Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is Container
4
Container vs VMS
5
Darker
6
Darker Hub
7
Security Challenges
8
AppArmor
9
Circum
10
Container Threat Model
11
Assumptions
12
Remote Attacks
13
Container Attacks
14
Container Characteristics
15
Darken File
16
Console Log
17
RightToLog
18
Demo
19
Key Control System Call
20
Performance Hit
21
Performance Hit 2
22
Application Types
23
Static Analysis
24
Challenges
25
Practical Considerations
26
Value of Twister
27
Questions
Description:
Explore container security through system call profiling in this 53-minute conference talk from AppSecUSA 2016. Dive into the differences between containers and virtual machines, understanding the unique security challenges posed by shared OS kernels. Learn how to develop accurate system call profiles using static analysis of container images and host system knowledge. Discover techniques for runtime monitoring and protection against malicious behavior with minimal performance overhead. Follow along as the speaker demonstrates system call profiling on a sample micro-service application, showcasing its effectiveness in detecting behavioral anomalies with low false positives. Gain insights into practical considerations, challenges, and the value of this non-intrusive approach for hardening and isolating containerized applications.

Protect Containerized Applications with System Call Profiling

OWASP Foundation
Add to list
0:00 / 0:00