163 lines
5.6 KiB
BibTeX
163 lines
5.6 KiB
BibTeX
@inproceedings{balduzzi2012security,
|
||
author = {Balduzzi, Marco and Zaddach, Jonas and Balzarotti, Davide and Kirda, Engin and Loureiro, Sergio},
|
||
title = {A Security Analysis of Amazon's Elastic Compute Cloud Service},
|
||
year = {2012},
|
||
isbn = {9781450308571},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/2245276.2232005},
|
||
doi = {10.1145/2245276.2232005},
|
||
booktitle = {Proceedings of the 27th Annual ACM Symposium on Applied Computing},
|
||
pages = {1427–1434},
|
||
numpages = {8},
|
||
keywords = {security, elastic compute cloud service, cloud computing},
|
||
location = {Trento, Italy},
|
||
series = {SAC '12}
|
||
}
|
||
|
||
@inproceedings{manu2016study,
|
||
author={Manu, A.R. and Patel, Jitendra Kumar and Akhtar, Shakil and Agrawal, V.K. and Subramanya Murthy, K.N. Bala},
|
||
booktitle={2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT)},
|
||
title={A study, analysis and deep dive on cloud PAAS security in terms of Docker container security},
|
||
year={2016},
|
||
volume={},
|
||
number={},
|
||
pages={1-13},
|
||
doi={10.1109/ICCPCT.2016.7530284}
|
||
}
|
||
|
||
@misc{bui2015analysis,
|
||
doi = {10.48550/ARXIV.1501.02967},
|
||
url = {https://arxiv.org/abs/1501.02967},
|
||
author = {Bui, Thanh},
|
||
keywords = {Cryptography and Security (cs.CR), FOS: Computer and information sciences, FOS: Computer and information sciences},
|
||
title = {Analysis of Docker Security},
|
||
publisher = {arXiv},
|
||
year = {2015},
|
||
copyright = {arXiv.org perpetual, non-exclusive license}
|
||
}
|
||
|
||
@inproceedings{wenhao2020vulnerability,
|
||
author={Wenhao, Jiang and Zheng, Li},
|
||
booktitle={2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)},
|
||
title={Vulnerability Analysis and Security Research of Docker Container},
|
||
year={2020},
|
||
volume={},
|
||
number={},
|
||
pages={354-357},
|
||
doi={10.1109/ICISCAE51034.2020.9236837}
|
||
}
|
||
|
||
@article{combe2016docker,
|
||
author={Combe, Theo and Martin, Antony and Di Pietro, Roberto},
|
||
journal={IEEE Cloud Computing},
|
||
title={To Docker or Not to Docker: A Security Perspective},
|
||
year={2016},
|
||
volume={3},
|
||
number={5},
|
||
pages={54-62},
|
||
keywords={},
|
||
doi={10.1109/MCC.2016.100},
|
||
ISSN={2325-6095},
|
||
month={Sep.}
|
||
}
|
||
|
||
@inproceedings{loukidis2018docker,
|
||
author={Loukidis-Andreou, Fotis and Giannakopoulos, Ioannis and Doka, Katerina and Koziris, Nectarios},
|
||
booktitle={2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
|
||
title={Docker-Sec: A Fully Automated Container Security Enhancement Mechanism},
|
||
year={2018},
|
||
volume={},
|
||
number={},
|
||
pages={1561-1564},
|
||
doi={10.1109/ICDCS.2018.00169}
|
||
}
|
||
|
||
@inproceedings{mp2016enhancing,
|
||
author={Amith Raj MP and Kumar, Ashok and Pai, Sahithya J and Gopal, Ashika},
|
||
booktitle={2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)},
|
||
title={Enhancing security of Docker using Linux hardening techniques},
|
||
year={2016},
|
||
volume={},
|
||
number={},
|
||
pages={94-99},
|
||
doi={10.1109/ICATCCT.2016.7911971}
|
||
}
|
||
|
||
@article{jogi2017establishing,
|
||
title={Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance},
|
||
author={Jogi, Martin},
|
||
journal={University of Tartu, Tartu},
|
||
year={2017}
|
||
}
|
||
|
||
@article{kaur2014hardening,
|
||
title={Hardening OS Identity by Customised Masking Techniques},
|
||
author={Kaur, Ratinder and Singh, Maninder},
|
||
journal={Thapar University, Punjab, India},
|
||
year={2014}
|
||
}
|
||
|
||
@article{zhu2021lic,
|
||
title = {Lic-Sec: An enhanced AppArmor Docker security profile generator},
|
||
journal = {Journal of Information Security and Applications},
|
||
volume = {61},
|
||
pages = {102924},
|
||
year = {2021},
|
||
issn = {2214-2126},
|
||
doi = {https://doi.org/10.1016/j.jisa.2021.102924},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S2214212621001435},
|
||
author = {Hui Zhu and Christian Gehrmann},
|
||
keywords = {Docker-sec, LiCShield, Lic-Sec, Container, Security evaluation, Docker}
|
||
}
|
||
|
||
@misc{John2020OS,
|
||
title={OS Hardening - Making systems more secure},
|
||
author={John Ostrowski},
|
||
year={2020}
|
||
}
|
||
|
||
@misc{SIDDARTH201910simple,
|
||
title={10 Simple Steps to Harden Your Docker Containers},
|
||
author={SIDDARTH SENTHILKUMAR},
|
||
howpublished="\url{https://sidsbits.com/10-Simple-Steps-to-Harden-Docker-Containers/}",
|
||
year={2019}
|
||
}
|
||
|
||
@misc{Yathi2017Hardening,
|
||
title={Hardening Docker containers, images, and host - security toolkit},
|
||
author={Yathi Naik},
|
||
howpublished="\url{https://cloud.redhat.com/blog/hardening-docker-containers-images-and-host-security-toolkit}",
|
||
year={2017}
|
||
}
|
||
|
||
@misc{StackRox2019Docker,
|
||
title={Docker Container Security 101: Risks and 33 Best Practices},
|
||
author={StackRox},
|
||
howpublished="\url{https://www.stackrox.io/blog/docker-security-101/}",
|
||
year={2019}
|
||
}
|
||
|
||
@misc{Marcin2019Hardening,
|
||
title={Hardening Docker Quick Tips},
|
||
author={Marcin Teodorczyk},
|
||
howpublished="\url{https://medium.com/intive-developers/hardening-docker-quick-tips-54ca9c283964}",
|
||
year={2019}
|
||
}
|
||
|
||
@misc{deviceWhitelistController,
|
||
title={Device Whitelist Controller},
|
||
author={The Linux kernel user’s and administrator’s guide},
|
||
howpublished="\url{https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1/devices.html}"
|
||
}
|
||
|
||
@inproceedings{reshetova2014security,
|
||
title={Security of OS-level virtualization technologies},
|
||
author={Reshetova, Elena and Karhunen, Janne and Nyman, Thomas and Asokan, N},
|
||
booktitle={Nordic Conference on Secure IT Systems},
|
||
pages={77--93},
|
||
year={2014},
|
||
organization={Springer}
|
||
}
|
||
|