Evaluation on the Security of Commercial Cloud Container Services

[1]  Roberto Di Pietro,et al.  Docker ecosystem - Vulnerability Analysis , 2018, Comput. Commun..

[2]  Antonio Brogi,et al.  Cloud Container Technologies: A State-of-the-Art Review , 2019, IEEE Transactions on Cloud Computing.

[3]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[4]  N. Asokan,et al.  Security of OS-Level Virtualization Technologies , 2014, NordSec.

[5]  Gang Wang,et al.  A First Look: Using Linux Containers for Deceptive Honeypots , 2017, SafeConfig@CCS.

[6]  Xin Lin,et al.  A Measurement Study on Linux Container Security: Attacks and Countermeasures , 2018, ACSAC.

[7]  Taesoo Kim,et al.  Breaking Kernel Address Space Layout Randomization with Intel TSX , 2016, CCS.

[8]  Dirk Merkel,et al.  Docker: lightweight Linux containers for consistent development and deployment , 2014 .

[9]  A. Kivity,et al.  kvm : the Linux Virtual Machine Monitor , 2007 .

[10]  David Bernstein,et al.  Containers and Cloud: From LXC to Docker to Kubernetes , 2014, IEEE Cloud Computing.

[11]  Long Chen,et al.  A Defense Method against Docker Escape Attack , 2017, ICCSP '17.

[12]  Thanh Bui,et al.  Analysis of Docker Security , 2015, ArXiv.

[13]  Carsten Willems,et al.  Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.

[14]  Dimitrios Pendarakis,et al.  ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).