Journal of Information Security Reserach ›› 2026, Vol. 12 ›› Issue (1): 2-.
Zhang Tian1, Zhang Jie2, Liu Weijie3, and Liu Ximeng1
Online:2026-01-10
Published:2026-01-10
章恬1张杰2刘维杰3刘西蒙1
通讯作者:
刘维杰
博士,副教授.主要研究方向为系统安全、虚拟化与容器.
weijieliu@nankai.edu.cn
作者简介:章恬
硕士研究生.主要研究方向为系统安全、容器安全.
1669349605@qq.com
张杰
硕士研究生.主要研究方向为系统安全、容器安全.
zhangyijie0805@163.com
刘维杰
博士,副教授.主要研究方向为系统安全、虚拟化与容器.
weijieliu@nankai.edu.cn
刘西蒙
博士,研究员.主要研究方向为密码学、人工智能安全.
snbnix@gmail.com
| [1]Combe T, Martin A, Di Pietro R. To docker or not to docker: A security perspective[J]. IEEE Cloud Computing, 2016, 3(5): 5462[2]Li Yiwen, DolanGavitt B, Weber S, et al. LockinPop: Securing privileged operating system kernels by keeping on the beaten path[C] Proc of the 2017 USENIX Annual Technical Conference (USENIX ATC’17). Berkeley, CA: USENIX Association, 2017: 113 [3]Mishra S, Polychronaki M. Shredder: Breaking exploits through API specialization[C] Proc of the 34th Annual Computer Security Applications Conference (ACSAC’18). New York: ACM, 2018: 116 [4]Kim T, Zeldovich N. Practical and effective sandboxing for nonroot users[C] Proc of the 2013 USENIX Annual Technical Conference. Berkeley, CA: USENIX Association, 2013: 139144 [5]Corbet J. Seccomp and sandboxing[EBOL]. (20090513) [20240122]. https:lwn.netArticles332974[6]McCanne S, Jacobson V. The BSD packet filter: A new architecture for userlevel packet capture[C] Proc of the 1993 USENIX Winter Conference (USENIX’93). Berkeley, CA: USENIX Association, 1993: 259270[7]Jacobsen C, Khole M, Spall S, et al. Lightweight capability domains: Towards decomposing the Linux kernel[C] Proc of the 8th Workshop on Programming Languages and Operating Systems (PLOS’15). New York: ACM, 2015: 814[8]Smalley S, Vance C, Salamon W. Implementing SELinux as aLinux security module[EBOL]. [20251214]. https:www.cs.unibo.it~sacerdotdocsoslmselinuxmodule.pdf[9]Gruenbacher A, Arnold S. AppArmor technical documentation[EBOL]. (20070411) [20240122]. https:lkml.iu.eduhypermaillinuxkernel0706.10805techdoc.pdf[10]Corbet J. eBPF seccomp() filters[EBOL]. (20210531)[20240122]. https:lwn.netArticles857228[11]Jia Jinghao, Zhu Yifei, Williams D, et al. Programmable system call security with eBPF[J]. arXiv preprint,arXiv:2302.10366, 2023[12]Zhong Yuhong, Li Haoyu, Wu Yujian, et al. XRP: Inkernel storage functions with eBPF[C] Proc of the 16th USENIX Symp on Operating Systems Design and Implementation (OSDI 22).Berkeley, CA: USENIX Association, 2022: 375393[13]Xing Yunlong, Wang Xinda, Torabi S, et al. A hybrid system call profiling approach for container protection[J]. IEEE Trans on Dependable and Secure Computing, 2023, 21(3): 10681083[14]Cassagnes C, Trestioreanu L, Joly C, et al. The rise of eBPF for nonintrusive performance monitoring[C] Proc of the 2020 IEEEIFIP Network Operations and Management Symposium. Piscataway, NJ: IEEE, 2020: 17[15]Engler D R, Kaashoek M F, O’Toole Jr J. Exokernel: An operating system architecture for applicationlevel resource management[J]. ACM SIGOPS Operating Systems Review, 1995, 29(5): 251266[16]Intel Corporation. Intel software guard extensions programming reference[EBOL]. 2018 [20240122]. https:download.01.orgintelsgxsgxlinux2.7.1docsIntel_SGX_Developer_Reference_Linux_2.7.1_Open_Source.pdf[17]Baumann A, Peinado M, Hunt G. Shielding applications from an untrusted cloud with haven[J]. ACM Trans on Computer Systems (TOCS), 2015, 33(3): 126[18]Arnautov S, Trach B, Gregor F, et al. {SCONE}: Secure Linux containers with Intel {SGX}[C] Proc of the 12th USENIX Symp on Operating Systems Design and Implementation (OSDI 16). Berkeley, CA: USENIX Association, 2016: 689703[19]Shinde S, Le Tien D, Tople S, et al. Panoply: LowTCB Linux applications with SGX enclaves[COL] Proc of the Network and Distributed System Security Symposium(NDSS). Reston, VA, USA: Internet Society, 2017 [20240301]. https:www.ndsssymposium.orgwpcontentuploads201709ndss2017_075_Shinde_paper.pdf[20]The Linux Kernel. Memory protection keys[EBOL]. 2023 [20240122]. https:www.kernel.orgdochtmllatestcoreapiprotectionkeys.html[21]Ghavamnia S, Palit T, Mishra S, et al. Temporal system call specialization for attack surface reduction[C] Proc of the 29th USENIX Security Symposium(USENIX Security 20). Berkeley, CA: USENIX Association, 2020: 17491766[22]DeMarinis N, WilliamsKing K, Jin D, et al. Sysfilter: Automated system call filtering for commodity software[C] Proc of the 23rd Int Symp on Research in Attacks, Intrusions and Defenses (RAID 2020). Berkeley, CA: USENIX Association, 2020: 459474[23]Bulekov A, Jahanshahi R, Egele M. Saphire: Sandboxing PHP applications with tailored system call allowlists[C] Proc of the 30th USENIX Security Symposium (USENIX Security 21). Berkeley, CA: USENIX Association, 2021: 28812898[24]Ghavamnia S, Palit T, Polychronakis M. C2C: Finegrained configurationdriven system call filtering[C] Proc of the 2022 ACM SIGSAC Conf on Computer and Communications Security (CCS’22). New York: ACM, 2022: 12431257[25]Gaidis A J, Atlidakis V, Kemerlis V P. SysXCHG: Refiningprivilege with adaptive system call filters[C] Proc of the 2023 ACM SIGSAC Conf on Computer and Communications Security (CCS’23). New York: ACM, 2023: 19641978[26]Wan Zhiyuan, Lo D, Xia Xin, et al. Mining sandboxes for Linux containers[C] Proc of the 2017 IEEE Int Conf on Software Testing, Verification and Validation (ICST). Piscataway, NJ: IEEE, 2017: 92102[27]Borello G. Sysdig and Falco now powered by eBPF[EBOL]. (20190227) [20240122]. https:sysdig.comblogsysdigandfalconowpoweredbyeBPF[28]Lopes N, Martins R, Correia M E, et al. Container hardening through automated Seccomp profiling[C] Proc of the 6th Int Workshop on Container Technologies and Container Clouds (WOC’20). New York: ACM, 2020: 3136[29]Lei Lingguang, Sun Jianhua, Sun Kun, et al. SPEAKER: Splitphase execution of application containers[C] Proc of the 14th Conf on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). Berlin: Springer, 2017: 230251[30]Yang S, Kang B B, Nam J. Optimus:Associationbased dynamic system call filtering for container attack surface reduction[J]. Journal of Cloud Computing, 2024, 13(1): 7192[31]Ghavamnia S, Palit T, Benameur A, et al. Confine: Automated system call policy generation for container attack surface reduction[C] Proc of the 23rd Int Symp on Research in Attacks, Intrusions and Defenses (RAID 2020). Berkeley, CA: USENIX Association,2020: 443458[32]Kim S, Kim B J, Lee D H. Profgen: Practical study on system call whitelist generation for container attack surface reduction[C] Proc of the 14th Int Conf on Cloud Computing (CLOUD). Piscataway, NJ: IEEE, 2021: 278287[33]Canella C, Werner M, Gruss D, et al. Automating Seccomp filter generation for Linux applications[C] Proc of the 2021 Cloud Computing Security Workshop (CCSW’21). New York: ACM, 2021: 139151[34]Connor R J, McDaniel T, Smith J M, et al. PKU pitfalls: Attacks on PKUbased memory isolation systems[C] Proc of the 29th USENIX Security Symposium (USENIX Security 20). Berkeley, CA: USENIX Association, 2020: 14091426[35]Voulimeneas A, Vinck J, Mechelinck R, et al. You shall not (by) pass! Practical, secure, and fast PKUbased sandboxing[C] Proc of the 17th European Conf on Computer Systems. New York: ACM, 2022: 266282[36]Schrammel D, Weiser S, Sadek R, et al. Jenny: Securing syscalls for PKUbased memory isolation systems[C] Proc of the 31st USENIX Security Symposium (USENIX Security 22). Berkeley, CA: USENIX Association, 2022: 936952[37]Google. gVisor: Container runtime sandbox[EBOL]. [20240122]. https:github.comgooglegVisor[38]Williams D, Lum B, Koller R, et al. Nablacontainers: A new approach to container isolation[EBOL]. [20240122]. https:nablacontainers.github.io[39]Kuenzer S, Bdoiu V A, Lefeuvre H, et al. Unikraft:Fast, specialized unikernels the easy way[C] Proc of the 16th European Conf on Computer Systems. New York: ACM, 2021: 376394[40]Kuo H C, Williams D, Koller R, et al. ALinux in unikernel clothing[C] Proc of the 15th European Conf on Computer Systems. New York: ACM, 2020: 115[41]Manco F, Lupu C, Schmidt F, et al. My VM is lighter (and safer) than your container[C] Proc of the 26th Symp on Operating Systems Principles (SOSP’17). New York: ACM, 2017: 218233[42]Archlinux.KVM[EBOL]. [20240122]. https:wiki.archlinux.orgindex.phpKVM[43]Open Infrastructure Foundation. Kata Containers[EBOL]. [20240122]. https:katacontainers.io[44]Agache A, Brooker M, Florescu A, et al. Firecracker: Lightweight virtualization for serverless applications[C] Proc of the 17th USENIX Symp on Networked Systems Design and Implementation (NSDI 20). Berkeley, CA: USENIX Association, 2020: 419434[45]Shen Zhiming, Sun Zhen, Sela G, et al. XContainers: Breaking down barriers to improve performance and isolation of cloudnative containers[C] Proc of the 24th Int Conf on Architectural Support for Programming Languages and Operating Systems (ASPLOS’19). New York: ACM, 2019: 121135[46]Tsai C C, Arora K S, Bandi N, et al. Cooperation and security isolation of library OSes for multiprocess applications[C] Proc of the 9th European Conf on Computer Systems. New York: ACM, 2014: 114[47]Tsai C, Porter D E, Vij M. GrapheneSGX: A practical library OS for unmodified applications on SGX[C] Proc of the 2017 USENIX Annual Technical Conference (USENIX ATC’17). Berkeley, CA: USENIX Association, 2017: 645658[48]Shen Youren, Tian Hongliang, Chen Yu, et al. Occlum: Secure and efficient multitasking inside a single enclave of Intel SGX[C] Proc of the 25th Int Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2020: 955970[49]Kerrisk M. posix_spawn(3)Linux manual page[EBOL]. [20240122].https:man7.orglinuxmanpagesman3posix_spawn.3.html[50]Baumann A, Appavoo J, Krieger O, et al. A fork () in the road[C] Proc of the Workshop on Hot Topics in Operating Systems. New York: ACM, 2019: 1422[51]Priebe C, Muthukumaran D, Lind J, et al. SGXLKL: Securing the host OS interface for trusted execution[J]. arXiv preprint,arXiv:1908.11143, 2019[52]Li Guoqing, Takahashi K, Ichikawa K, et al. Comparative performance study of lightweight hypervisors used in container environment[C] Proc of the 11th Int Conf on Cloud Computing and Services Science(CLOSER 2021). Berlin: Springer, 2021: 215223[53]Anjali, CarazaHarter T, Swift M M. Blending containers and virtual machines: A study of firecracker and gVisor[C] Proc of the 16th ACM SIGPLANSIGOPS Int Conf on Virtual Execution Environments. New York: ACM, 2020: 101113[54]Espe L, Jindal A, Podolskiy V, et al. Performance evaluation of container runtimes[C] Proc of the 10th Int Conf on Cloud Computing and Services Science. Berlin: Springer,2020: 273281[55]Bottomley J. Measuring the horizontal attack profile of Nabla containers[EBOL]. (20180714)[20240122]. https:blog.hansenpartnership.commeasuringthehorizontalattackprofileofnablacontainers[56]Wang Xingyu, Du Junzhao, Liu Hui. Performance and isolation analysis of RunC, gVisor and Kata containers runtimes[J]. Cluster Computing, 2022, 25(2): 14971513[57]Olivier P, Chiba D, Lankes S, et al. A binarycompatible unikernel[C] Proc of the 15th ACM SIGPLANSIGOPS Int Conf on Virtual Execution Environments. New York: ACM, 2019: 5973[58]Weichbrodt N, Aublin P, Kapitza R. Sgxperf: A performance analysis tool for Intel SGX enclaves[C] Proc of the 19th Int Middleware Conference. New York: ACM, 2018: 201213[59]Xiao Jietao, Yang Nanzi, Shen Wenbo, et al. Attacks are forwarded: Breaking the isolation of MicroVMbased containers through operation forwarding[C] Proc of the 32nd USENIX Security Symposium (USENIX Security 23). Berkeley, CA: USENIX Association, 2023: 75177534[60]Jang S, Song S, Tak B, et al. Secquant: Quantifying container system call exposure[C] Proc of the 27th European Symp on Research in Computer Security. Berlin: Springer, 2022: 145166[61]He Yi, Guo R, Xing Yunlong, et al. Cross container attacks: The bewildered eBPF on clouds[C] Proc of the 32nd USENIX Security Symposium (USENIX Security 23). Berkeley, CA: USENIX Association, 2023: 59715988 |
| [1] | . A DiForest Algorithm for Detecting Abnormal Docker Container [J]. Journal of Information Security Reserach, 2025, 11(12): 1156-. |
| [2] | . Container Anomaly Detection Based on Attention Mechanism and Multiscale Convolutional Neural Network [J]. Journal of Information Security Reserach, 2025, 11(1): 35-. |
| [3] | . Traffic Anomaly Detection Method by Secondorder Feature [J]. Journal of Information Security Reserach, 2024, 10(12): 1082-. |
| [4] | . Security Technologies in 5G Smart Grids [J]. Journal of Information Security Reserach, 2021, 7(9): 815-821. |
| [5] | . Research on Host Intrusion Fetection Method Based on System Call Behavior Similarity Clustering [J]. Journal of Information Security Reserach, 2021, 7(9): 828-835. |
| [6] | . Current Situation For 5G Transmission Network Security [J]. Journal of Information Security Reserach, 2021, 7(5): 450-456. |
| [7] | . Research and Implementation of Data Exchange Scheme Between Different Security Level Networks [J]. Journal of Information Security Research, 2020, 6(4): 338-344. |
| [8] | . Virtual Machine Introspection Technology Based on System-Call Interception [J]. Journal of Information Security Research, 2020, 6(4): 367-372. |
| [9] | . Application of Safe Independent DecisionMaking and Controllable Product in ICS [J]. Journal of Information Security Research, 2017, 3(4): 370-374. |
| [10] | . Research on Malware Detection Technology Based on System Call [J]. Journal of Information Security Research, 2016, 2(4): 367-371. |
| [11] | Zhang Meng, Huang Weiqing, Wang Siye, and Sun Degang. Summary of Physical Space Information Security Technology Development [J]. Journal of Information Security Research, 2016, 2(2): 107-116. |
| [12] | . Design and Implementation of Multi-interface Safe High-speed Optical Fiber One-way Transmission System [J]. Journal of Information Security Research, 2015, 1(3): 278-282. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||