Condo: Enhancing Container Isolation Through Kernel Permission Data Protection
Container technology is widely adopted due to its features such as light weight and ease of rapid deployment. However, as an OS-level virtualization mechanism, container isolation relies on the kernel's security mechanisms and the kernel permission data (usually non-control flow data) used by t...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2024, Vol.19, p.6168-6183 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6183 |
---|---|
container_issue | |
container_start_page | 6168 |
container_title | IEEE transactions on information forensics and security |
container_volume | 19 |
creator | Xu, Shouyin Wang, Yuewu Lei, Lingguang Sun, Kun Jing, Jiwu Ma, Siyuan Wang, Jie Huang, Heqing |
description | Container technology is widely adopted due to its features such as light weight and ease of rapid deployment. However, as an OS-level virtualization mechanism, container isolation relies on the kernel's security mechanisms and the kernel permission data (usually non-control flow data) used by these mechanisms. None of the existing mitigation schemes for non-control flow data attacks provide an effective and practical solution to container security since they either trigger too much overhead, have limited effectiveness over attacks launched in specific ways, or can only be used to protect some specific kernel data. In addition, none of them accurately identify the kernel data associated with container isolation. In this paper, we provide a solution called Condo that enhances container isolation by protecting the associated kernel permission data. We first present a generic non-control flow kernel data protection mechanism that protects different types of kernel data uniformly with low overhead and is not limited by attack methods or data types. We then demystify the models of various kernel access control mechanisms in the container environment, and identify the subject and object permission data that are critical to container isolation. Finally, we provide a solution named Condo to enhance container isolation, which is completely transparent to the existing container ecosystem, including containerized applications and container management/orchestration tools such as Docker. Experimental results show that Condo can effectively reduce the compromises of container isolation due to memory corruption attacks with an acceptable overhead. |
doi_str_mv | 10.1109/TIFS.2024.3411915 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_3069614865</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10552298</ieee_id><sourcerecordid>3069614865</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-27e1b9ee62d8ce312cd0e0a84cc3d622ebf6bef5d723aae1df41b8917c10026a3</originalsourceid><addsrcrecordid>eNpNkFFLwzAQx4MoOKcfQPAh4HNnLkmz1jeZmw6HDpzPIU2vW8eWzKR98NvbsiE-3XH3-9_Bj5BbYCMAlj-s5rPPEWdcjoQEyCE9IwNIU5UoxuH8rwdxSa5i3DImJahsQN4n3pX-kU7dxjhbuzXtBo2pHQY6j35nmto7utoE36439A2Dwx1dYtjXMfabZ9MYugy-QduT1-SiMruIN6c6JF-z6Wrymiw-XuaTp0ViuVRNwscIRY6oeJlZFMBtyZCZTForSsU5FpUqsErLMRfGIJSVhCLLYWyBMa6MGJL7491D8N8txkZvfRtc91ILpnIFMlNpR8GRssHHGLDSh1DvTfjRwHSvTffadK9Nn7R1mbtjpkbEf3yacp5n4hf9h2mp</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3069614865</pqid></control><display><type>article</type><title>Condo: Enhancing Container Isolation Through Kernel Permission Data Protection</title><source>IEEE Electronic Library (IEL)</source><creator>Xu, Shouyin ; Wang, Yuewu ; Lei, Lingguang ; Sun, Kun ; Jing, Jiwu ; Ma, Siyuan ; Wang, Jie ; Huang, Heqing</creator><creatorcontrib>Xu, Shouyin ; Wang, Yuewu ; Lei, Lingguang ; Sun, Kun ; Jing, Jiwu ; Ma, Siyuan ; Wang, Jie ; Huang, Heqing</creatorcontrib><description>Container technology is widely adopted due to its features such as light weight and ease of rapid deployment. However, as an OS-level virtualization mechanism, container isolation relies on the kernel's security mechanisms and the kernel permission data (usually non-control flow data) used by these mechanisms. None of the existing mitigation schemes for non-control flow data attacks provide an effective and practical solution to container security since they either trigger too much overhead, have limited effectiveness over attacks launched in specific ways, or can only be used to protect some specific kernel data. In addition, none of them accurately identify the kernel data associated with container isolation. In this paper, we provide a solution called Condo that enhances container isolation by protecting the associated kernel permission data. We first present a generic non-control flow kernel data protection mechanism that protects different types of kernel data uniformly with low overhead and is not limited by attack methods or data types. We then demystify the models of various kernel access control mechanisms in the container environment, and identify the subject and object permission data that are critical to container isolation. Finally, we provide a solution named Condo to enhance container isolation, which is completely transparent to the existing container ecosystem, including containerized applications and container management/orchestration tools such as Docker. Experimental results show that Condo can effectively reduce the compromises of container isolation due to memory corruption attacks with an acceptable overhead.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2024.3411915</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Access control ; Codes ; Container ; Containers ; data integrity ; isolation ; Kernel ; Linux ; Security ; trusted execution environment ; Virtualization</subject><ispartof>IEEE transactions on information forensics and security, 2024, Vol.19, p.6168-6183</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-27e1b9ee62d8ce312cd0e0a84cc3d622ebf6bef5d723aae1df41b8917c10026a3</cites><orcidid>0000-0002-3409-6149 ; 0009-0006-7095-600X ; 0000-0002-0841-1045 ; 0000-0003-4152-2107 ; 0000-0002-1936-0562 ; 0009-0003-5170-1253</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10552298$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4009,27902,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10552298$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Xu, Shouyin</creatorcontrib><creatorcontrib>Wang, Yuewu</creatorcontrib><creatorcontrib>Lei, Lingguang</creatorcontrib><creatorcontrib>Sun, Kun</creatorcontrib><creatorcontrib>Jing, Jiwu</creatorcontrib><creatorcontrib>Ma, Siyuan</creatorcontrib><creatorcontrib>Wang, Jie</creatorcontrib><creatorcontrib>Huang, Heqing</creatorcontrib><title>Condo: Enhancing Container Isolation Through Kernel Permission Data Protection</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Container technology is widely adopted due to its features such as light weight and ease of rapid deployment. However, as an OS-level virtualization mechanism, container isolation relies on the kernel's security mechanisms and the kernel permission data (usually non-control flow data) used by these mechanisms. None of the existing mitigation schemes for non-control flow data attacks provide an effective and practical solution to container security since they either trigger too much overhead, have limited effectiveness over attacks launched in specific ways, or can only be used to protect some specific kernel data. In addition, none of them accurately identify the kernel data associated with container isolation. In this paper, we provide a solution called Condo that enhances container isolation by protecting the associated kernel permission data. We first present a generic non-control flow kernel data protection mechanism that protects different types of kernel data uniformly with low overhead and is not limited by attack methods or data types. We then demystify the models of various kernel access control mechanisms in the container environment, and identify the subject and object permission data that are critical to container isolation. Finally, we provide a solution named Condo to enhance container isolation, which is completely transparent to the existing container ecosystem, including containerized applications and container management/orchestration tools such as Docker. Experimental results show that Condo can effectively reduce the compromises of container isolation due to memory corruption attacks with an acceptable overhead.</description><subject>Access control</subject><subject>Codes</subject><subject>Container</subject><subject>Containers</subject><subject>data integrity</subject><subject>isolation</subject><subject>Kernel</subject><subject>Linux</subject><subject>Security</subject><subject>trusted execution environment</subject><subject>Virtualization</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkFFLwzAQx4MoOKcfQPAh4HNnLkmz1jeZmw6HDpzPIU2vW8eWzKR98NvbsiE-3XH3-9_Bj5BbYCMAlj-s5rPPEWdcjoQEyCE9IwNIU5UoxuH8rwdxSa5i3DImJahsQN4n3pX-kU7dxjhbuzXtBo2pHQY6j35nmto7utoE36439A2Dwx1dYtjXMfabZ9MYugy-QduT1-SiMruIN6c6JF-z6Wrymiw-XuaTp0ViuVRNwscIRY6oeJlZFMBtyZCZTForSsU5FpUqsErLMRfGIJSVhCLLYWyBMa6MGJL7491D8N8txkZvfRtc91ILpnIFMlNpR8GRssHHGLDSh1DvTfjRwHSvTffadK9Nn7R1mbtjpkbEf3yacp5n4hf9h2mp</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Xu, Shouyin</creator><creator>Wang, Yuewu</creator><creator>Lei, Lingguang</creator><creator>Sun, Kun</creator><creator>Jing, Jiwu</creator><creator>Ma, Siyuan</creator><creator>Wang, Jie</creator><creator>Huang, Heqing</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-3409-6149</orcidid><orcidid>https://orcid.org/0009-0006-7095-600X</orcidid><orcidid>https://orcid.org/0000-0002-0841-1045</orcidid><orcidid>https://orcid.org/0000-0003-4152-2107</orcidid><orcidid>https://orcid.org/0000-0002-1936-0562</orcidid><orcidid>https://orcid.org/0009-0003-5170-1253</orcidid></search><sort><creationdate>2024</creationdate><title>Condo: Enhancing Container Isolation Through Kernel Permission Data Protection</title><author>Xu, Shouyin ; Wang, Yuewu ; Lei, Lingguang ; Sun, Kun ; Jing, Jiwu ; Ma, Siyuan ; Wang, Jie ; Huang, Heqing</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-27e1b9ee62d8ce312cd0e0a84cc3d622ebf6bef5d723aae1df41b8917c10026a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Codes</topic><topic>Container</topic><topic>Containers</topic><topic>data integrity</topic><topic>isolation</topic><topic>Kernel</topic><topic>Linux</topic><topic>Security</topic><topic>trusted execution environment</topic><topic>Virtualization</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Shouyin</creatorcontrib><creatorcontrib>Wang, Yuewu</creatorcontrib><creatorcontrib>Lei, Lingguang</creatorcontrib><creatorcontrib>Sun, Kun</creatorcontrib><creatorcontrib>Jing, Jiwu</creatorcontrib><creatorcontrib>Ma, Siyuan</creatorcontrib><creatorcontrib>Wang, Jie</creatorcontrib><creatorcontrib>Huang, Heqing</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xu, Shouyin</au><au>Wang, Yuewu</au><au>Lei, Lingguang</au><au>Sun, Kun</au><au>Jing, Jiwu</au><au>Ma, Siyuan</au><au>Wang, Jie</au><au>Huang, Heqing</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Condo: Enhancing Container Isolation Through Kernel Permission Data Protection</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2024</date><risdate>2024</risdate><volume>19</volume><spage>6168</spage><epage>6183</epage><pages>6168-6183</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Container technology is widely adopted due to its features such as light weight and ease of rapid deployment. However, as an OS-level virtualization mechanism, container isolation relies on the kernel's security mechanisms and the kernel permission data (usually non-control flow data) used by these mechanisms. None of the existing mitigation schemes for non-control flow data attacks provide an effective and practical solution to container security since they either trigger too much overhead, have limited effectiveness over attacks launched in specific ways, or can only be used to protect some specific kernel data. In addition, none of them accurately identify the kernel data associated with container isolation. In this paper, we provide a solution called Condo that enhances container isolation by protecting the associated kernel permission data. We first present a generic non-control flow kernel data protection mechanism that protects different types of kernel data uniformly with low overhead and is not limited by attack methods or data types. We then demystify the models of various kernel access control mechanisms in the container environment, and identify the subject and object permission data that are critical to container isolation. Finally, we provide a solution named Condo to enhance container isolation, which is completely transparent to the existing container ecosystem, including containerized applications and container management/orchestration tools such as Docker. Experimental results show that Condo can effectively reduce the compromises of container isolation due to memory corruption attacks with an acceptable overhead.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2024.3411915</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-3409-6149</orcidid><orcidid>https://orcid.org/0009-0006-7095-600X</orcidid><orcidid>https://orcid.org/0000-0002-0841-1045</orcidid><orcidid>https://orcid.org/0000-0003-4152-2107</orcidid><orcidid>https://orcid.org/0000-0002-1936-0562</orcidid><orcidid>https://orcid.org/0009-0003-5170-1253</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2024, Vol.19, p.6168-6183 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_3069614865 |
source | IEEE Electronic Library (IEL) |
subjects | Access control Codes Container Containers data integrity isolation Kernel Linux Security trusted execution environment Virtualization |
title | Condo: Enhancing Container Isolation Through Kernel Permission Data Protection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T04%3A37%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Condo:%20Enhancing%20Container%20Isolation%20Through%20Kernel%20Permission%20Data%20Protection&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Xu,%20Shouyin&rft.date=2024&rft.volume=19&rft.spage=6168&rft.epage=6183&rft.pages=6168-6183&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2024.3411915&rft_dat=%3Cproquest_RIE%3E3069614865%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3069614865&rft_id=info:pmid/&rft_ieee_id=10552298&rfr_iscdi=true |