SoK: A comprehensive analysis and evaluation of docker container attack and defense mechanisms

MS Haq, TD Nguyen, AŞ Tosun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Container-based applications are increasingly favored for their efficiency in software
development, deployment, and operation across various platforms. However, the growing …

TCEC: Integrity protection for containers by trusted chip on IoT edge computing nodes

W Li, B Zhao, L Zhu, Y Wang, Q Zhong… - IEEE Sensors …, 2024 - ieeexplore.ieee.org
In edge computing, an Internet of Things (IoT) node may employ container-based
virtualization to manage and process data collected by sensors. Compared to cloud …

DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem

Y Han, C Li, J Zhang, Y Wang, L Yu, Y Cao, H Shen… - Computers & …, 2025 - Elsevier
Hybrid deployment of containers with different kernel types offers a novel solution for cloud
service providers. While extensive research has been conducted on shared kernel …

Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers

E Valdez, S Ahmed, Z Gu, C De Dinechin… - Proceedings of the …, 2024 - dl.acm.org
The Confidential Containers (CoCo) project, as an open-source community initiative, inherits
the system architecture of Kata Containers while integrating confidential computing to …

Bugs in Pods: Understanding Bugs in Container Runtime Systems

J Yu, X **e, C Zhang, S Chen, Y Li… - Proceedings of the 33rd …, 2024 - dl.acm.org
Container Runtime Systems (CRSs), which form the foundational infrastructure of container
clouds, are critically important due to their impact on the quality of container cloud …

Container privilege escalation and escape detection method based on security-first architecture

M Zhou, X Jia, H Su, S Huang, Y Du… - … Conference on High …, 2023 - ieeexplore.ieee.org
Privilege escalation and escape attacks pose the greatest security threats for containers
since they have a direct impact on the confidentiality, integrity, and availability of the …

Exploiting Kubernetes' Image Pull Implementation to Deny Node Availability

LAD Knob, M Franzil, D Siracusa - arxiv preprint arxiv:2401.10582, 2024 - arxiv.org
Kubernetes (K8s) has grown in popularity over the past few years to become the de-facto
standard for container orchestration in cloud-native environments. While research is not new …

Microarchitectural Security of Firecracker VMM for Serverless Cloud Platforms

Z Weissman, T Tiemann, T Eisenbarth… - … Conference on Information …, 2025 - Springer
Firecracker is a virtual machine manager (VMM) purpose-built by AWS for serverless cloud
platforms—services that run code for thousands of end users on a per-task basis …

Data-Centric Analysis of Security and Privacy of Containerized Applications

MS Haq - 2024 - search.proquest.com
Containerization has revolutionized software development and deployment by providing
lightweight and portable encapsulations of applications and their dependencies …

[PDF][PDF] Microarchitectural Vulnerabilities in Heterogeneous Computing and Cloud Systems

Z Weissman - 2024 - digital.wpi.edu
This dissertation brings together some of the defining trends of early 21st century computing—
cloud computing, heterogeneous computing, and the increasingly complex …