GENERATION OF SECURITY POLICIES FOR CONTAINER EXECUTION

Automated generation of security policies for container execution includes performing automated static analysis of binary code of a containerized application and generating, based on the static analysis, a control-flow graph of expected runtime execution flow of the containerized application, the co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Mishra Gupta, Shachee, Sree Prakash, Ashok Pon Kumar
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Mishra Gupta, Shachee
Sree Prakash, Ashok Pon Kumar
description Automated generation of security policies for container execution includes performing automated static analysis of binary code of a containerized application and generating, based on the static analysis, a control-flow graph of expected runtime execution flow of the containerized application, the containerized application providing an expected set of functionality when properly executing, inferring, from the expected runtime execution flow of the containerized application, security policy configurations for a plurality of resources used in execution of the containerized application and that suffice for the containerized application to provide the expected set of functionality, and automatically generating, as part of configuration file(s) used in deploying a container having the containerized application for execution, a security policy for execution of the container including the containerized application thereof, the security policy specifying the security policy configurations for the plurality of resources used in the execution of the containerized application.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2024080342A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2024080342A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2024080342A13</originalsourceid><addsrcrecordid>eNrjZDB3d_VzDXIM8fT3U_B3Uwh2dQ4N8gyJVAjw9_F09nQNVnDzD1Jw9vcLcfQEqlNwjQAqACnmYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkYmBhYGxiZGjobGxKkCAPdBKVM</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>GENERATION OF SECURITY POLICIES FOR CONTAINER EXECUTION</title><source>esp@cenet</source><creator>Mishra Gupta, Shachee ; Sree Prakash, Ashok Pon Kumar</creator><creatorcontrib>Mishra Gupta, Shachee ; Sree Prakash, Ashok Pon Kumar</creatorcontrib><description>Automated generation of security policies for container execution includes performing automated static analysis of binary code of a containerized application and generating, based on the static analysis, a control-flow graph of expected runtime execution flow of the containerized application, the containerized application providing an expected set of functionality when properly executing, inferring, from the expected runtime execution flow of the containerized application, security policy configurations for a plurality of resources used in execution of the containerized application and that suffice for the containerized application to provide the expected set of functionality, and automatically generating, as part of configuration file(s) used in deploying a container having the containerized application for execution, a security policy for execution of the container including the containerized application thereof, the security policy specifying the security policy configurations for the plurality of resources used in the execution of the containerized application.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240307&amp;DB=EPODOC&amp;CC=US&amp;NR=2024080342A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240307&amp;DB=EPODOC&amp;CC=US&amp;NR=2024080342A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Mishra Gupta, Shachee</creatorcontrib><creatorcontrib>Sree Prakash, Ashok Pon Kumar</creatorcontrib><title>GENERATION OF SECURITY POLICIES FOR CONTAINER EXECUTION</title><description>Automated generation of security policies for container execution includes performing automated static analysis of binary code of a containerized application and generating, based on the static analysis, a control-flow graph of expected runtime execution flow of the containerized application, the containerized application providing an expected set of functionality when properly executing, inferring, from the expected runtime execution flow of the containerized application, security policy configurations for a plurality of resources used in execution of the containerized application and that suffice for the containerized application to provide the expected set of functionality, and automatically generating, as part of configuration file(s) used in deploying a container having the containerized application for execution, a security policy for execution of the container including the containerized application thereof, the security policy specifying the security policy configurations for the plurality of resources used in the execution of the containerized application.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDB3d_VzDXIM8fT3U_B3Uwh2dQ4N8gyJVAjw9_F09nQNVnDzD1Jw9vcLcfQEqlNwjQAqACnmYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkYmBhYGxiZGjobGxKkCAPdBKVM</recordid><startdate>20240307</startdate><enddate>20240307</enddate><creator>Mishra Gupta, Shachee</creator><creator>Sree Prakash, Ashok Pon Kumar</creator><scope>EVB</scope></search><sort><creationdate>20240307</creationdate><title>GENERATION OF SECURITY POLICIES FOR CONTAINER EXECUTION</title><author>Mishra Gupta, Shachee ; Sree Prakash, Ashok Pon Kumar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2024080342A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Mishra Gupta, Shachee</creatorcontrib><creatorcontrib>Sree Prakash, Ashok Pon Kumar</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mishra Gupta, Shachee</au><au>Sree Prakash, Ashok Pon Kumar</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>GENERATION OF SECURITY POLICIES FOR CONTAINER EXECUTION</title><date>2024-03-07</date><risdate>2024</risdate><abstract>Automated generation of security policies for container execution includes performing automated static analysis of binary code of a containerized application and generating, based on the static analysis, a control-flow graph of expected runtime execution flow of the containerized application, the containerized application providing an expected set of functionality when properly executing, inferring, from the expected runtime execution flow of the containerized application, security policy configurations for a plurality of resources used in execution of the containerized application and that suffice for the containerized application to provide the expected set of functionality, and automatically generating, as part of configuration file(s) used in deploying a container having the containerized application for execution, a security policy for execution of the container including the containerized application thereof, the security policy specifying the security policy configurations for the plurality of resources used in the execution of the containerized application.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2024080342A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title GENERATION OF SECURITY POLICIES FOR CONTAINER EXECUTION
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T22%3A10%3A58IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Mishra%20Gupta,%20Shachee&rft.date=2024-03-07&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2024080342A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true