TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Assessing Unikernel Security [pdf]

53 点作者 liuw大约 6 年前

3 条评论

tptacek大约 6 年前
This paper is pretty excellent. In particular I sort of love that they included a &quot;Hypothesis&quot; section that laid out what their expectations about security were.<p>They set out to confirm a hunch that despite reducing attack surface by using stripped-down kernels, unikernel applications would be less secure than containerized applications because the unikernels would have relatively primitive runtime security, compared to Linux container systems which inherit two decades of countermeasure work.<p>They tested IncludeOS and Rumprun and found both to have approximately 1998-levels of runtime hardening. IncludeOS in particular was a steaming crater at the end; a stack overflow on IncludeOS could write directly into the (writeable!) program text, and the NULL page was writeable and executable.
评论 #19744030 未加载
jdc大约 6 年前
Only covers Rumprun and IncludeOS - not Unikernels in general
评论 #19804274 未加载
tilt_error大约 6 年前
I assume Nabla and Solo5 would be scoring great in this (type of) test?
评论 #19746222 未加载