{"id":"https://openalex.org/W4388857882","doi":"https://doi.org/10.1145/3576915.3623154","title":"Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation","display_name":"Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388857882","doi":"https://doi.org/10.1145/3576915.3623154"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3623154","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100382323","display_name":"Zhi Li","orcid":"https://orcid.org/0000-0002-9510-1888"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Li","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100668780","display_name":"Weijie Liu","orcid":"https://orcid.org/0000-0002-3054-766X"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijie Liu","raw_affiliation_strings":["Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066976667","display_name":"XiaoFeng Wang","orcid":"https://orcid.org/0000-0002-0607-4946"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"XiaoFeng Wang","raw_affiliation_strings":["Indiana University Bloomington, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University Bloomington, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076311357","display_name":"Bin Yuan","orcid":"https://orcid.org/0000-0002-5365-904X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yuan","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100563445","display_name":"Hongliang Tian","orcid":"https://orcid.org/0009-0005-1248-4078"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongliang Tian","raw_affiliation_strings":["Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049135681","display_name":"Shoumeng Yan","orcid":"https://orcid.org/0009-0007-9580-5395"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shoumeng Yan","raw_affiliation_strings":["Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Beijing, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.352,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.606989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":68,"max":79},"biblio":{"volume":null,"issue":null,"first_page":"3063","last_page":"3077"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.73792464},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation","score":0.69153255},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.44277203}],"concepts":[{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.88916457},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.73792464},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.69153255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.66542625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.58701605},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.47036976},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44387162},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.44277203},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.26148045},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18837866},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.16376919},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.08595538},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3623154","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62202191, 62032008"}],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W194304868","https://openalex.org/W2076346686","https://openalex.org/W2101849888","https://openalex.org/W258616657","https://openalex.org/W2605904959","https://openalex.org/W2753365392","https://openalex.org/W2765797110","https://openalex.org/W2792590405","https://openalex.org/W2902718458","https://openalex.org/W2914982603","https://openalex.org/W2971660263","https://openalex.org/W2985907279","https://openalex.org/W3119574277","https://openalex.org/W4220866844","https://openalex.org/W4236881562"],"related_works":["https://openalex.org/W3157230915","https://openalex.org/W3118510577","https://openalex.org/W2947584067","https://openalex.org/W2370114625","https://openalex.org/W230721595","https://openalex.org/W2280562859","https://openalex.org/W2062873522","https://openalex.org/W1883246888","https://openalex.org/W1756374135","https://openalex.org/W1496728123"],"abstract_inverted_index":{"Filesystem":[0],"isolation":[1,27],"enforced":[2],"by":[3,22],"today's":[4,189],"container":[5,23,86,129,159,190],"technology":[6],"has":[7,28],"been":[8,40],"found":[9],"to":[10,30,42,69,83,96,123,132,145,148,156,173,183],"be":[11,43,97,143],"less":[12],"effective":[13],"in":[14,76],"the":[15,50,57,62,66,90,92,117,126,178,184],"presence":[16],"of":[17,33,78,112,128,187,196],"host-container":[18,150],"interactions":[19],"increasingly":[20],"utilized":[21],"tools.":[24],"This":[25],"weakened":[26],"led":[29],"a":[31,100],"type":[32],"path":[34],"misresolution":[35],"(Pamir)":[36],"vulnerabilities,":[37],"which":[38],"have":[39],"considered":[41],"highly":[44],"risky":[45],"and":[46,65,88,169],"continuously":[47],"reported":[48],"over":[49],"years.":[51],"In":[52],"this":[53],"paper,":[54],"we":[55,104],"present":[56],"first":[58],"systematic":[59],"study":[60,114],"on":[61,136],"Pamir":[63,93,118],"risk":[64,119],"existing":[67],"fixes":[68],"related":[70],"vulnerabilities.":[71],"Our":[72],"research":[73],"reveals":[74],"that":[75,116,158],"spite":[77],"significant":[79],"efforts":[80],"being":[81],"made":[82],"patch":[84,174],"vulnerable":[85],"tools":[87,160,191],"address":[89],"risk,":[91],"vulnerabilities":[94],"continue":[95],"discovered,":[98],"including":[99],"new":[101],"vulnerability":[102],"(CVE-2023-0778)":[103],"rediscovered":[105],"from":[106],"patched":[107],"software.":[108],"A":[109],"key":[110],"insight":[111],"our":[113],"is":[115,120,198],"inherently":[121],"hard":[122],"prevent":[124],"at":[125],"level":[127],"tools,":[130],"due":[131,182],"their":[133,167,175],"heavy":[134],"reliance":[135],"third-party":[137,152],"components.":[138],"While":[139],"security":[140,163],"inspections":[141],"should":[142,161],"applied":[144],"all":[146,195],"components":[147,188],"mediate":[149],"interactions,":[151],"component":[153],"developers":[154],"tend":[155],"believe":[157],"perform":[162],"checks":[164],"before":[165],"invoking":[166],"components,":[168],"are":[170],"therefore":[171],"reluctant":[172],"code":[176],"with":[177],"container-specific":[179],"protection.":[180],"Moreover,":[181],"large":[185],"number":[186],"depend":[192],"on,":[193],"re-implementing":[194],"them":[197],"impractical.":[199]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4388857882","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2024-12-13T16:08:52.910145","created_date":"2023-11-22"}