Execution method for fine-grained sandbox strategy of Linux containers
A policy enforcement, fine-grained technology applied in the computer field to reduce the attack surface and reduce additional performance overhead
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and implementation examples. It should be understood that the described implementation examples are only used to illustrate and explain the present invention, and should not limit the scope of the present invention.
[0027] The invention proposes a fine-grained sandbox policy execution method for a Linux container. Specifically, at the system call level, a fine-grained sandbox policy is implemented. Fine-grainedness refers to limiting the system call type and parameters of the container. The parameter types include strings and non-strings, so as to achieve security reinforcement for Linux containers.
[0028] This method includes a container tracking module and a system call interception module, such as figure 1 shown. The container tracking module can...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com