Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

A Container Security Survey: Exploits, Attacks, and Defenses

O Jarkas, R Ko, N Dong, R Mahmud - ACM Computing Surveys, 2025 - dl.acm.org
Containerization significantly boosts cloud computing efficiency by reducing resource
consumption, enhancing scalability, and simplifying orchestration. Yet, these same features …

Cross container attacks: The bewildered {eBPF} on clouds

Y He, R Guo, Y **ng, X Che, K Sun, Z Liu… - 32nd USENIX Security …, 2023 - usenix.org
The extended Berkeley Packet Filter (eBPF) provides powerful and flexible kernel interfaces
to extend the kernel functions for user space programs via running bytecode directly in the …

Security challenges in the container cloud

Y Yang, W Shen, B Ruan, W Liu… - 2021 Third IEEE …, 2021 - ieeexplore.ieee.org
In recent years, containerization has become a major trend in the cloud due to its high
resource utilization efficiency and convenient DevOps support. However, the complexity of …

Attacks are forwarded: breaking the isolation of {MicroVM-based} containers through operation forwarding

J **ao, N Yang, W Shen, J Li, X Guo, Z Dong… - 32nd USENIX Security …, 2023 - usenix.org
People proposed to use virtualization techniques to reinforce the isolation between
containers. In the design, each container runs inside a lightweight virtual machine (called …

Take over the whole cluster: Attacking kubernetes via excessive permissions of third-party applications

N Yang, W Shen, J Li, X Liu, X Guo, J Ma - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
As the dominant container orchestration system, Kubernetes is widely used by many
companies and cloud vendors. It runs third-party add-ons and applications (termed third …

Unleashing unprivileged ebpf potential with dynamic sandboxing

SY Lim, X Han, T Pasquier - Proceedings of the 1st Workshop on eBPF …, 2023 - dl.acm.org
For safety reasons, unprivileged users today have only limited ways to customize the kernel
through the extended Berkeley Packet Filter (eBPF). This is unfortunate, especially since the …

Paced: Provenance-based automated container escape detection

M Abbas, S Khan, A Monum, F Zaffar… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
The security of container-based microservices relies heavily on the isolation of operating
system resources that is provided by namespaces. However, vulnerabilities exist in the …

KIT: Testing OS-level virtualization for functional interference bugs

C Liu, S Gong, P Fonseca - Proceedings of the 28th ACM International …, 2023 - dl.acm.org
Container isolation is implemented through OS-level virtualization, such as Linux
namespaces. Unfortunately, these mechanisms are extremely challenging to implement …

Securing the Shared Kernel: Exploring Kernel Isolation and Emerging Challenges in Modern Cloud Computing

S Zehra, HJ Syed, F Samad, U Faseeha… - IEEE …, 2024 - ieeexplore.ieee.org
Containerization is a rapidly advancing technology in cloud computing, facilitating the
seamless development, deployment, and management of applications across diverse …