skip to main content
10.1145/3642977.3652097acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
short-paper
Free Access

Serverless Confidential Containers: Challenges and Opportunities

Published:22 April 2024Publication History

ABSTRACT

Serverless computing allows users to execute pieces of code (so called functions) on-demand in the cloud without having to provision any hardware resources. However, by executing in the cloud and delegating control over hardware resources, the integrity of the execution and the confidentiality of function code and data are at the mercy of the cloud provider and serverless runtime. Confidential computing aims to remove trust from the cloud provider by executing applications inside hardware enclaves. In spite of the increasing adoption of confidential computing, designing a confidential serverless runtime with moderate performance overhead remains an open challenge.

In this short article we present our experience porting the Knative serverless runtime to a confidential setting using Confidential Containers (CoCo), a technology that allows the execution of unmodified (encrypted) container images inside confidential VMs (cVMs). Our results show that cVMs are not ready to execute container-based serverless functions. Starting a serverless function in a CoCo from an encrypted container image with attestation takes up to 17 seconds. Starting 16 serverless functions concurrently takes more than three minutes, 20× slower than its non-confidential counterpart. We analyze the main sources of overhead, and outline the research challenges to bridge the gap between confidential and serverless computing.

References

  1. 2021. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC.Google ScholarGoogle Scholar
  2. Mania Abdi, Samuel Ginzburg, Xiayue Charles Lin, Jose Faleiro, Gohar Irfan Chaudhry, Inigo Goiri, Ricardo Bianchini, Daniel S Berger, and Rodrigo Fonseca. 2023. Palette Load Balancing: Locality Hints for Serverless Functions. In Proceedings of the Eighteenth European Conference on Computer Systems (Rome, Italy) (EuroSys '23). Association for Computing Machinery, New York, NY, USA, 365--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alexandru Agache, Marc Brooker, Alexandra Iordache, Anthony Liguori, Rolf Neugebauer, Phil Piwonka, and Diana-Maria Popa. 2020. Firecracker: Lightweight Virtualization for Serverless Applications. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 419--434. https://www.usenix.org/conference/nsdi20/presentation/agacheGoogle ScholarGoogle Scholar
  4. Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, and Sean Peisert. 2021. Performance Analysis of Scientific Computing Workloads on General Purpose TEEs. 1066--1076. Google ScholarGoogle ScholarCross RefCross Ref
  5. Fritz Alder, N Asokan, Arseny Kurnikov, Andrew Paverd, and Michael Steiner. 2019. S-faas: Trustworthy and accountable function-as-a-service using intel SGX. In Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mohamed Alzayat, Jonathan Mace, Peter Druschel, and Deepak Garg. 2023. Groundhog: Efficient Request Isolation in FaaS. In Proceedings of the Eighteenth European Conference on Computer Systems (Rome, Italy) (EuroSys '23). Association for Computing Machinery, New York, NY, USA, 398--415. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. AMD. 2022. AMD Secure Encrypted Virtualization. https://developer.amd.com/sev/.Google ScholarGoogle Scholar
  8. AMD. 2023. Confidential Computing Performance - Google Cloud C2D VM Instances. https://www.amd.com/system/files/documents/3rd-gen-epyc-gcp-c2d-conf-compute-perf-brief.pdf.Google ScholarGoogle Scholar
  9. AMD. 2023. Microsoft Azure Confidential Computing Powered by 3rd Gen EPYC CPUs. https://community.amd.com/t5/epyc-processors/microsoft-azure-confidential-computing-powered-by-3rd-gen-epyc/ba-p/497796.Google ScholarGoogle Scholar
  10. AntStack. 2024. Serverless For Unstructured Data Problems in Life Sciences. https://www.antstack.com/blog/how-serverless-is-solving-unstructured-data-problem-for-life-sciences/.Google ScholarGoogle Scholar
  11. archlinux Wiki. 2024. init. https://wiki.archlinux.org/title/init.Google ScholarGoogle Scholar
  12. Arm. 2022. Arm TrustZone. https://www.arm.com/technologies/trustzone-for-cortex-a.Google ScholarGoogle Scholar
  13. Aws. 2024. Real-time fraud detection using AWS serverless and machine learning services. https://aws.amazon.com/blogs/machine-learning/real-time-fraud-detection-using-aws-serverless-and-machine-learning-services/.Google ScholarGoogle Scholar
  14. Microsoft Azure. 2024. Confidential Containers on Azure Container Instances. https://learn.microsoft.com/en-us/azure/container-instances/container-instances-confidential-overview.Google ScholarGoogle Scholar
  15. Maurice Bailleu, Dimitra Giantsidi, Vasilis Gavrielatos, Do Le Quoc, Vijay Nagarajan, and Pramod Bhatotia. 2021. Avocado: A Secure In-Memory Distributed Storage System. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). USENIX Association, 65--79. https://www.usenix.org/conference/atc21/presentation/bailleuGoogle ScholarGoogle Scholar
  16. James Bottomley. 2024. QEMU Mailing List - sev: enable secret injection to a self described area in OVMF. https://lore.kernel.org/qemu-devel/[email protected]/.Google ScholarGoogle Scholar
  17. Stefan Brenner and Rüdiger Kapitza. 2019. Trust more, serverless. In Proceedings of the 12th ACM International Conference on Systems and Storage.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Marc Brooker, Mike Danilov, Chris Greenwood, and Phil Piwonka. 2023. On-demand Container Loading in AWS Lambda. In 2023 USENIX Annual Technical Conference (USENIX ATC 23). USENIX Association, Boston, MA, 315--328. https://www.usenix.org/conference/atc23/presentation/brookerGoogle ScholarGoogle Scholar
  19. James Cadden, Thomas Unger, Yara Awad, Han Dong, Orran Krieger, and Jonathan Appavoo. 2020. SEUSS: Skip Redundant Paths to Make Serverless Fast. In Proceedings of the Fifteenth European Conference on Computer Systems (Heraklion, Greece) (EuroSys '20). Association for Computing Machinery, New York, NY, USA, Article 32, 15 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Google Cloud. 2022. Confidential Computing. https://cloud.google.com/confidential-computing.Google ScholarGoogle Scholar
  21. Google Cloud. 2022. Ubiquitous Data Encryption. https://cloud.google.com/compute/confidential-vm/docs/ubiquitous-data-encryption.Google ScholarGoogle Scholar
  22. Google Cloud. 2024. What is a Virtual Machine? https://cloud.google.com/learn/what-is-a-virtual-machine.Google ScholarGoogle Scholar
  23. Confidential Computing Consortium. 2022. Confidential Computing - Open Source Community. https://confidentialcomputing.io/.Google ScholarGoogle Scholar
  24. containerd. 2024. An industry-standard container runtime with an emphasis on simplicity, robustness and portability. https://containerd.io/.Google ScholarGoogle Scholar
  25. containerd. 2024. Runtime v2. https://github.com/containerd/containerd/tree/main/runtime/v2.Google ScholarGoogle Scholar
  26. Containers. 2024. OCIcrypt - Encryption libraries for OCI container images. https://github.com/containers/ocicrypt.Google ScholarGoogle Scholar
  27. Containers. 2024. Skopeo - Work with remote image registries. https://github.com/containers/skopeo.Google ScholarGoogle Scholar
  28. Confidential Containers. 2024. Attestation Agent. https://github.com/confidential-containers/guest-components/tree/main/attestation-agent.Google ScholarGoogle Scholar
  29. Confidential Containers. 2024. Confidential Containers - Overview. https://github.com/confidential-containers/confidential-containers/blob/main/overview.md.Google ScholarGoogle Scholar
  30. Confidential Containers. 2024. Generic Key Broker Service. https://github.com/confidential-containers/kbs.Google ScholarGoogle Scholar
  31. Confidential Containers. 2024. image-rs - Container Images Rust Crate. https://github.com/confidential-containers/guest-components/tree/main/image-rs.Google ScholarGoogle Scholar
  32. Confidential Containers. 2024. Key Broker Client. https://github.com/confidential-containers/guest-components/tree/main/attestation-agent/kbc.Google ScholarGoogle Scholar
  33. Confidential Containers. 2024. Welcome to Confidential Containers! https://confidentialcontainers.org/.Google ScholarGoogle Scholar
  34. Kata Containers. 2023. The speed of containers, the security of VMs. https://katacontainers.io/.Google ScholarGoogle Scholar
  35. Kata Containers. 2024. Kata Agent. https://github.com/kata-containers/kata-containers/blob/main/src/agent/README.md.Google ScholarGoogle Scholar
  36. Kata Containers. 2024. Kata Agent API - Github. https://github.com/kata-containers/kata-containers/blob/CCv0/src/runtime/virtcontainers/kata_agent.go_L2518-L2531.Google ScholarGoogle Scholar
  37. Kata Containers. 2024. Kata Containers Architecture. https://github.com/kata-containers/kata-containers/tree/main/docs/design/architecture.Google ScholarGoogle Scholar
  38. Kata Containers. 2024. Kata Open Policy Agent. https://github.com/kata-containers/kata-containers/tree/main/src/kata-opa.Google ScholarGoogle Scholar
  39. Open Containers. 2023. runc - CLI tool for spawning and running containers according to the OCI specification. https://github.com/opencontainers/runc.Google ScholarGoogle Scholar
  40. Open Containers. 2024. OCI Image Format Specification. https://github.com/opencontainers/image-spec.Google ScholarGoogle Scholar
  41. DockerHub. 2024. registry - Distribution implementation for storing and distributing container images and artifacts. https://hub.docker.com/_/registry.Google ScholarGoogle Scholar
  42. Knative Serving Docs. 2023. Hello World - Python. https://github.com/knative/docs/tree/main/code-samples/serving/hello-world/helloworld-python.Google ScholarGoogle Scholar
  43. enclave cc. 2024. Process-based Confidential Container Runtime. https://github.com/confidential-containers/enclave-cc.Google ScholarGoogle Scholar
  44. Sadjad Fouladi, Riad S. Wahby, Brennan Shacklett, Karthikeyan Vasuki Balasubramaniam, William Zeng, Rahul Bhalerao, Anirudh Sivaraman, George Porter, and Keith Winstein. 2017. Encoding, Fast and Slow: Low-Latency Video Processing Using Thousands of Tiny Threads. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA, 363--376. https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/fouladiGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  45. Anders Tungeland Gjerdrum, Håvard Dagenborg Johansen, Lars Brenna, and Dag Johansen. 2019. Diggi: A Secure Framework for Hosting Native Cloud Functions with Minimal Trust. In 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 18--27. Google ScholarGoogle ScholarCross RefCross Ref
  46. Gramine. 2024. Gramine Project - a library OS for Unmodified Applications. https://gramineproject.io/.Google ScholarGoogle Scholar
  47. Brendan Gregg. 2023. Flame Graphs. https://www.brendangregg.com/flamegraphs.html.Google ScholarGoogle Scholar
  48. Red Hat. 2024. Attestation in Confidential Computing. https://www.redhat.com/en/blog/attestation-confidential-computing.Google ScholarGoogle Scholar
  49. Red Hat. 2024. Confidential computing use cases. https://www.redhat.com/en/blog/confidential-computing-use-cases.Google ScholarGoogle Scholar
  50. Red Hat. 2024. Understanding the Confidential Containers Attestation Flow. https://www.redhat.com/en/blog/understanding-confidential-containers-attestation-flow.Google ScholarGoogle Scholar
  51. IBM. 2023. IBM Cloud. https://www.ibm.com/cloud.Google ScholarGoogle Scholar
  52. IBM. 2023. IBM Cloud Bare Metal Servers. https://www.ibm.com/products/bare-metal-servers.Google ScholarGoogle Scholar
  53. Apache Incubator. 2021. Teaclave. https://github.com/apache/incubator-teaclave.Google ScholarGoogle Scholar
  54. Intel. 2022. Intel Software Guard Extensions. https://www.intel.co.uk/content/www/uk/en/architecture-and-technology/software-guard-extensions.html.Google ScholarGoogle Scholar
  55. Intel. 2024. Intel TDX - CCC Linux Guest Hardening. https://intel.github.io/ccc-linux-guest-hardening-docs/security-spec.html.Google ScholarGoogle Scholar
  56. Intel. 2024. Intel Trust Domain Extensions. https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html.Google ScholarGoogle Scholar
  57. Vatche Ishakian, Vinod Muthusamy, and Aleksander Slominski. 2018. Serving Deep Learning Models in a Serverless Platform. In IEEE International Conference on Cloud Engineering, (IC2E).Google ScholarGoogle ScholarCross RefCross Ref
  58. Zhipeng Jia and Emmett Witchel. 2021. Boki: Stateful Serverless Computing with Shared Logs. In Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles (Virtual Event, Germany) (SOSP '21). Association for Computing Machinery, New York, NY, USA, 691--707. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Eric Jonas, Qifan Pu, Shivaram Venkataraman, Ion Stoica, and Benjamin Recht. 2017. Occupy the Cloud: Distributed Computing for the 99%. In ACM Symposium on Cloud Computing (SOCC).Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Artjom Joosen, Ahmed Hassan, Martin Asenov, Rajkarn Singh, Luke Darlow, Jianfeng Wang, and Adam Barker. 2023. How Does It Function? Characterizing Long-Term Trends in Production Serverless Workloads. In Proceedings of the 2023 ACM Symposium on Cloud Computing (, Santa Cruz, CA, USA,) (SoCC '23). Association for Computing Machinery, New York, NY, USA, 443--458. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. David Kaplan. 2016. AMD x86 Memory Encryption Technologies. USENIX Association, Austin, TX.Google ScholarGoogle Scholar
  62. David Kaplan. 2023. Hardware VM Isolation in the Cloud: Enabling confidential computing with AMD SEV-SNP technology. Queue 21, 4 (sep 2023), 49--67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Knative. 2024. Knative is an Open-Source Enterprise-level solution to build Serverless and Event Driven Applications. https://knative.dev/docs/.Google ScholarGoogle Scholar
  64. Knative. 2024. Knative Serving Architecture. https://knative.dev/docs/serving/architecture/.Google ScholarGoogle Scholar
  65. Knative. 2024. Tag Resolution. https://knative.dev/docs/serving/tag-resolution/.Google ScholarGoogle Scholar
  66. Kubernetes. 2024. CRI - Container Runtime Interface. https://kubernetes.io/docs/concepts/architecture/cri/.Google ScholarGoogle Scholar
  67. Kubernetes. 2024. kubelet. https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/.Google ScholarGoogle Scholar
  68. Linux KVM. 2024. Kernel Virtual Machine. https://linux-kvm.org/page/Main_Page.Google ScholarGoogle Scholar
  69. Ashraf Mahgoub, Edgardo Barsallo Yi, Karthick Shankar, Sameh Elnikety, Somali Chaterji, and Saurabh Bagchi. 2022. ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). USENIX Association, Carlsbad, CA, 303--320. https://www.usenix.org/conference/osdi22/presentation/mahgoubGoogle ScholarGoogle Scholar
  70. Linux manual page. 2024. namespaces. https://man7.org/linux/man-pages/man7/namespaces.7.html.Google ScholarGoogle Scholar
  71. Microsoft. 2020. Microsoft Azure Attestation. https://docs.microsoft.com/azure/attestation/overview.Google ScholarGoogle Scholar
  72. Microsoft. 2022. Microsoft Azure Confidential Computing. https://azure.microsoft.com/en-gb/solutions/confidential-compute/.Google ScholarGoogle Scholar
  73. Microsoft. 2023. Inside Look: How Azure Linux powers Confidential Containers on AKS. https://techcommunity.microsoft.com/t5/linux-and-open-source-blog/inside-look-how-azure-linux-powers-confidential-containers-on/ba-p/3981296.Google ScholarGoogle Scholar
  74. Microsoft. 2024. Azure Functions - Execute event-driven serverless code with an end-to-end development experience. https://azure.microsoft.com/en-us/products/functions/.Google ScholarGoogle Scholar
  75. Nydus. 2024. Nydus - Acceleration Framework For Container Image. https://nydus.dev/.Google ScholarGoogle Scholar
  76. QEMU Options. 2023. RAM. https://wiki.gentoo.org/wiki/QEMU/Options_RAM.Google ScholarGoogle Scholar
  77. OVMF. 2024. AMD SEV x64 Package. https://github.com/tianocore/edk2/blob/master/OvmfPkg/AmdSev/AmdSevX64.dsc.Google ScholarGoogle Scholar
  78. The Washington Post. 2024. NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html.Google ScholarGoogle Scholar
  79. Qemu. 2024. Qemu - A generic and open-source machine emulator and virtualizer. https://www.qemu.org/.Google ScholarGoogle Scholar
  80. Qemu. 2024. QEMU Firmware Configuration Device. https://www.qemu.org/docs/master/specs/fw_cfg.html.Google ScholarGoogle Scholar
  81. Quay. 2024. Quay Container Registry. https://quay.io/.Google ScholarGoogle Scholar
  82. Github Container Registry. 2024. Your packages, at home with their code. https://github.com/features/packages.Google ScholarGoogle Scholar
  83. IBM Research. 2024. LPC 2021 - Attestation and Secret Injection for Confidential VMs, Containers, and Pods. https://lpc.events/event/11/contributions/994/.Google ScholarGoogle Scholar
  84. Alireza Sahraei, Soteris Demetriou, Amirali Sobhgol, Haoran Zhang, Abhigna Nagaraja, Neeraj Pathak, Girish Joshi, Carla Souza, Bo Huang, Wyatt Cook, Andrii Golovei, Pradeep Venkat, Andrew Mcfague, Dimitrios Skarlatos, Vipul Patel, Ravinder Thind, Ernesto Gonzalez, Yun Jin, and Chunqiang Tang. 2023. XFaaS: Hyperscale and Low Cost Serverless Functions at Meta. 231--246. Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. SeaBIOS. 2023. SeaBIOS. https://www.seabios.org/SeaBIOS.Google ScholarGoogle Scholar
  86. Kaspersky Security. 2024. Downgrade Attack. https://encyclopedia.kaspersky.com/glossary/downgrade-attack/.Google ScholarGoogle Scholar
  87. Amazon Web Services. 2024. AWS Lambda - Run code without thinking of servers or clusters. https://aws.amazon.com/lambda/.Google ScholarGoogle Scholar
  88. Knative Serving. 2024. Configuring Scale to Zero. https://knative.dev/docs/serving/autoscaling/scale-to-zero/.Google ScholarGoogle Scholar
  89. Mohammad Shahrad, Rodrigo Fonseca, Inigo Goiri, Gohar Chaudhry, Paul Batum, Jason Cooke, Eduardo Laureano, Colby Tresness, Mark Russinovich, and Ricardo Bianchini. 2020. Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). USENIX Association, 205--218. https://www.usenix.org/conference/atc20/presentation/shahradGoogle ScholarGoogle Scholar
  90. Simon Shillaker and Peter Pietzuch. 2020. Faasm: Lightweight Isolation for Efficient Stateful Serverless Computing. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). USENIX Association, 419--433. https://www.usenix.org/conference/atc20/presentation/shillakerGoogle ScholarGoogle Scholar
  91. Sigstore. 2024. Cosign - Container Signing. https://github.com/sigstore/cosign.Google ScholarGoogle Scholar
  92. Brijesh Singh. 2024. [PATCH v9 00/43] Add AMD Secure Nested Paging (SEV-SNP) Guest Support. https://lore.kernel.org/linux-mm/[email protected]/t/.Google ScholarGoogle Scholar
  93. UEFI Platform Initialization Specification. 2023. Driver Execution Environment (DXE) Phase. https://uefi.org/specs/PI/1.8/V2_Overview.html.Google ScholarGoogle Scholar
  94. Edgless Systems. 2024. The world's most secure Kubernetes. https://www.edgeless.systems/products/constellation/.Google ScholarGoogle Scholar
  95. Tianocore. 2024. OVMF - Open Virtual Machine Firmware. https://github.com/tianocore/tianocore.github.io/wiki/OVMF.Google ScholarGoogle Scholar
  96. Bohdan Trach, Oleksii Oleksenko, Franz Gregor, Pramod Bhatotia, and Christof Fetzer. 2019. Clemmys: Towards secure remote execution in FaaS. In Proceedings of the 12th ACM International Conference on Systems and Storage.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. VirTEE. 2024. Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing. https://github.com/virtee/sev-snp-measure.Google ScholarGoogle Scholar
  98. VMWare. 2024. Introduction to vSockets. https://vdc-repo.vmware.com/vmwb-repository/dcr-public/a49be05e-fa6d-4da1-9186-922fbfef149e/a65f3c51-aaeb-476d-80c3-827b805c2f9e/doc/vsockAbout.3.2.html.Google ScholarGoogle Scholar
  99. Jinpeng Wei and Calton Pu. 2005. TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study. In 4th USENIX Conference on File and Storage Technologies (FAST 05). USENIX Association, San Francisco, CA. https://www.usenix.org/conference/fast-05/tocttou-vulnerabilities-unix-style-file-systems-anatomical-studyGoogle ScholarGoogle Scholar
  100. Xingda Wei, Fangming Lu, Tianxia Wang, Jinyu Gu, Yuhan Yang, Rong Chen, and Haibo Chen. 2023. No Provisioned Concurrency: Fast RDMA-codesigned Remote Fork for Serverless Computing. In 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). USENIX Association, Boston, MA, 497--517. https://www.usenix.org/conference/osdi23/presentation/wei-rdmaGoogle ScholarGoogle Scholar
  101. AMD Whitepaper. 2024. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https://www.amd.com/content/dam/amd/en/documents/epyc-business-docs/white-papers/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf.Google ScholarGoogle Scholar
  102. Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA, 283--298. https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/zhengGoogle ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Serverless Confidential Containers: Challenges and Opportunities
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SESAME '24: Proceedings of the 2nd Workshop on SErverless Systems, Applications and MEthodologies
          April 2024
          46 pages
          ISBN:9798400705458
          DOI:10.1145/3642977

          Copyright © 2024 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 April 2024

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper
        • Article Metrics

          • Downloads (Last 12 months)17
          • Downloads (Last 6 weeks)14

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader