardening" configurations of containers, while the second implements a run-time disruption mechanism.
Iris type:
04.01 Contributo in Atti di convegno
Keywords:
information hiding; covert channels; container security; cybersecurity
List of contributors:
Zuppelli, Marco; Caviglione, Luca; Cambiaso, Enrico; Repetto, Matteo
Authors of the University:
CAMBIASO ENRICO
CAVIGLIONE LUCA
REPETTO MATTEO
ZUPPELLI MARCO
Handle:
https://iris.cnr.it/handle/20.500.14243/462246
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)