{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:01:24Z","timestamp":1742983284541,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_13","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"132-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Overview of a Robot as a Service Platform"],"prefix":"10.1007","author":[{"given":"Laura","family":"Fern\u00e1ndez-Becerra","sequence":"first","affiliation":[]},{"given":"David","family":"Fern\u00e1ndez Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"given":"\u00c1ngel Manuel","family":"Guerrero-Higueras","sequence":"additional","affiliation":[]},{"given":"Francisco Javier","family":"Rodr\u00edguez Lera","sequence":"additional","affiliation":[]},{"given":"Camino","family":"Fern\u00e1ndez-Llamas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"13_CR1","unstructured":"Chapter 8. Linux Capabilities and Seccomp Red Hat Enterprise Linux Atomic Host 7 | Red Hat Customer Portal. \nhttps:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux_atomic_host\/7\/html\/container_security_guide\/linux_capabilities_and_seccomp"},{"key":"13_CR2","unstructured":"Introducci\u00f3n a AppArmor. \nhttps:\/\/debian-handbook.info\/browse\/es-ES\/stable\/sect.apparmor.html"},{"key":"13_CR3","unstructured":"Linux Capabilities. \nhttp:\/\/man7.org\/linux\/man-pages\/man7\/capabilities.7.html"},{"key":"13_CR4","unstructured":"SELinux y control de acceso obligatorio | INCIBE-CERT. \nhttps:\/\/www.incibe-cert.es\/blog\/selinux-y-control-de-acceso-obligatorio"},{"key":"13_CR5","unstructured":"Espacios de nombres. \nhttps:\/\/lwn.net\/Articles\/531114\/(2013)\n\n. Accessed 30 Nov 2019"},{"key":"13_CR6","unstructured":"Grupos de control. \nhttp:\/\/man7.org\/linux\/man-pages\/man7\/cgroups.7.html(2013)\n\n. Accessed 09 Dec 2019"},{"key":"13_CR7","unstructured":"Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O\u2019keeffe, D., Stillwell, M.L., Goltzsche, D., Eyers, D., Kapitza, R., Pietzuch, P., Fetzer, C.: This paper is included in the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016). Open access to the Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. SCONE: Secure Linux Containers with Intel SGX SCONE: Secure Linux Containers with Intel SGX (2016). \nhttps:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Babar, M.A.: Understanding container isolation mechanisms for building security-sensitive private cloud data exfiltration incident analysis view project (2017). \nhttps:\/\/doi.org\/10.13140\/RG.2.2.34040.85769\n\n. \nhttps:\/\/www.researchgate.net\/publication\/316602321","DOI":"10.13140\/RG.2.2.34040.85769"},{"key":"13_CR9","unstructured":"Bui, T.: Analysis of docker security. Tech. rep., Aalto University (2015). \nhttps:\/\/arxiv.org\/pdf\/1501.02967.pdf"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Chelladhurai, J., Chelliah, P.R., Kumar, S.A.: Securing docker containers from denial of service (DoS) attacks. In: 2016 IEEE International Conference on Services Computing (SCC), pp. 856\u2013859. IEEE (June 2016). \nhttps:\/\/doi.org\/10.1109\/SCC.2016.123\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/7557545\/","DOI":"10.1109\/SCC.2016.123"},{"issue":"5","key":"13_CR11","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCC.2016.100","volume":"3","author":"T Combe","year":"2016","unstructured":"Combe, T., Martin, A., Di Pietro, R.: To docker or not to docker: a security perspective. IEEE Cloud Comput. 3(5), 54\u201362 (2016). \nhttps:\/\/doi.org\/10.1109\/MCC.2016.100\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/7742298\/","journal-title":"IEEE Cloud Comput."},{"issue":"6","key":"13_CR12","doi-asserted-by":"publisher","first-page":"2927","DOI":"10.1109\/TLA.2016.7555277","volume":"14","author":"A Corbi","year":"2016","unstructured":"Corbi, A., Burgos, D.: OERaaS: open educational resources as a service with the help of virtual containers. IEEE Lat. Am. Trans. 14(6), 2927\u20132933 (2016). \nhttps:\/\/doi.org\/10.1109\/TLA.2016.7555277","journal-title":"IEEE Lat. Am. Trans."},{"key":"13_CR13","doi-asserted-by":"publisher","unstructured":"Felter, W., Ferreira, A., Rajamony, R., Rubio, J.: An updated performance comparison of virtual machines and Linux containers. In: 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp. 171\u2013172. IEEE (March 2015). \nhttps:\/\/doi.org\/10.1109\/ISPASS.2015.7095802\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/7095802\/","DOI":"10.1109\/ISPASS.2015.7095802"},{"key":"13_CR14","doi-asserted-by":"publisher","unstructured":"Gao, X., Gu, Z., Kayaalp, M., Pendarakis, D., Wang, H.: ContainerLeaks: emerging security threats of information leakages in container clouds. In: 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 237\u2013248. IEEE (June 2017). \nhttps:\/\/doi.org\/10.1109\/DSN.2017.49\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/8023126\/","DOI":"10.1109\/DSN.2017.49"},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"Godlove, D.: Singularity. In: ACM International Conference Proceeding Series. Association for Computing Machinery (July 2019). \nhttps:\/\/doi.org\/10.1145\/3332186.3332192","DOI":"10.1145\/3332186.3332192"},{"key":"13_CR16","unstructured":"Grattafiori, A.: Understanding and hardening Linux containers. NCC Group (2016). \nhttps:\/\/www.nccgroup.trust\/globalassets\/our-research\/us\/whitepapers\/2016\/april\/ncc_group_understanding_hardening_linux_containers-1-1.pdf"},{"key":"13_CR17","unstructured":"Hertz, J.: Abusing privileged and unprivileged Linux containers (2016). \nhttps:\/\/www.nccgroup.trust\/globalassets\/our-research\/us\/whitepapers\/2016\/june\/abusing-privileged-and-unprivileged-linux-containers.pdf"},{"key":"13_CR18","unstructured":"Hofmann, S.: Docker container images with \u201cheadless\u201d VNC session (2019). \nhttps:\/\/github.com\/ConSol\/docker-headless-vnc-container"},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Jian, Z., Chen, L.: A defense method against docker escape attack. In: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy - ICCSP 2017, pp. 142\u2013146. ACM Press, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3058060.3058085\n\n. \nhttp:\/\/dl.acm.org\/citation.cfm?doid=3058060.3058085","DOI":"10.1145\/3058060.3058085"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"Kang, H., Le, M., Tao, S.: Container and microservice driven design for cloud infrastructure DevOps. In: Proceedings - 2016 IEEE International Conference on Cloud Engineering, IC2E 2016: Co-Located with the 1st IEEE International Conference on Internet-of-Things Design and Implementation, IoTDI 2016, pp. 202\u2013211. Institute of Electrical and Electronics Engineers Inc. (June 2016). \nhttps:\/\/doi.org\/10.1109\/IC2E.2016.26","DOI":"10.1109\/IC2E.2016.26"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Lin, X., Lei, L., Wang, Y., Jing, J., Sun, K., Zhou, Q.: A measurement study on Linux container security: attacks and countermeasures. In: Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC 2018, pp. 418\u2013429. ACM Press, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3274694.3274720\n\n. \nhttp:\/\/dl.acm.org\/citation.cfm?doid=3274694.3274720","DOI":"10.1145\/3274694.3274720"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.comcom.2018.03.011","volume":"122","author":"A Martin","year":"2018","unstructured":"Martin, A., Raponi, S., Combe, T., Di Pietro, R.: Docker ecosystem-vulnerability analysis. Comput. Commun. 122, 30\u201343 (2018). \nhttps:\/\/doi.org\/10.1016\/j.comcom.2018.03.011","journal-title":"Comput. Commun."},{"key":"13_CR23","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0124-3","author":"JP Martin","year":"2018","unstructured":"Martin, J.P., Kandasamy, A., Chandrasekaran, K.: Exploring the support for high performance applications in the container runtime environment. Hum.-Centric Comput. Inf. Sci. (2018). \nhttps:\/\/doi.org\/10.1186\/s13673-017-0124-3","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"13_CR24","doi-asserted-by":"publisher","unstructured":"Morabito, R., Kj\u00e4llman, J., Komu, M.: Hypervisors vs. lightweight virtualization: a performance comparison. In: Proceedings - 2015 IEEE International Conference on Cloud Engineering, IC2E 2015, pp. 386\u2013393. Institute of Electrical and Electronics Engineers Inc. (2015). \nhttps:\/\/doi.org\/10.1109\/IC2E.2015.74","DOI":"10.1109\/IC2E.2015.74"},{"key":"13_CR25","volume-title":"Docker Security","author":"A Mouat","year":"2015","unstructured":"Mouat, A.: Docker Security. O\u2019Reilly Media Inc., Sebastopol (2015)"},{"key":"13_CR26","unstructured":"Quigley, M., Conley, K., Gerkey, B., Faust, J., Foote, T., Leibs, J., Wheeler, R., Ng, A.Y.: ROS: an open-source robot operating system. In: ICRA Workshop on Open Source Software, vol. 3, p. 5, Kobe, Japan (2009)"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Reshetova, E., Karhunen, J., Nyman, T., Asokan, N.: Security of OS-level virtualization technologies. Technical report (July 2014). \nhttp:\/\/arxiv.org\/abs\/1407.4245","DOI":"10.1007\/978-3-319-11599-3_5"},{"key":"13_CR28","doi-asserted-by":"publisher","unstructured":"Shu, R., Gu, X., Enck, W.: A study of security vulnerabilities on docker hub. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY 2017, pp. 269\u2013280. ACM Press, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3029806.3029832\n\n. \nhttp:\/\/dl.acm.org\/citation.cfm?doid=3029806.3029832","DOI":"10.1145\/3029806.3029832"},{"key":"13_CR29","unstructured":"Wetter, D.: Docker threat modeling and top 10 (2018). \nhttps:\/\/owasp.org\/www-chapter-belgium\/assets\/2018\/2018-09-07\/Dirk_Wetter_-_Docker_Security_Brussels.pdf\n\n. Accessed 12 Feb 2020"},{"key":"13_CR30","doi-asserted-by":"publisher","unstructured":"Younge, A.J., Pedretti, K., Grant, R.E., Brightwell, R.: A tale of two systems: using containers to deploy HPC applications on supercomputers and clouds. In: 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 74\u201381. IEEE (December 2017). \nhttps:\/\/doi.org\/10.1109\/CloudCom.2017.40\n\n. \nhttp:\/\/ieeexplore.ieee.org\/document\/8241093\/","DOI":"10.1109\/CloudCom.2017.40"},{"key":"13_CR31","doi-asserted-by":"publisher","unstructured":"Zerouali, A., Mens, T., Robles, G., Gonzalez-Barahona, J.M.: On the relation between outdated docker containers, severity vulnerabilities, and bugs. In: SANER 2019 - Proceedings of the 2019 IEEE 26th International Conference on Software Analysis, Evolution, and Reengineering, pp. 491\u2013501. Institute of Electrical and Electronics Engineers Inc. (March 2019). \nhttps:\/\/doi.org\/10.1109\/SANER.2019.8668013","DOI":"10.1109\/SANER.2019.8668013"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:10:35Z","timestamp":1599477035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}