2018
DOI: 10.1145/3296957.3173213
|View full text |Cite
|
Sign up to set email alerts
|

DATS - Data Containers for Web Applications

Abstract: Data containers enable users to control access to their data while untrusted applications compute on it. However, they require replicating an application inside each containercompromising functionality, programmability, and performance. We propose DATS-a system to run web applications that retains application usability and efficiency through a mix of hardware capability enhanced containers and the introduction of two new primitives modeled after the popular model-view-controller (MVC) pattern. (1) DATS introdu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…• Inside container: We tested 4 exploits. Among these, 3 of them (CVE-2017-7308 15 , CVE-2017-6074 16 and CVE-2017-1000112 17 require capability SYS ADMIN to launch and 1 (CVE-2016-9793 18 ) requires capability NET ADMIN. If none of these capabilities are given to the container, all of these attacks fail.…”
Section: Analysis Of Privilege Escalation Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…• Inside container: We tested 4 exploits. Among these, 3 of them (CVE-2017-7308 15 , CVE-2017-6074 16 and CVE-2017-1000112 17 require capability SYS ADMIN to launch and 1 (CVE-2016-9793 18 ) requires capability NET ADMIN. If none of these capabilities are given to the container, all of these attacks fail.…”
Section: Analysis Of Privilege Escalation Attacksmentioning
confidence: 99%
“…There are some researches proposing security countermeasure or algorithm against a particular attack category of container. This includes special investigations on DoS attacks [12], container escape attacks [19], attacks from the underlying compromised higher-privileged system software such as the OS kernel and the hypervisor [2], covert channels attacks [24] and the application level attacks [18]. In [12], Chelladhurai et.…”
Section: Performancementioning
confidence: 99%
See 1 more Smart Citation