參考文獻 |
[1] PricewaterhouseCoopers, “PwC’s 2023 Cloud Business Survey,” Accessed on Jun
12, 2024. [Online]. Available: https://www.pwc.com/us/en/techeffect/
cloud/cloud-business-survey.html
[2] Imtiaz Ahmad, Mohammad Gh. AlFailakawi, Asayel AlMutawa and Latifa
Alsalman, “Container scheduling techniques: A Survey and assessment,” Journal
of King Saud University - Computer and Information Sciences, Mar. 2021, doi:
https://doi.org/10.1016/j.jksuci.2021.03.002.
[3] Chao-Chun Chen, Min-Hsiung Hung, Kuan-Chou Lai and Yu-Chuan Lin, “Docker
and Kubernetes,” pp. 169–213, Aug. 2021, doi:
https://doi.org/10.1002/9781119739920.ch5.
[4] Sari Sultan, Imtiaz Ahmad and Tassos Dimitriou “Container Security: Issues,
Challenges, and the Road Ahead,” IEEE Access, vol. 7, pp. 52976–52996, 2019,
doi: https://doi.org/10.1109/access.2019.2911732.
[5] MITRE, “CVE - Common Vulnerabilities and Exposures (CVE),” Accessed on
Jun 12, 2024. [Online]. Available: https://cve.mitre.org/
[6] Container Breakout Vulnerabilities “Container Breakout Vulnerabilities,”
Accessed on Jun 12, 2024. [Online]. Available:
https://www.containersecurity.site/attackers/container_breakout_vulnerabilities.h
tml
[7] gvisor.dev “gVisor,” Accessed on Jun 12, 2024. [Online] https://gvisor.dev/
[8] Tom Goethals, Merlijn Sebrechts, Mays Al-Naday, Bruno Volckaert, and Filip De
Turck, “A functional and performance benchmark of lightweight virtualization platforms for edge computing,” biblio.ugent.be, 2022.
https://biblio.ugent.be/publication/8769638 (accessed Jun. 12, 2024)
[9] Ian Buchanan, “Containers vs Virtual Machines,” Atlassian. Accessed on Jun 12,
2024. [Online] https://www.atlassian.com/microservices/cloudcomputing/
containers-vs-vms
[10] Reeves Michael. “Investigating escape vulnerabilities in container runtimes”
Diss. Purdue University, 2021.
[11] Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, and
Qi Li. (2023). Cross Container Attacks: The Bewildered {eBPF} on Clouds. In
32nd USENIX Security Symposium (USENIX Security 23) (pp. 5971-5988).
[12] Tengchao Ma, Changqiao Xu, Shujie Yang, Yiting Huang, Qingzhao An, Xiaohui
Kuang and Luigi Alfredo Grieco, “A Mutation-Enabled Proactive Defense Against
Service-Oriented Man-in-The-Middle Attack in Kubernetes,” I.E.E.E. transactions
on computers/IEEE transactions on computers, pp. 1–14, Jan. 2023, doi:
https://doi.org/10.1109/tc.2023.3238125.
[13] Xing Gao, Benjamin Steenkamer, Zhongshu Gu, Mehmet Kayaalp, Dimitrios
Pendarakis, Haining Wang, “A Study on the Security Implications of Information
Leakages in Container Clouds,” vol. 18, no. 1, pp. 174–191, Jan. 2021, doi:
https://doi.org/10.1109/tdsc.2018.2879605.
[14] Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu
“Whispers between the Containers: High-Capacity Covert Channel Attacks in
Docker,” Aug. 2016, doi: https://doi.org/10.1109/trustcom.2016.0119.
[15] Nicholas Pecka, Lotfi Ben Othmane, and Altaz Valani, “Privilege Escalation
Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment,”
Proceedings of the International Conference on Software and System Processes and International Conference on Global Software Engineering, May 2022, doi:
https://doi.org/10.1145/3529320.3529325.
[16] MacLeod, Mairi. "Escaping from a virtualised environment: An evaluation of container breakout techniques." Escaping from a virtualised environment: An evaluation of container breakout techniques (2021).
[17] “NVD - CVE-2022-0492,” nvd.nist.gov. Accessed on Jun 12, 2024. [Online] https://nvd.nist.gov/vuln/detail/CVE-2022-0492
[18] “NVD - CVE-2024-21626,” nvd.nist.gov. Accessed on Jun 12, 2024. [Online] https://nvd.nist.gov/vuln/detail/CVE-2024-21626
[19] “eBPF - Introduction, Tutorials & Community Resources,” ebpf.io. Accessed on Jun 12, 2024. [Online] https://ebpf.io/
[20] “Live-patching security vulnerabilities inside the Linux kernel with eBPF Linux Security Module,” The Cloudflare Blog, Jun 12, 2024. [Online] https://blog.cloudflare.com/live-patch-security-vulnerabilities-with-ebpf-lsm
[21] Madhan Raj Kanagarathinam, Krishna M. Sivalingam, Gunjan Kumar Choudhary, “Application Prioritization Engine for Enhancing Real-Time Performance in Smartphones,” IEEE transactions on network and service management/IEEE eTransactions on network and service management, vol. 21, no. 1, pp. 773–788, Feb. 2024, doi: https://doi.org/10.1109/tnsm.2023.3291706.
[22] “Cilium - Linux Native, API-Aware Networking and Security for Containers,” Accessed on Jun 12, 2024. [Online] cilium.io. https://cilium.io/
[23] “What is eBPF? An Introduction and Deep Dive into the eBPF Technology,” Accessed on Jun 12, 2024. [Online] www.ebpf.io. https://ebpf.io/what-is-ebpf/
[24] Chris Wright, Crispin Cowan, James Morris, Stephen Smalley and Greg Kroah-Hartman (2002). Linux security modules: General security support for the linux 64 kernel. In 11th USENIX Security Symposium (USENIX Security 02).
[25] Perf Wiki. perf.wiki.kernel.org. Accessed on Jun 12, 2024. [Online] https://perf.wiki.kernel.org/index.php/Main_Page.
[26] Kehe Wu, Dan Yang, Xue Gao, Wen Yang, Mingyan Li and Dong Wang “Process based container escape monitoring and resource isolation scheme,” Jun. 2022, doi: https://doi.org/10.1109/icics55353.2022.9811204.
[27] MOUW Erik (2001). Linux kernel procfs guide. Delft University of Technology.
[28] “NVD - CVE-2016-5195,” nvd.nist.gov. Accessed on Jun 12, 2024. [Online] https://nvd.nist.gov/vuln/detail/CVE-2016-5195
[29] Mashal Abbas, Shahpar Khan, Abdul Monum, Fareed Zaffar, Rashid Tahir, David Eyers, Hassaan Irshad, and Ashish Gehani, Vinod Yegneswaran and Thomas Pasquier, “PACED: Provenance-based Automated Container Escape Detection,” Sep. 2022, doi: https://doi.org/10.1109/ic2e55432.2022.00035.
[30] Thomas F. J.-M. Pasquier, Jatinder Singh, David Eyers and Jean Bacon, “Camflow: Managed Data-Sharing for Cloud Services,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 472–484, Jul. 2017, doi: https://doi.org/10.1109/tcc.2015.2489211.
[31] Igor Kotenko, Igor Saenko, Andrey Chechulin, Lidia Vitkova, Maxim Kolomeec, Igor Zelichenok, Maxim Melnik, Denis Makrushin and Nikita Petrevich. "Detection of Anomalies and Attacks in Container Systems: An Integrated Approach Based on Black and White Lists." International Conference on Intelligent Information Technologies for Industry. Cham: Springer International Publishing, 2022.
[32] “Falco,” Falco. Accessed on Jun 12, 2024. [Online] https://falco.org/
[33] Revuelta Martinez, Á. (2023). Study of Security Issues in Kubernetes (K8s)Architectures; Tradeoffs and Opportunities.
[34] “aya-rs,” Accessed on Jun 12, 2024. [Online] https://github.com/aya-rs/aya
[35] “bpf-linker,” Accessed on Jun 12, 2024. [Online] https://github.com/aya-rs/bpflinker
[36] “The LLVM Compiler Infrastructure Project,” Llvm.org, Accessed on Jun 12, 2024. [Online] https://llvm.org/
[37] Sebastiano Miano, Fulvio Risso, Mauricio Vásquez Bernal, Matteo Bertrone and Yunsong Lu, “A Framework for eBPF-Based Network Functions in an Era of Microservices,” IEEE Transactions on Network and Service Management, vol. 18, no. 1, pp. 133–151, Mar. 2021, doi: https://doi.org/10.1109/TNSM.2021.3055676.
[38] can-ctr-escape-cve-2022-0492. Accessed on Jun 12, 2024. [Online] GitHub. https://github.com/PaloAltoNetworks/can-ctr-escape-cve-2022-0492/tree/main
[39] “Exploit: rewrite cgroup devices,” GitHub. Accessed on Jun 12, 2024. [Online] https://github.com/cdk-team/CDK/wiki/Exploit:-rewrite-cgroup-devices
[40] “chompie1337/Linux_LPE_eBPF_CVE-2021-3490,” GitHub. Accessed on Jun 12, 2024. [Online] https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490
[41] Vincent M. Weaver, "Self-monitoring overhead of the Linux perf_ event performance counter interface," 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Philadelphia, PA, USA, 2015, pp. 102-111, doi: 10.1109/ISPASS.2015.7095789.
[42] Exploring BPF LSM support on aarch64 with ftrace. Exein. Accessed on Jun 12,2024. [Online] https://blog.exein.io/exploring-bpf-lsm-support-on-aarch64-withftrace/
[43] “toml-rs/toml,” Accessed on Jun 12, 2024. [Online] GitHub, Jun. 12, 2024. https://github.com/toml-rs/toml.git
[44] “NVIDIA/nvidia-docker,” GitHub, Accessed on Jun 12, 2024. [Online]. https://github.com/NVIDIA/nvidia-docker
[45] S. Sekigawa, C. Sasaki, and A. Tagami, “Web Application-Based WebAssembly Container Platform for Extreme Edge Computing,” Dec. 2023, doi: https://doi.org/10.1109/globecom54140.2023.10437269. |