{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:27:40Z","timestamp":1770229660016,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"SERICS","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]},{"name":"RAISE","award":["ECS00000035"],"award-info":[{"award-number":["ECS00000035"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670884","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6932-3199","authenticated-orcid":false,"given":"Marco","family":"Zuppelli","sequence":"first","affiliation":[{"name":"National Research Council of Italy - Institute for Applied Mathematics and Information Technologies, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7711-9833","authenticated-orcid":false,"given":"Massimo","family":"Guarascio","sequence":"additional","affiliation":[{"name":"National Research Council of Italy - Institute for High Performance Computing and Networking, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6466-3354","authenticated-orcid":false,"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[{"name":"National Research Council of Italy - Institute for Applied Mathematics and Information Technologies, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9402-7375","authenticated-orcid":false,"given":"Angelica","family":"Liguori","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Modeling, Electronics, and Systems, National Research Council of Italy - Institute for High Performance Computing and Networking, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DockerChannel: A framework for Evaluating Information Leakages of Docker Containers. SoftwareX 24","author":"Cambiaso Enrico","year":"2023","unstructured":"Enrico Cambiaso, Luca Caviglione, and Marco Zuppelli. 2023. DockerChannel: A framework for Evaluating Information Leakages of Docker Containers. SoftwareX 24 (2023), 101576:1\u2013101576:7."},{"key":"e_1_3_2_1_2_1","volume-title":"Programmable Data Gathering for Detecting Stegomalware. In 2020 6th IEEE Conference on Network Softwarization. IEEE, 422\u2013429","author":"Carrega Alessandro","year":"2020","unstructured":"Alessandro Carrega, Luca Caviglione, Matteo Repetto, and Marco Zuppelli. 2020. Programmable Data Gathering for Detecting Stegomalware. In 2020 6th IEEE Conference on Network Softwarization. IEEE, 422\u2013429."},{"key":"e_1_3_2_1_3_1","volume-title":"The State-of-the-art in Container Technologies: Application, Orchestration and Security. Concurrency and Computation: Practice and Experience 32, 17","author":"Casalicchio Emiliano","year":"2020","unstructured":"Emiliano Casalicchio and Stefano Iannucci. 2020. The State-of-the-art in Container Technologies: Application, Orchestration and Security. Concurrency and Computation: Practice and Experience 32, 17 (2020), e5668:1\u2013e5668:17."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3164392"},{"key":"e_1_3_2_1_5_1","volume-title":"Containerleaks: Emerging Security Threats of Information Leakages in Container Clouds. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. IEEE, 237\u2013248","author":"Gao Xing","year":"2017","unstructured":"Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, and Haining Wang. 2017. Containerleaks: Emerging Security Threats of Information Leakages in Container Clouds. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. IEEE, 237\u2013248."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2879605"},{"key":"e_1_3_2_1_7_1","volume-title":"Deep Learning. Encyclopedia of Bioinformatics and Computational Biology: ABC of Bioinformatics 1-3","author":"Guarascio Massimo","year":"2018","unstructured":"Massimo Guarascio, Giuseppe Manco, and Ettore Ritacco. 2018. Deep Learning. Encyclopedia of Bioinformatics and Computational Biology: ABC of Bioinformatics 1-3 (2018), 634\u2013647."},{"key":"e_1_3_2_1_8_1","volume-title":"Reducing the Dimensionality of Data with Neural Networks. Science 313, 5786","author":"Hinton Geoffrey","year":"2006","unstructured":"Geoffrey Hinton and Ruslan Salakhutdinov. 2006. Reducing the Dimensionality of Data with Neural Networks. Science 313, 5786 (2006), 504 \u2013 507."},{"key":"e_1_3_2_1_9_1","volume-title":"Deep Learning. Nature 521, 7553","author":"Le\u00a0Cun Yann","year":"2015","unstructured":"Yann Le\u00a0Cun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep Learning. Nature 521, 7553 (2015), 436\u2013444."},{"key":"e_1_3_2_1_10_1","volume-title":"Whispers Between the Containers: High-capacity Covert Channel Attacks in Docker. In 2016 IEEE Trustcom\/BigDataSE\/ISPA","author":"Luo Yang","unstructured":"Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, and Zhonghai Wu. 2016. Whispers Between the Containers: High-capacity Covert Channel Attacks in Docker. In 2016 IEEE Trustcom\/BigDataSE\/ISPA. IEEE, 630\u2013637."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300022"},{"key":"e_1_3_2_1_12_1","volume-title":"Secure Inter-Container Communications Using XDP\/eBPF","author":"Nam Jaehyun","year":"2022","unstructured":"Jaehyun Nam, Seungsoo Lee, Phillip Porras, Vinod Yegneswaran, and Seungwon Shin. 2022. Secure Inter-Container Communications Using XDP\/eBPF. IEEE\/ACM Transactions on Networking (2022)."},{"key":"e_1_3_2_1_13_1","volume-title":"Confine: Fine-grained System Call Filtering for Container Attack Surface Reduction. Computers & Security 132","author":"Rostamipoor Maryam","year":"2023","unstructured":"Maryam Rostamipoor, Seyedhamed Ghavamnia, and Michalis Polychronakis. 2023. Confine: Fine-grained System Call Filtering for Container Attack Surface Reduction. Computers & Security 132 (2023), 103325:1\u2013103325:15."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.032"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421357"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.111"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911732"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3599957.3606222"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684195"},{"key":"e_1_3_2_1_20_1","volume-title":"Attack Analysis, and Mitigation Strategies. Computers & Security 128","author":"Wong Ann\u00a0Yi","year":"2023","unstructured":"Ann\u00a0Yi Wong, Eyasu\u00a0Getahun Chekole, Mart\u00edn Ochoa, and Jianying Zhou. 2023. On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies. Computers & Security 128 (2023), 103140:1\u2013103140:20."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381828"},{"key":"e_1_3_2_1_22_1","volume-title":"Overcoming Security Challenges in Microservice Architectures. In 2018 IEEE Symposium on Service-Oriented System Engineering. IEEE, 11\u201320","author":"Yarygina Tetiana","year":"2018","unstructured":"Tetiana Yarygina and Anya\u00a0Helene Bagge. 2018. Overcoming Security Challenges in Microservice Architectures. In 2018 IEEE Symposium on Service-Oriented System Engineering. IEEE, 11\u201320."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487075.3487182"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50011-9_28"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"e_1_3_2_1_26_1","volume-title":"Information Leakages of Docker Containers: Characterization and Mitigation Strategies. In 2023 IEEE 9th International Conference on Network Softwarization. IEEE, 462\u2013467","author":"Zuppelli Marco","year":"2023","unstructured":"Marco Zuppelli, Matteo Repetto, Luca Caviglione, and Enrico Cambiaso. 2023. Information Leakages of Docker Containers: Characterization and Mitigation Strategies. In 2023 IEEE 9th International Conference on Network Softwarization. IEEE, 462\u2013467."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3176752"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:55:38Z","timestamp":1755881738000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":27,"alternative-id":["10.1145\/3664476.3670884","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670884","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}