[1] |
MERKELD . Docker:lightweight Linux containers for consistent development and deployment[J]. Linux Journal, 2014(239):2.
|
[2] |
SEYFRIED S , . Resource management in Linux with control groups[C]// Proceedings of the Linux-Kongress. 2010.
|
[3] |
GAO X , GU Z S , LI Z F ,et al. Houdini′s escape:breaking the resource rein of Linux control groups[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019: 1073-1086.
|
[4] |
BUI T . Analysis of docker security[J]. arXiv preprint arXiv:1501.02967, 2015
|
[5] |
GUPTA U . Comparison between security majors in virtual machine and Linux containers[J]. arXiv preprint arXiv:1507.07816, 2015
|
[6] |
BACIS E , MUTTI S , CAPELLI S ,et al. Docker policy modules:mandatory access control for docker containers[C]// 2015 IEEE Conference on Communications and Network Security (CNS). 2015: 749-750.
|
[7] |
SMALLEY S , VANCE C,SALA-MON W . Implementing selinux as a linux security module[J]. NAI Labs Report, 2001,1(43):139.
|
[8] |
COMBE T , MARTIN A , PIETRO R . To docker or not to docker:a security perspective[J]. IEEE Cloud Computing, 2016,3(5): 54-62.
|
[9] |
CHELLADHURAI J , CHELLIAH P R , KUMAR A . Securing Docker containers from denial of service (DoS) attacks[C]// 2016 IEEE International Conference on Services Computing (SCC). 2016: 856-859.
|
[10] |
SHU R , GU X H , ENCK W L . A study of security vulnerabilities on docker hub[C]// Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. 2017: 269-280.
|
[11] |
YASRAB R . Mitigating docker security issues[J]. arXiv preprint arXiv:1804.05039, 2018
|
[12] |
JIAN Z Q , CHEN L . A defense method against docker escape attack[C]// Proceedings of the 2017 International Conference on Cryptography,Security and Privacy. 2017: 142-146.
|
[13] |
ROSENR , . Namespaces and cgroups,the basis of Linux containers[C]// Proceedings of the NetDev. 2016.
|
[14] |
王鹃, 胡威, 张雨菡 ,等. 基于Docker的可信容器[J]. 武汉大学学报(理学版), 2017,63(2): 102-108.
|
|
WANG J , HU W , ZHANG Y H ,et al. Trusted container based on Docker[J]. Journal of Wuhan University (Natural Science Edition), 2017,63(2): 102-108.
|
[15] |
LIN X , LEI L G , WANG Y W ,et al. A measurement study on linux container security:attacks and countermeasures[C]// Proceedings of the 34th Annual Computer Security Applications Conference. 2018: 418-429.
|
[16] |
PRABHAKARR , KUMARR . Concurrent programming with go[R]. 2011.
|
[17] |
LOPES B C , AULERR . Getting started with LLVM core libraries[M]. Packt Publishing Ltd, 2014.
|