Analysis and Improvement of Heterogeneous Hardware Support in Docker Images

05/06/2021
by   Panagiotis Gkikopoulos, et al.
0

Docker images are used to distribute and deploy cloud-native applications in containerised form. A container engine runs them with separated privileges according to namespaces. Recent studies have investigated security vulnerabilities and runtime characteristics of Docker images. In contrast, little is known about the extent of hardware-dependent features in them such as processor-specific trusted execution environments, graphics acceleration or extension boards. This problem can be generalised to missing knowledge about the extent of any hardware-bound instructions within the images that may require elevated privileges. We first conduct a systematic one-year evolution analysis of a sample of Docker images concerning their use of hardware-specific features. To improve the state of technology, we contribute novel tools to manage such images. Our heuristic hardware dependency detector and a hardware-aware Docker executor give early warnings upon missing dependencies instead of leading to silent or untimely failures. Our dataset and tools are released to the research community.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/11/2019

SoK: Hardware Security Support for Trustworthy Execution

In recent years, there have emerged many new hardware mechanisms for imp...
research
12/08/2022

HyperEnclave: An Open and Cross-platform Trusted Execution Environment

A number of trusted execution environments (TEEs) have been proposed by ...
research
06/17/2022

WaTZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone

WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gai...
research
06/11/2021

Acceleration-as-a-μService: A Cloud-native Monte-Carlo Option Pricing Engine on CPUs, GPUs and Disaggregated FPGAs

The evolution of cloud applications into loosely-coupled microservices o...
research
06/12/2018

Efficient Characterization of Hidden Processor Memory Hierarchies

A processor's memory hierarchy has a major impact on the performance of ...
research
04/01/2023

Scalable Attestation of Virtualized Execution Environments in Hybrid- and Multi-Cloud

Existing attestation mechanisms lack scalability and support for heterog...
research
08/12/2023

Making Your Program Oblivious: a Comparative Study for Side-channel-safe Confidential Computing

Trusted Execution Environments (TEEs) are gradually adopted by major clo...

Please sign up or login with your details

Forgot password? Click here to reset