信息网络安全 ›› 2025, Vol. 25 ›› Issue (9): 1329-1337.doi: 10.3969/j.issn.1671-1122.2025.09.001

• 优秀论文 • 上一篇    下一篇

面向Serverless应用的跨函数行为分析与约束技术

詹东阳1, 黄子龙1, 谭凯1(), 俞兆丰1, 贺铮2, 张宏莉1   

  1. 1.哈尔滨工业大学网络空间安全学院,哈尔滨 150001
    2.黑龙江省气候中心,哈尔滨 150030
  • 收稿日期:2025-06-03 出版日期:2025-09-10 发布日期:2025-09-18
  • 通讯作者: 谭凯 tankai@hit.edu.cn
  • 作者简介:詹东阳(1991—),男,黑龙江,副教授,博士,CCF会员,主要研究方向为系统安全、云计算安全|黄子龙(2000—),男,新疆,硕士研究生,主要研究方向为云安全|谭凯(1994—),男,黑龙江,副研究员,博士,主要研究方向为恶意软件分析、云安全|俞兆丰(1997—),男,新疆,博士研究生,主要研究方向为程序分析、漏洞挖掘|贺铮(1993—),女,黑龙江,工程师,硕士,主要研究方向为机器学习、气候变换分析|张宏莉(1973—),女,吉林,教授,博士,主要研究方向为网络测量、数据安全
  • 基金资助:
    国家自然科学基金(62302122);黑龙江省重点研发计划(JD2023SJ07)

Cross-Function Behavior Analysis and Constraint Technology for Serverless Applications

ZHAN Dongyang1, HUANG Zilong1, TAN Kai1(), YU Zhaofeng1, HE Zheng2, ZHANG Hongli1   

  1. 1. School of Cyberspace Science, Harbin Institute of Technology, Harbin 150001, China
    2. Heilongjiang Climate Center, Harbin 150030, China
  • Received:2025-06-03 Online:2025-09-10 Published:2025-09-18

摘要:

无服务器计算中的应用被分解为函数运行于不同容器中,由于具有轻量化优势被广泛应用,但是也带来了安全风险。这种架构使程序内部接口暴露于网络,增加了攻击面以及越权访问等安全风险,威胁控制流和数据流的完整性。而现有的安全检测方法难以同时保护无服务器计算中容器(函数)间的控制流和数据流完整性。因此,文章提出一种面向Serverless应用的跨函数行为分析与约束技术,研究基于静态分析的函数间完整业务访问模型提取方法,实现实时的跨函数访问安全检测。实验结果表明,文章所提方法的异常控制流与数据流检出率分别达到97.54%和92.87%,并将监控误报率降低了10%以上,能够提升无服务器计算安全性。

关键词: 无服务器计算, 静态分析, 访问控制

Abstract:

Applications in Serverless computing are decomposed into functions and run in different containers, they have the advantage of being lightweight and was widely used, but they also brings security risks. This architecture exposes the internal interfaces of the program to the network, increases the attack surface and security risks such as unauthorized access, and threatens the integrity of the control flow and data flow. However, existing security monitoring methods are difficult to protect the integrity of the control flow and data flow between containers (or functions) in Serverless computing. As a result, this paper proposed a cross-function behavior analysis and constraint technology for Serverless applications, by studying the extraction method of the complete access model between functions based on static analysis, real-time access control across functions was performed. Experimental results show that the method achieves an average of 97.54% as well as 92.87% for the anomalous control flow and data flow identification rate, and reduces the monitoring false alarms by more than 10%, which is able to improve the security of Serverless computing.

Key words: Serverless computing, static analysis, access control

中图分类号: