[1] |
CNCF. CNCF 2022 ANNUAL SURVEY[EB/OL]. (2022-12-04)[2024-04-12]. https://www.cncf.io/reports/cncf-annual-survey-2022/.
|
[2] |
SYSDIG. Sysdig 2023 Cloud-Native Security and Usage Report[EB/OL]. (2023-09-06)[2024-04-12]. https://sysdig.com/2023-cloud-native-security-and-usage-report/.
|
[3] |
LINUX. eBPF Instruction Set Specification, v1.0[EB/OL]. (2023-09-08)[2024-04-12]. https://www.kernel.org/doc/html/next/bpf/instruction-set.html.
|
[4] |
JONATHAN C. A JIT for Packet Filters[EB/OL]. (2011-04-08)[2024-04-12]. https://lwn.net/Articles/437981/.
|
[5] |
LINUX. eBPF Verifier[EB/OL]. (2024-04-08)[2024-04-12]. https://docs.kernel.org/bpf/verifier.html.
|
[6] |
GREGG B. BPF Performance Tools[M]. New York: Addison-Wesley Professional, 2019.
|
[7] |
STEVEN R. Unified Tracing Platform[EB/OL]. (2019-10-28)[2024-04-12]. https://static.sched.com/hosted_files/osseu19/5f/unified-tracing-platform-oss-eu-2019.pdf.
|
[8] |
JIM K. Kernel Probes (Kprobes)[EB/OL]. (2023-05-12)[2024-04-08]. https://docs.kernel.org/trace/kprobes.html.
|
[9] |
MATHIEU D. Using the Linux Kernel Tracepoints[EB/OL]. (2024-01-08)[2024-04-12]. https://docs.kernel.org/trace/tracepoints.html#using-the-linux-kernel-tracepoints.
|
[10] |
FOURNIER G, AFCHAIN S, BAUBEAU S. Runtime Security Monitoring with eBPF[EB/OL]. (2021-09-08)[2024-04-12]. https://www.semanticscholar.org/paper/Runtime-Security-Monitoring-with-eBPF-Fournier-Afchain/8a768ccb634f7527885cae4cd5348eba01065b80.
|
[11] |
LINUX. Seccomp BPF (SECure COMPuting with Filters)[EB/OL]. (2024-01-18)[2024-04-12]. https://www.kernel.org/doc/html/latest/userspace-api/seccomp_filter.html.
|
[12] |
JONATHAN C. KRSI — The Other BPF Security Module[EB/OL]. (2019-12-27)[2024-04-12]. https://lwn.net/Articles/808048/.
|
[13] |
FINDLAY W, SOMAYAJI A, BARRERA D. Bpfbox: Simple Precise Process Confinement with Ebpf[C]// ACM. Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop. New York: ACM, 2020: 91-103.
|
[14] |
TIAN D J, HERNANDEZ G, CHOI J I, et al. Lbm: A Security Framework for Peripherals within the Linux Kernel[C]// IEEE. 2019 IEEE Symposium on Security and Privacy (SP). New York: IEEE, 2019: 967-984.
|
[15] |
AGMAN Y, HENDLER D. BPFroid: Robust Real Time Android Malware Detection Framework[EB/OL]. (2021-06-01)[2024-04-12]. https://arxiv.org/pdf/2105.14344v1.
|
[16] |
FALCO. Falco[EB/OL]. (2024-01-21)[2024-03-21]. https://falco.org/.
|
[17] |
LIM S Y, STELEA B, HAN X, et al. Secure Namespaced Kernel Audit for Containers[C]// ACM. Proceedings of the ACM Symposium on Cloud Computing. New York: ACM, 2021: 518-532.
|
[18] |
FINDLAY W, BARRERA D, SOMAYAJI A. Bpfcontain: Fixing the Soft Underbelly of Container Security[EB/OL]. (2021-02-13)[2024-04-12]. https://arxiv.org/pdf/2102.06972.
|
[19] |
BELAIR M, LANIEPCE S, MENAUD J M. SNAPPY: Programmable Kernel-Level Policies for Containers[C]// ACM. Proceedings of the 36th Annual ACM Symposium on Applied Computing. New York: ACM, 2021: 1636-1645.
|
[20] |
ISOVALENT. Tetragon[EB/OL]. (2023-12-01)[2024-04-12]. https://github.com/cilium/tetragon.
|
[21] |
GHAVAMNIA S, PALIT T, BENAMEUR A, et al. Confine: Automated System Call Policy Generation for Container Attack Surface Reduction[EB/OL]. (2020-09-03)[2024-04-12]. https://www.xueshufan.com/publication/3092506792.
|
[22] |
SULTAN S, AHMAD I, DIMITRIOU T. Container Security: Issues, Challenges, and the Road Ahead[J]. IEEE access, 2019, 7: 52976-52996.
|
[23] |
BOGAERTS P. Arp Spoofing Docker Containers[EB/OL]. (2024-02-07)[2024-03-26]. https://dockersec.blogspot.com/2017/01/arp-spoofing-docker-containers_26.html.
|
[24] |
SPAHN N, HANKE N, HOLZ T, et al. Container Orchestration Honeypot: Observing Attacks in the Wild[C]// IEEE. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. New York: IEEE, 2023: 381-396.
|
[25] |
Michael Larabel and Matthew Tippett. Phoronix Test Suite[EB/OL]. (2024-02-12)[2024-04-12]. http://www.phoronix-test-suite.com/.
|