[PDF][PDF] A Categorical Data Approach for Anomaly Detection in WebAssembly Applications.

T Heinrich, NC Will, RR Obelheiro, CA Maziero - ICISSP, 2024 - pdfs.semanticscholar.org
The security of Web Services for users and developers is essential; since WebAssembly is a
new format that has gained attention in this type of environment over the years, new …

AI-driven container security approaches for 5G and beyond: A survey

IT Aktolga, ES Kuru, Y Sever, P Angin - arxiv preprint arxiv:2302.13865, 2023 - arxiv.org
The rising use of microservices based software deployment on the cloud leverages
containerized software extensively. The security of applications running inside containers as …

[PDF][PDF] The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries

C Helpa, T Heinrich, M Botacin, N Will… - Proceedings of the …, 2024 - scitepress.org
Debugging formats are well-known means to store information from an application, that help
developers to find errors, bugs, or unexpected behavior during the development period. The …

A fault and intrusion tolerance framework for containerized environments: A specification-based error detection approach

T Madi, P Esteves-Verissimo - 2022 International Workshop on …, 2022 - ieeexplore.ieee.org
Container-based virtualization has gained momentum over the past few years thanks to its
lightweight nature and support for agility. However, its appealing features come at the price …

A Zero-day Container Attack Detection based on Ensemble Machine Learning

S Guo, T Sivanthi, P Sommer… - 2023 IEEE 28th …, 2023 - ieeexplore.ieee.org
Machine-learning-based approaches have emerged as viable solutions for automatic
detection of container-related cyber attacks. Choosing the best anomaly detection …

I See Syscalls by the Seashore: An Anomaly-based IDS for Containers Leveraging Sysdig Data

A Frasão, T Heinrich, V Fulber-Garcia… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intrusion detection in virtualized environments is vital due to the widespread adoption of
virtualization technology. A common strategy for achieving this task involves collecting data …

Uma Estratégia Dinâmica para a Detecção de Anomalias em Binários WebAssembly

C Helpa, T Heinrich, M Botacin, NC Will… - Simpósio Brasileiro de …, 2023 - sol.sbc.org.br
WebAssembly é um formato binário de baixo nível, que oferece um alvo de compilação para
linguagens de alto nível. Oferecendo mais segurança para os usuários na Web, com um …

Uso de chamadas WASI para a identificação de ameaças em aplicações webassembly

T Heinrich, NC Will, RR Obelheiro… - Simpósio Brasileiro de …, 2023 - sol.sbc.org.br
WebAssembly (ou Wasm) é um formato de bytecode que vem ganhando rápida adoção
devido a seu bom desempenho, representação compacta, e portabilidade. Ele é mais …

[PDF][PDF] On Detecting Malicious Code Injection by Monitoring Multi-Level Container Activities.

MOH Bhuiyan, S Das, SH Majumder, S Majumdar… - CLOSER, 2024 - scitepress.org
In recent years, cloud-native applications have been widely hosted and managed in
containerized environments due to their unique benefits, such as being lightweight, portable …

A Multimodal Immune System Inspired Defense Architecture for Detecting and Deterring Digital Pathogens in Container Hosted Web Services

IM Khalil - 2023 - search.proquest.com
With the increased use of web technologies, microservices, and Application Programming
Interface (API) for integration between systems, and with the development of …