Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Serverless computing: a security perspective
In this article we review the current serverless architectures, abstract and categorize their
founding principles, and provide an in-depth security analysis. In particular, we: show the …
founding principles, and provide an in-depth security analysis. In particular, we: show the …
On the security of containers: Threat modeling, attack analysis, and mitigation strategies
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
A Container Security Survey: Exploits, Attacks, and Defenses
Containerization significantly boosts cloud computing efficiency by reducing resource
consumption, enhancing scalability, and simplifying orchestration. Yet, these same features …
consumption, enhancing scalability, and simplifying orchestration. Yet, these same features …
SoK: A comprehensive analysis and evaluation of docker container attack and defense mechanisms
Container-based applications are increasingly favored for their efficiency in software
development, deployment, and operation across various platforms. However, the growing …
development, deployment, and operation across various platforms. However, the growing …
Workflow integration alleviates identity and access management in serverless computing
As serverless computing continues to revolutionize the design and deployment of web
services, it has become an increasingly attractive target to attackers. These adversaries are …
services, it has become an increasingly attractive target to attackers. These adversaries are …
Security challenges in the container cloud
In recent years, containerization has become a major trend in the cloud due to its high
resource utilization efficiency and convenient DevOps support. However, the complexity of …
resource utilization efficiency and convenient DevOps support. However, the complexity of …
Attacks are forwarded: breaking the isolation of {MicroVM-based} containers through operation forwarding
People proposed to use virtualization techniques to reinforce the isolation between
containers. In the design, each container runs inside a lightweight virtual machine (called …
containers. In the design, each container runs inside a lightweight virtual machine (called …
Threat modeling and security analysis of containers: A survey
Traditionally, applications that are used in large and small enterprises were deployed on"
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …
bare metal" servers installed with operating systems. Recently, the use of multiple virtual …
Cage4Deno: A fine-grained sandbox for Deno subprocesses
Deno is a runtime for JavaScript and TypeScript that is receiving great interest by
developers, and is increasingly used for the construction of back-ends of web applications. A …
developers, and is increasingly used for the construction of back-ends of web applications. A …
Demons in the shared kernel: Abstract resource attacks against os-level virtualization
Due to its faster start-up speed and better resource utilization efficiency, OS-level
virtualization has been widely adopted and has become a fundamental technology in cloud …
virtualization has been widely adopted and has become a fundamental technology in cloud …