SoK: Run-time security for cloud microservices. Are we there yet?

被引:5
|
作者
Minna, Francesco [1 ]
Massacci, Fabio [1 ,2 ]
机构
[1] Vrije Univ Amsterdam, NL-1081 HV Amsterdam, Netherlands
[2] Univ Trento, I-38123 Trento, Italy
关键词
Survey; Microservices; Containers; Security; Cloud;
D O I
10.1016/j.cose.2023.103119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The adoption of microservice architecture is rapidly growing, involving industries of every size. Their ability to scale and reconstitute complex functionalities into small, cohesive, and interconnected com-ponents (the microservices), and their limited use of isolation contribute to this success. Unfortunately but unsurprisingly, these very factors enlarge the attack surface and increase the security risks of today's deployments. In this study, we performed a systematization of knowledge about the run-time security of microservices. Starting from a keyword search, we initially reviewed 807 papers available in digital li-braries (e.g., Google Scholar and Scopus), which we filtered down to 48 by applying a number of selection criteria (e.g., the presence of a proof-of-concept implementation). We also considered over 30 industry tools that offer various security services for microservices. We categorized both papers and tools and highlighted areas where research is abundant, where it is lacking, and where it is misleading. We con-clude that the run-time security of microservices is still in its infancy and we supplement our analyses with insights into addressing the key challenges. (c) 2023 The Author(s). Published by Elsevier Ltd.
引用
收藏
页数:14
相关论文
共 42 条
  • [1] SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers
    Ugarte-Pedrero, Xabier
    Balzarotti, Davide
    Santos, Igor
    Bringas, Pablo G.
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 659 - 673
  • [2] Towards Independent Run-time Cloud Monitoring
    Klaver, Luuk
    van der Knaap, Thijs
    van der Geest, Johan
    Harmsma, Edwin
    van der Waaij, Bram
    Pileggi, Paolo
    [J]. COMPANION OF THE ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING, ICPE 2021, 2021, : 21 - 26
  • [3] Design for Run-Time Monitor on Cloud Computing
    Kang, Mikyung
    Kang, Dong-In
    Yun, Mira
    Park, Gyung-Leen
    Lee, Junghoon
    [J]. SECURITY-ENRICHED URBAN COMPUTING AND SMART GRID, 2010, 78 : 279 - +
  • [4] Design-Time to Run-Time Verification of Microservices Based Applications (Short Paper)
    Camilli, Matteo
    Bellettini, Carlo
    Capra, Lorenzo
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2017, 2018, 10729 : 168 - 173
  • [5] Run-Time Security Traceability for Evolving Systems
    Bauer, Andreas
    Juerjens, Jan
    Yu, Yijun
    [J]. COMPUTER JOURNAL, 2011, 54 (01): : 58 - 87
  • [6] An Ontology for run-time Verification of Security Certificates for SOA
    D'Agostini, Stefania
    Di Giacomo, Valentina
    Pandolfo, Claudia
    Presenza, Domenico
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 525 - 533
  • [7] Run-time security evaluation (RTSE) for distributed applications
    Serban, C
    McMillin, B
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 222 - 232
  • [8] Analysis and run-time verification of dynamic security policies
    Janicke, Helge
    Siewe, Frangois
    Jones, Kevin
    Cau, Antonio
    Zedan, Hussein
    [J]. DEFENCE APPLICATIONS OF MULTI-AGENT SYSTEMS, 2006, 3890 : 92 - 103
  • [9] Run-time Selection of Security Algorithms For Networked Devices
    Taddeo, Antonio Vincenzo
    Ferrante, Alberto
    [J]. Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 92 - 96
  • [10] Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
    Anagnostopoulos, Nikolaos Athanasios
    Arul, Tolga
    Fan, Yufan
    Hatzfeld, Christian
    Schaller, Andre
    Xiong, Wenjie
    Jain, Manishkumar
    Saleem, Muhammad Umair
    Lotichius, Jan
    Gabmeyer, Sebastian
    Szefer, Jakub
    Katzenbeisser, Stefan
    [J]. CRYPTOGRAPHY, 2018, 2 (03) : 1 - 45