[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Regular Section
Understanding File System Operations of a Secure Container Runtime Using System Call Tracing Technique
Sunwoo JANGYoung-Kyoon SUHByungchul TAK
Author information
JOURNAL FREE ACCESS

2024 Volume E107.D Issue 2 Pages 229-233

Details
Abstract

This letter presents a technique that observes system call mapping behavior of the proxy kernel layer of secure container runtimes. We applied it to file system operations of a secure container runtime, gVisor. We found that gVisor's operations can become more expensive than the native by 48× more syscalls for open, and 6× for read and write.

Content from these authors
© 2024 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top