Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

Container technologies for arm architecture: A comprehensive survey of the state-of-the-art

S Kaiser, MS Haq, AŞ Tosun, T Korkmaz - IEEE Access, 2022 - ieeexplore.ieee.org
Container technology is becoming increasingly popular as an alternative to traditional virtual
machines because it provides a faster, lighter, and more portable runtime environment for …

Container security: Issues, challenges, and the road ahead

S Sultan, I Ahmad, T Dimitriou - IEEE access, 2019 - ieeexplore.ieee.org
Containers emerged as a lightweight alternative to virtual machines (VMs) that offer better
microservice architecture support. The value of the container market is expected to reach 2.7 …

Understanding the security risks of docker hub

P Liu, S Ji, L Fu, K Lu, X Zhang, WH Lee, T Lu… - … –ESORICS 2020: 25th …, 2020 - Springer
Docker has become increasingly popular because it provides efficient containers that are
directly run by the host kernel. Docker Hub is one of the most popular Docker image …

SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms

MS Haq, TD Nguyen, AŞ Tosun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Container-based applications are increasingly favored for their efficiency in software
development, deployment, and operation across various platforms. However, the growing …

SysFlow: Toward a programmable zero trust framework for system security

S Hong, L Xu, J Huang, H Li, H Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Zero Trust, as an emerging trend of cybersecurity paradigms in modern infrastructure (eg,
enterprise, cloud, edge, IoT, and 5G), is moving security defenses from static and perimeter …

[HTML][HTML] Lic-Sec: an enhanced AppArmor Docker security profile generator

H Zhu, C Gehrmann - Journal of Information Security and Applications, 2021 - Elsevier
Along with the rapid development of cloud computing technology, containerization
technology has drawn much attention from both industry and academia. In this paper, we …

[HTML][HTML] SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection

L Chen, Y Xia, Z Ma, R Zhao, Y Wang, Y Liu… - Journal of Information …, 2022 - Elsevier
Container technology has become a popular development that can conveniently accelerate
building, running, and sharing applications. However, a container image packaging a …

A review of security issues and solutions for precision health in Internet-of-Medical-Things systems

N Li, M Xu, Q Li, J Liu, S Bao, Y Li, J Li… - Security and …, 2023 - sands.edpsciences.org
Precision medicine provides a holistic perspective of an individual's health, including
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …

Vulnerability analysis and security research of docker container

J Wenhao, L Zheng - 2020 IEEE 3rd International Conference …, 2020 - ieeexplore.ieee.org
Docker is an open source application container engine that enables users to pack
applications and rely on packages to portable containers. However, Docker also has …