- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Service-Oriented Architecture and Web Services
- Software System Performance and Reliability
- Cloud Data Security Solutions
Xidian University
2021-2023
Due to its faster start-up speed and better resource utilization efficiency, OS-level virtualization has been widely adopted become a fundamental technology in cloud computing. Compared hardware virtualization, leverages the shared-kernel design achieve high efficiency runs multiple user-space instances (a.k.a., containers) on shared kernel. However, this paper, we reveal new attack surface that is intrinsic affecting Linux, FreeBSD, Fuchsia. The root cause results containers sharing...
As the dominant container orchestration system, Kubernetes is widely used by many companies and cloud vendors. It runs third-party add-ons applications (termed apps) on its control plane to manage whole cluster. The security of these apps critical cluster but has not been systematically studied so far.