{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:25:35Z","timestamp":1771611935482,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"P2020","award":["POCI-01-0247- FEDER-039598"],"award-info":[{"award-number":["POCI-01-0247- FEDER-039598"]}]},{"name":"EU H2020-SU-ICT-03-2018","award":["830929"],"award-info":[{"award-number":["830929"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3429885.3429966","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T03:59:53Z","timestamp":1610423993000},"page":"31-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Container Hardening Through Automated Seccomp Profiling"],"prefix":"10.1145","author":[{"given":"Nuno","family":"Lopes","sequence":"first","affiliation":[{"name":"University of Porto, Portugal"}]},{"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[{"name":"University of Porto, Portugal"}]},{"given":"Manuel Eduardo","family":"Correia","sequence":"additional","affiliation":[{"name":"University of Porto, Portugal"}]},{"given":"S\u00e9rgio","family":"Serrano","sequence":"additional","affiliation":[{"name":"Talkdesk, USA"}]},{"given":"Francisco","family":"Nunes","sequence":"additional","affiliation":[{"name":"Talkdesk, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,1,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2600239.2600241"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3357034.3357054"},{"key":"e_1_3_2_1_3_1","volume-title":"net, May","author":"Corbet J.","year":"2009","unstructured":"J. Corbet , \"Seccomp and sandboxing,\" LWN. net, May , vol. 25 , 2009 . J. Corbet, \"Seccomp and sandboxing,\" LWN. net, May, vol. 25, 2009."},{"key":"e_1_3_2_1_4_1","unstructured":"M. Caceres \"Syscall proxying-simulating remote execution \" Core Security Technologies 2002.  M. Caceres \"Syscall proxying-simulating remote execution \" Core Security Technologies 2002."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366615.3368356"},{"key":"e_1_3_2_1_6_1","volume-title":"specialized in defending isolation","author":"\u0394\u03ae\u03bco\u03c5 P.","year":"2019","unstructured":"P. \u0394\u03ae\u03bco\u03c5 , \"Automatic security hardening of docker containers using mandatory access control , specialized in defending isolation ,\" 2019 . P. \u0394\u03ae\u03bco\u03c5, \"Automatic security hardening of docker containers using mandatory access control, specialized in defending isolation,\" 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361422"},{"key":"e_1_3_2_1_8_1","first-page":"146","volume-title":"Least privilege in separation kernels,\" in International Conference on E-Business and Telecommunication Networks","author":"Levin T. E.","year":"2006","unstructured":"T. E. Levin , C. E. Irvine , and T. D. Nguyen , \" Least privilege in separation kernels,\" in International Conference on E-Business and Telecommunication Networks , pp. 146 -- 157 , Springer , 2006 . T. E. Levin, C. E. Irvine, and T. D. Nguyen, \"Least privilege in separation kernels,\" in International Conference on E-Business and Telecommunication Networks, pp. 146--157, Springer, 2006."},{"key":"e_1_3_2_1_9_1","first-page":"101","article-title":"Multiple instances of the global linux namespaces","volume":"1","author":"Biederman E. W.","year":"2006","unstructured":"E. W. Biederman and L. Networx , \" Multiple instances of the global linux namespaces ,\" in Proceedings of the Linux Symposium , vol. 1 , pp. 101 -- 112 , Citeseer, 2006 . E. W. Biederman and L. Networx, \"Multiple instances of the global linux namespaces,\" in Proceedings of the Linux Symposium, vol. 1, pp. 101--112, Citeseer, 2006.","journal-title":"Proceedings of the Linux Symposium"},{"key":"e_1_3_2_1_10_1","volume-title":"May","volume":"186","author":"Rosen R.","year":"2013","unstructured":"R. Rosen , \"Resource management : Linux kernel namespaces and cgroups,\" Haifux , May , vol. 186 , 2013 . R. Rosen, \"Resource management: Linux kernel namespaces and cgroups,\" Haifux, May, vol. 186, 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"cadvisor and collectd,\" tech. rep","author":"Makai J.","year":"2015","unstructured":"J. Makai , \"New solutions in it monitoring : cadvisor and collectd,\" tech. rep ., 2015 . J. Makai, \"New solutions in it monitoring: cadvisor and collectd,\" tech. rep., 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/155870.155881"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Creating complex network services with ebpf: Experience and lessons learned,\" in 2018 IEEE 19th International Conference on High Performance Switching and Routing (HPSR)","author":"Miano S.","year":"2018","unstructured":"S. Miano , M. Bertrone , F. Risso , M. Tumolo , and M. V. Bernal , \" Creating complex network services with ebpf: Experience and lessons learned,\" in 2018 IEEE 19th International Conference on High Performance Switching and Routing (HPSR) , pp. 1 -- 8 , IEEE , 2018 . S. Miano, M. Bertrone, F. Risso, M. Tumolo, and M. V. Bernal, \"Creating complex network services with ebpf: Experience and lessons learned,\" in 2018 IEEE 19th International Conference on High Performance Switching and Routing (HPSR), pp. 1--8, IEEE, 2018."},{"key":"e_1_3_2_1_14_1","volume-title":"ATL-COM-SOFT-2019-015","author":"Heinrich L.","year":"2019","unstructured":"L. Heinrich , T. Maeno , A. Forti , and P. Nilsson , \" Continuous analysis-user containers on the grid,\" tech. rep ., ATL-COM-SOFT-2019-015 , 2019 . L. Heinrich, T. Maeno, A. Forti, and P. Nilsson, \"Continuous analysis-user containers on the grid,\" tech. rep., ATL-COM-SOFT-2019-015, 2019."},{"key":"e_1_3_2_1_15_1","unstructured":"\"Cve-2018-11776.\" https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-11776. (Last accessed: 14.04.2020).  \"Cve-2018-11776.\" https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-11776. (Last accessed: 14.04.2020)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2601790"},{"key":"e_1_3_2_1_17_1","unstructured":"\"Seclists.\" https:\/\/github.com\/danielmiessler\/SecLists. (Last accessed: 19.05.2020).  \"Seclists.\" https:\/\/github.com\/danielmiessler\/SecLists. (Last accessed: 19.05.2020)."},{"key":"e_1_3_2_1_18_1","unstructured":"\"Cve-2019-11043.\" https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11043. (Last accessed: 14.04.2020).  \"Cve-2019-11043.\" https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11043. (Last accessed: 14.04.2020)."},{"key":"e_1_3_2_1_19_1","unstructured":"\"Cve-2016-10033.\" https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-10033. (Last accessed: 14.04.2020).  \"Cve-2016-10033.\" https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-10033. (Last accessed: 14.04.2020)."}],"event":{"name":"Middleware '20: 21st International Middleware Conference","location":"Delft Netherlands","acronym":"Middleware '20","sponsor":["ACM Association for Computing Machinery","IFIP"]},"container-title":["Proceedings of the 2020 6th International Workshop on Container Technologies and Container Clouds"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429885.3429966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429885.3429966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:45Z","timestamp":1750195905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429885.3429966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":19,"alternative-id":["10.1145\/3429885.3429966","10.1145\/3429885"],"URL":"https:\/\/doi.org\/10.1145\/3429885.3429966","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2021-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}