SNAPPY: Programmable Kernel-Level Policies for Containers

被引:3
作者
Belair, Maxime [1 ]
Laniepce, Sylvie [2 ]
Menaud, Jean-Marc [3 ]
机构
[1] Orange Labs, LS2N, IMT Atlantique, Caen, France
[2] Orange Labs, Caen, France
[3] IMT Atlantique, INRIA, LS2N, STACK, Nantes, France
来源
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021 | 2021年
关键词
SNAPPY; Container; Security; Namespace; eBPF; Programmable; Policy; LSM; Kernel; Linux; Implementation; Cloud;
D O I
10.1145/3412841.3442037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compared to full virtualization, containerization reduces virtualization overhead and resource usage, offers reduced deployment latency and improves reusability. For these reasons, containerization is massively used in an increasing number of applications. However, because containers share a full kernel with the host, they are more vulnerable to attacks that may compromise the host and the other containers on the system. In this paper, we present SNAPPY (Safe Namespaceable And Programmable PolicY), a new framework that allows even unprivileged processes such as containers to safely and dynamically enforce in the kernel fine-grained, stackable and programmable eBPF security policies at runtime. This is done by making working coordinately a new LSM (Linux Security Module) Module, a new security Linux namespace abstraction ( policy_NS) and eBPF policies enriched with 'dynamic helpers'. This design especially allows to minimize containers' attack surface. Our design may be applied to any processes but is particularly suitable for container-based use cases. We show that SNAPPY can effectively increase the security level of containers for different use cases, can be easily integrated with the most relevant norms (OCI, Open Container Initiative) and containerization engines (Docker and runC) and has a performance overhead lower than 0.09% in realistic scenarios.
引用
收藏
页码:1636 / 1645
页数:10
相关论文
共 50 条
[31]   Pixel-Level Kernel Estimation for Blind Super-Resolution [J].
Lew, Jaihyun ;
Kim, Euiyeon ;
Heo, Jae-Pil .
IEEE ACCESS, 2021, 9 :152803-152818
[32]   Specifying and enforcing high-level semantic obligation policies [J].
Liu, Zhen ;
Ranganathan, Anand ;
Riabov, Anton .
JOURNAL OF WEB SEMANTICS, 2009, 7 (01) :28-39
[33]   Measuring the Strength of State-Level Alcohol Control Policies [J].
Erickson, Darin J. ;
Lenk, Kathleen M. ;
Toomey, Traci L. ;
Nelson, Toben F. ;
Jones-Webb, Rhonda ;
Mosher, James F. .
WORLD MEDICAL & HEALTH POLICY, 2014, 6 (03) :171-186
[34]   Fostering transitions in landscape policies: A multi-level perspective [J].
Barbanente, Angela ;
Grassini, Laura .
LAND USE POLICY, 2022, 112
[35]   Analyzing the Implementation of Policies and Guidelines for the Prevention and Management of Type 2 Diabetes at Primary Health Care Level in Nepal [J].
Shrestha, Rabina ;
Yadav, Uday Narayan ;
Shrestha, Abha ;
Paudel, Grish ;
Makaju, Deepa ;
Poudel, Prakash ;
Iwashita, Hanako ;
Harada, Yuriko ;
Shrestha, Archana ;
Karmacharya, Biraj ;
Koju, Rajendra ;
Sugishita, Tomohiko ;
Rawal, Lal .
FRONTIERS IN PUBLIC HEALTH, 2022, 10
[36]   Programmable ANalog Device Array (PANDA): A Methodology for Transistor-Level Analog Emulation [J].
Suh, Jounghyuk ;
Suda, Naveen ;
Xu, Cheng ;
Hakim, Nagib ;
Cao, Yu ;
Bakkaloglu, Bertan .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2013, 60 (06) :1369-1380
[37]   Street-level diplomacy? Communicative and adaptive work at the front line of implementing public health policies in primary care [J].
Gale, Nicola ;
Dowswell, George ;
Greenfield, Sheila ;
Marshall, Tom .
SOCIAL SCIENCE & MEDICINE, 2017, 177 :9-18
[38]   Kernel Code Integrity Protection at the Physical Address Level on RISC-V [J].
Ha, Seon ;
Yu, Minsang ;
Moon, Hyungon ;
Lee, Jongeun .
IEEE ACCESS, 2023, 11 :62358-62367
[39]   Energy Efficiency of Kernel and User Space Level VPN Solutions in AIoT Networks [J].
Jevremovic, Aleksandar ;
Kostic, Zona ;
Chorbev, Ivan ;
Perakovic, Dragan ;
Shalaginov, Andrii ;
Cvitic, Ivan .
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2025, 6 :199-210
[40]   KLRA: A Kernel Level Resource Auditing Tool For IoT Operating System Security [J].
Li, Dong ;
Zhang, Zhaonian ;
Liao, Weiyuan ;
Xu, Zhiwei .
2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, :427-432