SNAPPY: Programmable Kernel-Level Policies for Containers

被引:2
|
作者
Belair, Maxime [1 ]
Laniepce, Sylvie [2 ]
Menaud, Jean-Marc [3 ]
机构
[1] Orange Labs, LS2N, IMT Atlantique, Caen, France
[2] Orange Labs, Caen, France
[3] IMT Atlantique, INRIA, LS2N, STACK, Nantes, France
来源
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021 | 2021年
关键词
SNAPPY; Container; Security; Namespace; eBPF; Programmable; Policy; LSM; Kernel; Linux; Implementation; Cloud;
D O I
10.1145/3412841.3442037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compared to full virtualization, containerization reduces virtualization overhead and resource usage, offers reduced deployment latency and improves reusability. For these reasons, containerization is massively used in an increasing number of applications. However, because containers share a full kernel with the host, they are more vulnerable to attacks that may compromise the host and the other containers on the system. In this paper, we present SNAPPY (Safe Namespaceable And Programmable PolicY), a new framework that allows even unprivileged processes such as containers to safely and dynamically enforce in the kernel fine-grained, stackable and programmable eBPF security policies at runtime. This is done by making working coordinately a new LSM (Linux Security Module) Module, a new security Linux namespace abstraction ( policy_NS) and eBPF policies enriched with 'dynamic helpers'. This design especially allows to minimize containers' attack surface. Our design may be applied to any processes but is particularly suitable for container-based use cases. We show that SNAPPY can effectively increase the security level of containers for different use cases, can be easily integrated with the most relevant norms (OCI, Open Container Initiative) and containerization engines (Docker and runC) and has a performance overhead lower than 0.09% in realistic scenarios.
引用
收藏
页码:1636 / 1645
页数:10
相关论文
共 50 条
  • [1] Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers
    Lee, Wonjun
    Nadim, Mohammad
    2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 50 - 55
  • [2] Protocol boosters: A kernel-level implementation
    Marcus, W
    McAuley, T
    Raleigh, T
    GLOBECOM 98: IEEE GLOBECOM 1998 - CONFERENCE RECORD, VOLS 1-6: THE BRIDGE TO GLOBAL INTEGRATION, 1998, : 1619 - 1623
  • [3] Study of kernel-level concurrent communication
    School of Computer Science and Engineering, Univ. of Electron. Sci./Tech.of China, Chengdu 610054, China
    Dianzi Keji Diaxue Xuebao, 2006, 4 (524-527):
  • [4] Experiences in implementing a kernel-level DRM controller
    Arnab, Alapan
    Paulse, Marlon
    Bennett, Duncan
    Hutchison, Andrew
    AXMEDIS 2007: THIRD INTERNATIONAL CONFERENCE ON AUTOMATED PRODUCTION OF CROSS MEDIA CONTENT FOR MULTI-CHANNEL DISTRIBUTION, PROCEEDINGS, 2007, : 39 - 46
  • [5] Design of Kernel-Level Asynchronous Collective Communication
    Nomura, Akihiro
    Ishikawa, Yutaka
    RECENT ADVANCES IN THE MESSAGE PASSING INTERFACE, 2010, 6305 : 92 - 101
  • [6] Redflag: A Framework for Analysis of Kernel-Level Concurrency
    Seyster, Justin
    Radhakrishnan, Prabakar
    Katoch, Samriti
    Duggal, Abhinav
    Stoller, Scott D.
    Zadok, Erez
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 66 - 79
  • [7] User-level protocol servers with kernel-level performance
    Brustoloni, JC
    Steenkiste, P
    IEEE INFOCOM '98 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS. 1-3: GATEWAY TO THE 21ST CENTURY, 1998, : 463 - 471
  • [8] Back to Static Analysis for Kernel-Level Rootkit Detection
    Musavi, Seyyedeh Atefeh
    Kharrazi, Mehdi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) : 1465 - 1476
  • [9] Peeler: Profiling Kernel-Level Events to Detect Ransomware
    Ahmed, Muhammad Ejaz
    Kim, Hyoungshick
    Camtepe, Seyit
    Nepal, Surya
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 240 - 260
  • [10] An Online Approach for Kernel-Level Keylogger Detection and Defense
    Tian, Donghai
    Jia, Xiaoqi
    Chen, Junhua
    Hui, Changzhen
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (02) : 445 - 461