Cross Container Attacks: The Bewildered eBPF on Clouds.
Yi HeRoland GuoYunlong XingXijia CheKun SunZhuotao LiuKe XuQi LiPublished in: USENIX Security Symposium (2023)
Keyphrases
- countermeasures
- cloud computing
- security protocols
- malicious users
- attack detection
- watermarking scheme
- computer security
- traffic analysis
- real time
- secure routing
- malicious attacks
- denial of service attacks
- container terminal
- watermarking technique
- watermarking algorithm
- database
- security flaws
- differential power analysis