正在加载图片...
SCONE threat model Assume a powerful and active adversary who has superuser access and also access to the physical hardware Attackers can control entire software stack Assume that container service were not designed with the above privileged attacker model in mindSCONE, threat model • Assume a powerful and active adversary who has superuser access and also access to the physical hardware. • Attackers can control entire software stack. • Assume that container service were not designed with the above privileged attacker model in mind
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有