A Security Perspective on Unikernels

11/14/2019
by   Joshua Talbot, et al.
0

Cloud-based infrastructures have grown in popularity over the last decade leveraging virtualisation, server, storage, compute power and network components to develop flexible applications. The requirements for instantaneous deployment and reduced costs have led the shift from virtual machine deployment to containerisation, increasing the overall flexibility of applications and increasing performances. However, containers require a fully fleshed operating system to execute, increasing the attack surface of an application. Unikernels, on the other hand, provide a lightweight memory footprint, ease of application packaging and reduced start-up times. Moreover, Unikernels reduce the attack surface due to the self-contained environment only enabling low-level features. In this work, we provide an exhaustive description of the unikernel ecosystem; we demonstrate unikernel vulnerabilities and further discuss the security implications of Unikernel-enabled environments through different use-cases.

READ FULL TEXT
research
02/28/2018

i2kit: A Tool for Immutable Infrastructure Deployments based on Lightweight Virtual Machines specialized to run Containers

Container technologies, like Docker, are becoming increasingly popular. ...
research
11/19/2022

Investigating the Security of EV Charging Mobile Applications As an Attack Surface

The adoption rate of EVs has witnessed a significant increase in recent ...
research
04/12/2013

Survey of Server Virtualization

Virtualization is a term that refers to the abstraction of computer reso...
research
11/22/2021

Threat Modeling and Security Analysis of Containers: A Survey

Traditionally, applications that are used in large and small enterprises...
research
05/26/2020

Study of Firecracker MicroVM

Firecracker is a virtualization technology that makes use of Kernel Virt...
research
09/06/2019

Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications

Due to the ability to overcome the geospatial limitations and to the pos...
research
06/24/2023

HODOR: Shrinking Attack Surface on Node.js via System Call Limitation

Node.js provides Node.js applications with system interaction capabiliti...

Please sign up or login with your details

Forgot password? Click here to reset