Lic-Sec: An enhanced AppArmor Docker security profile generator Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1016/j.jisa.2021.102924
Along with the rapid development of cloud computing technology, containerization technology has drawn much attention from both industry and academia. In this paper, we perform a comparative measurement analysis of Docker-sec, which is a Linux Security Module proposed in 2018, and a new AppArmor profile generator called Lic-Sec, which combines Docker-sec with a modified version of LiCShield, which is also a Linux Security Module proposed in 2015. Docker-sec and LiCShield can be used to enhance Docker container security based on mandatory access control and allows protection of the container without manual configurations. Lic-Sec brings together their strengths and provides stronger protection. We evaluate the effectiveness and performance of Docker-sec and Lic-Sec by testing them with real-world attacks. We generate an exploit database with 40 exploits effective on Docker containers selected from the latest 400 exploits on Exploit-DB. We launch these exploits on containers spawned with Docker-sec and Lic-Sec separately. Our evaluations show that for demanding images, Lic-Sec gives protection for all privilege escalation attacks for which Docker-sec and LiCShield failed to give protection.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.jisa.2021.102924
- OA Status
- hybrid
- Cited By
- 31
- References
- 76
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3089573742
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3089573742Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.jisa.2021.102924Digital Object Identifier
- Title
-
Lic-Sec: An enhanced AppArmor Docker security profile generatorWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-07-15Full publication date if available
- Authors
-
Hui Zhu, Christian GehrmannList of authors in order
- Landing page
-
https://doi.org/10.1016/j.jisa.2021.102924Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.jisa.2021.102924Direct OA link when available
- Concepts
-
Generator (circuit theory), Computer science, Operating system, Physics, Thermodynamics, Power (physics)Top concepts (fields/topics) attached by OpenAlex
- Cited by
-
31Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 8, 2024: 4, 2023: 10, 2022: 7, 2021: 2Per-year citation counts (last 5 years)
- References (count)
-
76Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3089573742 |
|---|---|
| doi | https://doi.org/10.1016/j.jisa.2021.102924 |
| ids.doi | https://doi.org/10.1016/j.jisa.2021.102924 |
| ids.mag | 3089573742 |
| ids.openalex | https://openalex.org/W3089573742 |
| fwci | 3.24538223 |
| type | article |
| title | Lic-Sec: An enhanced AppArmor Docker security profile generator |
| biblio.issue | |
| biblio.volume | 61 |
| biblio.last_page | 102924 |
| biblio.first_page | 102924 |
| topics[0].id | https://openalex.org/T11424 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9995999932289124 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Security and Verification in Computing |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9991000294685364 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9965999722480774 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list.value | 3140 |
| apc_list.currency | USD |
| apc_list.value_usd | 3140 |
| apc_paid.value | 3140 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 3140 |
| concepts[0].id | https://openalex.org/C2780992000 |
| concepts[0].level | 3 |
| concepts[0].score | 0.5593034625053406 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q17016113 |
| concepts[0].display_name | Generator (circuit theory) |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.46054738759994507 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C111919701 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3318285346031189 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[2].display_name | Operating system |
| concepts[3].id | https://openalex.org/C121332964 |
| concepts[3].level | 0 |
| concepts[3].score | 0.24734702706336975 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[3].display_name | Physics |
| concepts[4].id | https://openalex.org/C97355855 |
| concepts[4].level | 1 |
| concepts[4].score | 0.05377155542373657 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q11473 |
| concepts[4].display_name | Thermodynamics |
| concepts[5].id | https://openalex.org/C163258240 |
| concepts[5].level | 2 |
| concepts[5].score | 0.05114549398422241 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q25342 |
| concepts[5].display_name | Power (physics) |
| keywords[0].id | https://openalex.org/keywords/generator |
| keywords[0].score | 0.5593034625053406 |
| keywords[0].display_name | Generator (circuit theory) |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.46054738759994507 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/operating-system |
| keywords[2].score | 0.3318285346031189 |
| keywords[2].display_name | Operating system |
| keywords[3].id | https://openalex.org/keywords/physics |
| keywords[3].score | 0.24734702706336975 |
| keywords[3].display_name | Physics |
| keywords[4].id | https://openalex.org/keywords/thermodynamics |
| keywords[4].score | 0.05377155542373657 |
| keywords[4].display_name | Thermodynamics |
| keywords[5].id | https://openalex.org/keywords/power |
| keywords[5].score | 0.05114549398422241 |
| keywords[5].display_name | Power (physics) |
| language | en |
| locations[0].id | doi:10.1016/j.jisa.2021.102924 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210191536 |
| locations[0].source.issn | 2214-2126, 2214-2134 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2214-2126 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Journal of Information Security and Applications |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Journal of Information Security and Applications |
| locations[0].landing_page_url | https://doi.org/10.1016/j.jisa.2021.102924 |
| locations[1].id | pmh:oai:lup.lub.lu.se:31628bce-9790-406f-b24b-55b43668ee2b |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306400536 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Lund University Publications (Lund University) |
| locations[1].source.host_organization | https://openalex.org/I187531555 |
| locations[1].source.host_organization_name | Lund University |
| locations[1].source.host_organization_lineage | https://openalex.org/I187531555 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | text |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | ISSN: 2214-2126 |
| locations[1].landing_page_url | https://lup.lub.lu.se/record/31628bce-9790-406f-b24b-55b43668ee2b |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101543278 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7214-348X |
| authorships[0].author.display_name | Hui Zhu |
| authorships[0].affiliations[0].raw_affiliation_string | Networks and Security |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Hui Zhu |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Networks and Security |
| authorships[1].author.id | https://openalex.org/A5044464349 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-8003-200X |
| authorships[1].author.display_name | Christian Gehrmann |
| authorships[1].affiliations[0].raw_affiliation_string | Networks and Security |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Christian Gehrmann |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Networks and Security |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.jisa.2021.102924 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Lic-Sec: An enhanced AppArmor Docker security profile generator |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11424 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9995999932289124 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Security and Verification in Computing |
| related_works | https://openalex.org/W2390459957, https://openalex.org/W2382986841, https://openalex.org/W2354060507, https://openalex.org/W2371792015, https://openalex.org/W2388417751, https://openalex.org/W2356629573, https://openalex.org/W2356762897, https://openalex.org/W2746742710, https://openalex.org/W2121854243, https://openalex.org/W2375354128 |
| cited_by_count | 31 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 8 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 4 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 10 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 7 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 2 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1016/j.jisa.2021.102924 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210191536 |
| best_oa_location.source.issn | 2214-2126, 2214-2134 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2214-2126 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Journal of Information Security and Applications |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Journal of Information Security and Applications |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.jisa.2021.102924 |
| primary_location.id | doi:10.1016/j.jisa.2021.102924 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210191536 |
| primary_location.source.issn | 2214-2126, 2214-2134 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2214-2126 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Journal of Information Security and Applications |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Journal of Information Security and Applications |
| primary_location.landing_page_url | https://doi.org/10.1016/j.jisa.2021.102924 |
| publication_date | 2021-07-15 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2023953679, https://openalex.org/W2792590405, https://openalex.org/W6754130643, https://openalex.org/W6767171302, https://openalex.org/W6752293416, https://openalex.org/W6686176908, https://openalex.org/W1997199359, https://openalex.org/W2550874390, https://openalex.org/W6685993614, https://openalex.org/W6754288653, https://openalex.org/W2917742639, https://openalex.org/W6629953387, https://openalex.org/W2735218636, https://openalex.org/W6737205931, https://openalex.org/W6726010343, https://openalex.org/W6736720128, https://openalex.org/W6730426483, https://openalex.org/W6733357793, https://openalex.org/W4254813302, https://openalex.org/W6673773265, https://openalex.org/W6740537518, https://openalex.org/W6786114068, https://openalex.org/W3001760383, https://openalex.org/W2609361788, https://openalex.org/W6723537187, https://openalex.org/W2936268283, https://openalex.org/W6743333422, https://openalex.org/W6761310672, https://openalex.org/W6767091274, https://openalex.org/W2598200822, https://openalex.org/W6760938797, https://openalex.org/W6775040310, https://openalex.org/W3012308217, https://openalex.org/W1805474074, https://openalex.org/W2182584490, https://openalex.org/W2965604779, https://openalex.org/W2750660893, https://openalex.org/W2885261823, https://openalex.org/W2924430850, https://openalex.org/W2093460657, https://openalex.org/W2954388734, https://openalex.org/W2495742203, https://openalex.org/W2605904959, https://openalex.org/W2612836460, https://openalex.org/W2797538974, https://openalex.org/W2921999452, https://openalex.org/W2968031544, https://openalex.org/W4234385687, https://openalex.org/W2911518933, https://openalex.org/W4241695501, https://openalex.org/W2889069524, https://openalex.org/W2184107019, https://openalex.org/W4242872455, https://openalex.org/W4242725419, https://openalex.org/W4248852793, https://openalex.org/W4367048761, https://openalex.org/W2902718458, https://openalex.org/W4298218030, https://openalex.org/W3105926382, https://openalex.org/W2513765047, https://openalex.org/W4235670907, https://openalex.org/W4252254358, https://openalex.org/W4206207437, https://openalex.org/W4301409763, https://openalex.org/W2586202584, https://openalex.org/W4250981728, https://openalex.org/W4238975435, https://openalex.org/W4248020059, https://openalex.org/W4238227316, https://openalex.org/W2792674929, https://openalex.org/W2561955909, https://openalex.org/W2807826660, https://openalex.org/W2730329620, https://openalex.org/W1504669610, https://openalex.org/W2971226509, https://openalex.org/W4248074231 |
| referenced_works_count | 76 |
| abstract_inverted_index.a | 25, 33, 41, 52, 60 |
| abstract_inverted_index.40 | 123 |
| abstract_inverted_index.In | 20 |
| abstract_inverted_index.We | 101, 117, 137 |
| abstract_inverted_index.an | 119 |
| abstract_inverted_index.be | 71 |
| abstract_inverted_index.by | 111 |
| abstract_inverted_index.in | 38, 65 |
| abstract_inverted_index.is | 32, 58 |
| abstract_inverted_index.of | 5, 29, 55, 86, 107 |
| abstract_inverted_index.on | 79, 126, 135, 141 |
| abstract_inverted_index.to | 73, 170 |
| abstract_inverted_index.we | 23 |
| abstract_inverted_index.400 | 133 |
| abstract_inverted_index.Our | 149 |
| abstract_inverted_index.all | 160 |
| abstract_inverted_index.and | 18, 40, 68, 83, 97, 105, 109, 146, 167 |
| abstract_inverted_index.can | 70 |
| abstract_inverted_index.for | 153, 159, 164 |
| abstract_inverted_index.has | 11 |
| abstract_inverted_index.new | 42 |
| abstract_inverted_index.the | 2, 87, 103, 131 |
| abstract_inverted_index.also | 59 |
| abstract_inverted_index.both | 16 |
| abstract_inverted_index.from | 15, 130 |
| abstract_inverted_index.give | 171 |
| abstract_inverted_index.much | 13 |
| abstract_inverted_index.show | 151 |
| abstract_inverted_index.that | 152 |
| abstract_inverted_index.them | 113 |
| abstract_inverted_index.this | 21 |
| abstract_inverted_index.used | 72 |
| abstract_inverted_index.with | 1, 51, 114, 122, 144 |
| abstract_inverted_index.2015. | 66 |
| abstract_inverted_index.2018, | 39 |
| abstract_inverted_index.Along | 0 |
| abstract_inverted_index.Linux | 34, 61 |
| abstract_inverted_index.based | 78 |
| abstract_inverted_index.cloud | 6 |
| abstract_inverted_index.drawn | 12 |
| abstract_inverted_index.gives | 157 |
| abstract_inverted_index.rapid | 3 |
| abstract_inverted_index.their | 95 |
| abstract_inverted_index.these | 139 |
| abstract_inverted_index.which | 31, 48, 57, 165 |
| abstract_inverted_index.Docker | 75, 127 |
| abstract_inverted_index.Module | 36, 63 |
| abstract_inverted_index.access | 81 |
| abstract_inverted_index.allows | 84 |
| abstract_inverted_index.brings | 93 |
| abstract_inverted_index.called | 46 |
| abstract_inverted_index.failed | 169 |
| abstract_inverted_index.latest | 132 |
| abstract_inverted_index.launch | 138 |
| abstract_inverted_index.manual | 90 |
| abstract_inverted_index.paper, | 22 |
| abstract_inverted_index.Lic-Sec | 92, 110, 147, 156 |
| abstract_inverted_index.attacks | 163 |
| abstract_inverted_index.control | 82 |
| abstract_inverted_index.enhance | 74 |
| abstract_inverted_index.exploit | 120 |
| abstract_inverted_index.images, | 155 |
| abstract_inverted_index.perform | 24 |
| abstract_inverted_index.profile | 44 |
| abstract_inverted_index.spawned | 143 |
| abstract_inverted_index.testing | 112 |
| abstract_inverted_index.version | 54 |
| abstract_inverted_index.without | 89 |
| abstract_inverted_index.AppArmor | 43 |
| abstract_inverted_index.Lic-Sec, | 47 |
| abstract_inverted_index.Security | 35, 62 |
| abstract_inverted_index.analysis | 28 |
| abstract_inverted_index.attacks. | 116 |
| abstract_inverted_index.combines | 49 |
| abstract_inverted_index.database | 121 |
| abstract_inverted_index.evaluate | 102 |
| abstract_inverted_index.exploits | 124, 134, 140 |
| abstract_inverted_index.generate | 118 |
| abstract_inverted_index.industry | 17 |
| abstract_inverted_index.modified | 53 |
| abstract_inverted_index.proposed | 37, 64 |
| abstract_inverted_index.provides | 98 |
| abstract_inverted_index.security | 77 |
| abstract_inverted_index.selected | 129 |
| abstract_inverted_index.stronger | 99 |
| abstract_inverted_index.together | 94 |
| abstract_inverted_index.LiCShield | 69, 168 |
| abstract_inverted_index.academia. | 19 |
| abstract_inverted_index.attention | 14 |
| abstract_inverted_index.computing | 7 |
| abstract_inverted_index.container | 76, 88 |
| abstract_inverted_index.demanding | 154 |
| abstract_inverted_index.effective | 125 |
| abstract_inverted_index.generator | 45 |
| abstract_inverted_index.mandatory | 80 |
| abstract_inverted_index.privilege | 161 |
| abstract_inverted_index.strengths | 96 |
| abstract_inverted_index.Docker-sec | 50, 67, 108, 145, 166 |
| abstract_inverted_index.LiCShield, | 56 |
| abstract_inverted_index.containers | 128, 142 |
| abstract_inverted_index.escalation | 162 |
| abstract_inverted_index.protection | 85, 158 |
| abstract_inverted_index.real-world | 115 |
| abstract_inverted_index.technology | 10 |
| abstract_inverted_index.Docker-sec, | 30 |
| abstract_inverted_index.Exploit-DB. | 136 |
| abstract_inverted_index.comparative | 26 |
| abstract_inverted_index.development | 4 |
| abstract_inverted_index.evaluations | 150 |
| abstract_inverted_index.measurement | 27 |
| abstract_inverted_index.performance | 106 |
| abstract_inverted_index.protection. | 100, 172 |
| abstract_inverted_index.separately. | 148 |
| abstract_inverted_index.technology, | 8 |
| abstract_inverted_index.effectiveness | 104 |
| abstract_inverted_index.configurations. | 91 |
| abstract_inverted_index.containerization | 9 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 93 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/9 |
| sustainable_development_goals[0].score | 0.6700000166893005 |
| sustainable_development_goals[0].display_name | Industry, innovation and infrastructure |
| citation_normalized_percentile.value | 0.93088402 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |