Ugh. Bad rebase.

This commit is contained in:
2024-01-24 19:12:55 +02:00
parent 08bd1a579b
commit e6a214a471

View File

@@ -16,18 +16,6 @@
urldate = {2023-12-04},
}
@inproceedings{manu2016study,
author = {Manu, A.R. and Patel, Jitendra Kumar and Akhtar, Shakil and Agrawal, V.K. and Subramanya Murthy, K.N. Bala},
booktitle = {2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)},
title = {A study, analysis and deep dive on cloud PAAS security in terms of Docker container security},
year = {2016},
volume = {},
number = {},
pages = {1-13},
doi = {10.1109/ICCPCT.2016.7530284},
urldate = {2023-08-07},
}
@online{bui2015analysis,
doi = {10.48550/ARXIV.1501.02967},
url = {https://arxiv.org/abs/1501.02967},
@@ -40,94 +28,6 @@
urldate = {2023-06-02},
}
@inproceedings{wenhao2020vulnerability,
author = {Wenhao, Jiang and Zheng, Li},
booktitle = {2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)},
title = {Vulnerability Analysis and Security Research of Docker Container},
year = {2020},
volume = {},
number = {},
pages = {354-357},
doi = {10.1109/ICISCAE51034.2020.9236837},
urldate = {2023-03-10},
}
@article{combe2016docker,
author = {Combe, Theo and Martin, Antony and Di Pietro, Roberto},
journal = {IEEE Cloud Computing},
title = {To Docker or Not to Docker: A Security Perspective},
year = {2016},
volume = {3},
number = {5},
pages = {54-62},
keywords = {},
doi = {10.1109/MCC.2016.100},
ISSN = {2325-6095},
month = {Sep.},
urldate = {2023-11-07},
}
@inproceedings{loukidis2018docker,
author = {Loukidis-Andreou, Fotis and Giannakopoulos, Ioannis and Doka, Katerina and Koziris, Nectarios},
booktitle = {2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
title = {Docker-Sec: A Fully Automated Container Security Enhancement Mechanism},
year = {2018},
volume = {},
number = {},
pages = {1561-1564},
doi = {10.1109/ICDCS.2018.00169},
urldate = {2023-01-07},
}
@inproceedings{mp2016enhancing,
author = {Amith Raj MP and Kumar, Ashok and Pai, Sahithya J and Gopal, Ashika},
booktitle = {2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)},
title = {Enhancing security of Docker using Linux hardening techniques},
year = {2016},
volume = {},
number = {},
pages = {94-99},
doi = {10.1109/ICATCCT.2016.7911971},
urldate = {2023-07-25},
}
@article{jogi2017establishing,
title = {Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance},
author = {Jogi, Martin},
journal = {University of Tartu, Tartu},
year = {2017},
urldate = {2023-04-06},
}
@article{kaur2014hardening,
title = {Hardening OS Identity by Customised Masking Techniques},
author = {Kaur, Ratinder and Singh, Maninder},
journal = {Thapar University, Punjab, India},
year = {2014},
urldate = {2023-03-31},
}
@article{zhu2021lic,
title = {Lic-Sec: An enhanced AppArmor Docker security profile generator},
journal = {Journal of Information Security and Applications},
volume = {61},
pages = {102924},
year = {2021},
issn = {2214-2126},
doi = {https://doi.org/10.1016/j.jisa.2021.102924},
url = {https://www.sciencedirect.com/science/article/pii/S2214212621001435},
author = {Hui Zhu and Christian Gehrmann},
keywords = {Docker-sec, LiCShield, Lic-Sec, Container, Security evaluation, Docker},
urldate = {2023-02-22},
}
@misc{John2020OS,
title = {OS Hardening - Making systems more secure},
author = {John Ostrowski},
year = {2020},
urldate = {2023-12-09},
}
@online{containerHistory,
title = {The evolution of containers: Docker, Kubernetes and the future},
author = {Emily Mell},
@@ -144,14 +44,6 @@
urldate = {2023-04-07},
}
@online{SIDDARTH201910simple,
title = {10 Simple Steps to Harden Your Docker Containers},
author = {SIDDARTH SENTHILKUMAR},
url = {https://sidsbits.com/10-Simple-Steps-to-Harden-Docker-Containers/},
year = {2019},
urldate = {2023-10-04},
}
@online{LXC,
title = {What's LXC?},
author = {Linux Containers},
@@ -465,14 +357,6 @@
urldate = {2023-11-13},
}
@online{vmblogParavirtualization,
title = {What Are the Benefits of Paravirtualization?},
author = {David Marshall},
year = {2019},
url = {https://vmblog.com/archive/2019/07/23/what-are-the-benefits-of-paravirtualization.aspx},
urldate = {2023-01-26},
}
@online{servermaniaParavirtualization,
title = {What is Paravirtualization in Cloud Computing?},
author = {Milad Karimyar},
@@ -536,30 +420,6 @@
urldate = {2023-10-14},
}
@online{Yathi2017Hardening,
title = {Hardening Docker containers, images, and host - security toolkit},
author = {Yathi Naik},
year = {2017},
url = {https://cloud.redhat.com/blog/hardening-docker-containers-images-and-host-security-toolkit},
urldate = {2023-08-04},
}
@online{StackRox2019Docker,
title = {Docker Container Security 101: Risks and 33 Best Practices},
author = {StackRox},
year = {2019},
url = {https://www.stackrox.io/blog/docker-security-101/},
urldate = {2023-10-15},
}
@online{Marcin2019Hardening,
title = {Hardening Docker Quick Tips},
author = {Marcin Teodorczyk},
year = {2019},
url = {https://medium.com/intive-developers/hardening-docker-quick-tips-54ca9c283964},
urldate = {2023-08-19},
}
@online{deviceWhitelistController,
title = {Device Whitelist Controller},
author = {The Linux kernel users and administrators guide},
@@ -626,14 +486,6 @@
urldate = {2023-01-25},
}
@online{redhatContainerRuntime,
title = {How Kubernetes creates and runs containers: An illustrated guide},
author = {Bob Reselman},
year = {2022},
url = {https://www.redhat.com/architect/how-kubernetes-creates-runs-containers},
urldate = {2023-09-08},
}
@online{codemotionContainerImages,
title = {Container Images: Technical Refresher and Security Best Practices},
author = {Gilad David Maayan},
@@ -642,14 +494,6 @@
urldate = {2023-10-28},
}
@online{osVirtualizationInfo,
title = {OS-Level Virtualization},
author = {Vikas Jain, Vibha Goyal, Nitin Kundapur Bhat},
year = {2016},
url = {https://courses.engr.illinois.edu/cs423/sp2016/lectures/VirtOS.pdf},
urldate = {2023-11-18},
}
@online{teimouriOsVirtualizationDefinition,
title = {Operating-system-level virtualization},
author = {Davoud Teimouri},
@@ -1201,3 +1045,159 @@
url = {https://nginx.org/en/},
urldate = {2024-01-05},
}
inproceedings{manu2016study,
author = {Manu, A.R. and Patel, Jitendra Kumar and Akhtar, Shakil and Agrawal, V.K. and Subramanya Murthy, K.N. Bala},
booktitle = {2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)},
title = {A study, analysis and deep dive on cloud PAAS security in terms of Docker container security},
year = {2016},
volume = {},
number = {},
pages = {1-13},
doi = {10.1109/ICCPCT.2016.7530284},
urldate = {2023-08-07},
}
inproceedings{wenhao2020vulnerability,
author = {Wenhao, Jiang and Zheng, Li},
booktitle = {2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)},
title = {Vulnerability Analysis and Security Research of Docker Container},
year = {2020},
volume = {},
number = {},
pages = {354-357},
doi = {10.1109/ICISCAE51034.2020.9236837},
urldate = {2023-03-10},
}
article{combe2016docker,
author = {Combe, Theo and Martin, Antony and Di Pietro, Roberto},
journal = {IEEE Cloud Computing},
title = {To Docker or Not to Docker: A Security Perspective},
year = {2016},
volume = {3},
number = {5},
pages = {54-62},
keywords = {},
doi = {10.1109/MCC.2016.100},
ISSN = {2325-6095},
month = {Sep.},
urldate = {2023-11-07},
}
inproceedings{loukidis2018docker,
author = {Loukidis-Andreou, Fotis and Giannakopoulos, Ioannis and Doka, Katerina and Koziris, Nectarios},
booktitle = {2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
title = {Docker-Sec: A Fully Automated Container Security Enhancement Mechanism},
year = {2018},
volume = {},
number = {},
pages = {1561-1564},
doi = {10.1109/ICDCS.2018.00169},
urldate = {2023-01-07},
}
inproceedings{mp2016enhancing,
author = {Amith Raj MP and Kumar, Ashok and Pai, Sahithya J and Gopal, Ashika},
booktitle = {2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)},
title = {Enhancing security of Docker using Linux hardening techniques},
year = {2016},
volume = {},
number = {},
pages = {94-99},
doi = {10.1109/ICATCCT.2016.7911971},
urldate = {2023-07-25},
}
article{jogi2017establishing,
title = {Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance},
author = {Jogi, Martin},
journal = {University of Tartu, Tartu},
year = {2017},
urldate = {2023-04-06},
}
article{kaur2014hardening,
title = {Hardening OS Identity by Customised Masking Techniques},
author = {Kaur, Ratinder and Singh, Maninder},
journal = {Thapar University, Punjab, India},
year = {2014},
urldate = {2023-03-31},
}
article{zhu2021lic,
title = {Lic-Sec: An enhanced AppArmor Docker security profile generator},
journal = {Journal of Information Security and Applications},
volume = {61},
pages = {102924},
year = {2021},
issn = {2214-2126},
doi = {https://doi.org/10.1016/j.jisa.2021.102924},
url = {https://www.sciencedirect.com/science/article/pii/S2214212621001435},
author = {Hui Zhu and Christian Gehrmann},
keywords = {Docker-sec, LiCShield, Lic-Sec, Container, Security evaluation, Docker},
urldate = {2023-02-22},
}
misc{John2020OS,
title = {OS Hardening - Making systems more secure},
author = {John Ostrowski},
year = {2020},
urldate = {2023-12-09},
}
online{SIDDARTH201910simple,
title = {10 Simple Steps to Harden Your Docker Containers},
author = {SIDDARTH SENTHILKUMAR},
url = {https://sidsbits.com/10-Simple-Steps-to-Harden-Docker-Containers/},
year = {2019},
urldate = {2023-10-04},
}
online{vmblogParavirtualization,
title = {What Are the Benefits of Paravirtualization?},
author = {David Marshall},
year = {2019},
url = {https://vmblog.com/archive/2019/07/23/what-are-the-benefits-of-paravirtualization.aspx},
urldate = {2023-01-26},
}
online{Yathi2017Hardening,
title = {Hardening Docker containers, images, and host - security toolkit},
author = {Yathi Naik},
year = {2017},
url = {https://cloud.redhat.com/blog/hardening-docker-containers-images-and-host-security-toolkit},
urldate = {2023-08-04},
}
online{StackRox2019Docker,
title = {Docker Container Security 101: Risks and 33 Best Practices},
author = {StackRox},
year = {2019},
url = {https://www.stackrox.io/blog/docker-security-101/},
urldate = {2023-10-15},
}
online{Marcin2019Hardening,
title = {Hardening Docker Quick Tips},
author = {Marcin Teodorczyk},
year = {2019},
url = {https://medium.com/intive-developers/hardening-docker-quick-tips-54ca9c283964},
urldate = {2023-08-19},
}
online{redhatContainerRuntime,
title = {How Kubernetes creates and runs containers: An illustrated guide},
author = {Bob Reselman},
year = {2022},
url = {https://www.redhat.com/architect/how-kubernetes-creates-runs-containers},
urldate = {2023-09-08},
}
online{osVirtualizationInfo,
title = {OS-Level Virtualization},
author = {Vikas Jain, Vibha Goyal, Nitin Kundapur Bhat},
year = {2016},
url = {https://courses.engr.illinois.edu/cs423/sp2016/lectures/VirtOS.pdf},
urldate = {2023-11-18},
}