While containerization has emerged as a lightweight approach to package, deploy, and run legacy applications in a resource-efficient manner, the shared kernel-resource model used by containers introduces critical security concerns. Specifically, the abuse of system calls by a compromised container can trigger the security vulnerabilities of a host kernel. Unfortunately, even though existing solutions provide powerful protection mechanisms against such issues, how to define the capabilities of containers is still up to operators. In this work, we thus introduce TCLP, a dynamic analysis system that helps operators configure the least capabilities of containers to protect not only themselves but also a host. TCLP monitors the system calls triggered by containers in run time and finds the least capabilities required to run the containers based on the collected system calls. Finally, operators configure the minimal capabilities discovered by TCLP for their containers, reducing the risk of kernel vulnerabilities.
CITATION STYLE
Lee, S., Nam, J., Seo, J., & Shin, S. (2019). Poster: TCLP: Enforcing least privileges to prevent containers from kernel vulnerabilities. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 2665–2667). Association for Computing Machinery. https://doi.org/10.1145/3319535.3363282
Mendeley helps you to discover research relevant for your work.