SNAPPY: Programmable Kernel-Level Policies for Containers

被引:2
|
作者
Belair, Maxime [1 ]
Laniepce, Sylvie [2 ]
Menaud, Jean-Marc [3 ]
机构
[1] Orange Labs, LS2N, IMT Atlantique, Caen, France
[2] Orange Labs, Caen, France
[3] IMT Atlantique, INRIA, LS2N, STACK, Nantes, France
来源
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021 | 2021年
关键词
SNAPPY; Container; Security; Namespace; eBPF; Programmable; Policy; LSM; Kernel; Linux; Implementation; Cloud;
D O I
10.1145/3412841.3442037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compared to full virtualization, containerization reduces virtualization overhead and resource usage, offers reduced deployment latency and improves reusability. For these reasons, containerization is massively used in an increasing number of applications. However, because containers share a full kernel with the host, they are more vulnerable to attacks that may compromise the host and the other containers on the system. In this paper, we present SNAPPY (Safe Namespaceable And Programmable PolicY), a new framework that allows even unprivileged processes such as containers to safely and dynamically enforce in the kernel fine-grained, stackable and programmable eBPF security policies at runtime. This is done by making working coordinately a new LSM (Linux Security Module) Module, a new security Linux namespace abstraction ( policy_NS) and eBPF policies enriched with 'dynamic helpers'. This design especially allows to minimize containers' attack surface. Our design may be applied to any processes but is particularly suitable for container-based use cases. We show that SNAPPY can effectively increase the security level of containers for different use cases, can be easily integrated with the most relevant norms (OCI, Open Container Initiative) and containerization engines (Docker and runC) and has a performance overhead lower than 0.09% in realistic scenarios.
引用
收藏
页码:1636 / 1645
页数:10
相关论文
共 50 条
  • [1] Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers
    Lee, Wonjun
    Nadim, Mohammad
    2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 50 - 55
  • [2] Kernel-level tracing for detecting stegomalware and covert channels in Linux environments
    Caviglione, Luca
    Mazurczyk, Wojciech
    Repetto, Matteo
    Schaffhauser, Andreas
    Zuppelli, Marco
    COMPUTER NETWORKS, 2021, 191
  • [3] KVS: High-Efficiency Kernel-level Virtual Switch
    Choi, Heungsik
    Yang, Gyeongsik
    Lee, Kyungwoon
    Yoo, Chuck
    PROCEEDINGS OF THE 2017 SYMPOSIUM ON CLOUD COMPUTING (SOCC '17), 2017, : 635 - 635
  • [4] Drootkit: Kernel-Level Rootkit Detection and Recovery Based on eBPF
    Hu, Xingyu
    Huang, Ming
    Xue, Youhua
    Jiang, Lifeng
    Liu, Yao
    Xie, Guoqi
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2024, 33 (04)
  • [5] A Stack-based Lightweight Approach to Detect Kernel-level Rookits
    Liao, Zhenyi
    Luo, Yuan
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 602 - 607
  • [6] Using Network Traffic to Infer Hardware State: A Kernel-Level Investigation
    Watkins, Lanier
    Robinson, William H.
    Beyah, Raheem
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2015, 14 (03)
  • [7] An implementation and performance evaluation of kernel-level RTP supporting the BSD socket API
    Park, Sang Oh
    Choi, Mun Seon
    Kim, Sung Jo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (08) : 1000 - 1015
  • [8] A new kernel-level key management system for non-interactive processes
    Kwon, M
    Cho, Y
    COMPUTERS AND THEIR APPLICATIONS, 2001, : 462 - 467
  • [9] Secure Namespaced Kernel Audit for Containers
    Lim, Soo Yee
    Stelea, Bogdan
    Han, Xueyuan
    Pasquier, Thomas
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '21), 2021, : 518 - 532
  • [10] Supporting Programmable Autoscaling Rules for Containers and Virtual Machines on Clouds
    József Kovács
    Journal of Grid Computing, 2019, 17 : 813 - 829