Serverless computing: a security perspective

E Marin, D Perino, R Di Pietro - Journal of Cloud Computing, 2022 - Springer
In this article we review the current serverless architectures, abstract and categorize their
founding principles, and provide an in-depth security analysis. In particular, we: show the …

On the security of containers: Threat modeling, attack analysis, and mitigation strategies

AY Wong, EG Chekole, M Ochoa, J Zhou - Computers & Security, 2023 - Elsevier
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …

A Container Security Survey: Exploits, Attacks, and Defenses

O Jarkas, R Ko, N Dong, R Mahmud - ACM Computing Surveys, 2025 - dl.acm.org
Containerization significantly boosts cloud computing efficiency by reducing resource
consumption, enhancing scalability, and simplifying orchestration. Yet, these same features …

SoK: A comprehensive analysis and evaluation of docker container attack and defense mechanisms

MS Haq, TD Nguyen, AŞ Tosun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Container-based applications are increasingly favored for their efficiency in software
development, deployment, and operation across various platforms. However, the growing …

Workflow integration alleviates identity and access management in serverless computing

A Sankaran, P Datta, A Bates - … of the 36th Annual Computer Security …, 2020 - dl.acm.org
As serverless computing continues to revolutionize the design and deployment of web
services, it has become an increasingly attractive target to attackers. These adversaries are …

Security challenges in the container cloud

Y Yang, W Shen, B Ruan, W Liu… - 2021 Third IEEE …, 2021 - ieeexplore.ieee.org
In recent years, containerization has become a major trend in the cloud due to its high
resource utilization efficiency and convenient DevOps support. However, the complexity of …

Attacks are forwarded: breaking the isolation of {MicroVM-based} containers through operation forwarding

J **ao, N Yang, W Shen, J Li, X Guo, Z Dong… - 32nd USENIX Security …, 2023 - usenix.org
People proposed to use virtualization techniques to reinforce the isolation between
containers. In the design, each container runs inside a lightweight virtual machine (called …

Threat modeling and security analysis of containers: A survey

AY Wong, EG Chekole, M Ochoa, J Zhou - arxiv preprint arxiv:2111.11475, 2021 - arxiv.org
Traditionally, applications that are used in large and small enterprises were deployed on"
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …

Cage4Deno: A fine-grained sandbox for Deno subprocesses

M Abbadini, D Facchinetti, G Oldani, M Rossi… - Proceedings of the …, 2023 - dl.acm.org
Deno is a runtime for JavaScript and TypeScript that is receiving great interest by
developers, and is increasingly used for the construction of back-ends of web applications. A …

Demons in the shared kernel: Abstract resource attacks against os-level virtualization

N Yang, W Shen, J Li, Y Yang, K Lu, J **ao… - Proceedings of the …, 2021 - dl.acm.org
Due to its faster start-up speed and better resource utilization efficiency, OS-level
virtualization has been widely adopted and has become a fundamental technology in cloud …