Automatic AppArmor management for Docker containers
☆16Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for docker-sec
Users that are interested in docker-sec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Feb 22, 2016Updated 10 years ago
- Provide a trusted platform for with Image Encryption capabilities with secure key delivery and management based in root of trust and host…☆10Jul 21, 2020Updated 5 years ago
- Open Air Interface EPC's MME, HSS, PWG & SGW☆15Oct 12, 2017Updated 8 years ago
- ☆13Mar 25, 2021Updated 4 years ago
- For paper Container-IMA: https://www.usenix.org/system/files/raid2019-luo.pdf☆12Mar 12, 2020Updated 6 years ago
- ☆11Oct 14, 2022Updated 3 years ago
- Time_series_forecasting in R using ARIMA,Auto ARIMA ,Arimax and Holt Winters☆22Nov 14, 2017Updated 8 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- A tiny Debugger : - )☆10Jan 24, 2021Updated 5 years ago
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Kubernetes Operator for Redis cluster based on Undermoon☆27Feb 11, 2023Updated 3 years ago
- A demo helps you have a quick start to Tencent Cloud Mesh 🚀☆11Sep 9, 2022Updated 3 years ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆38Nov 14, 2024Updated last year
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Trusted Service Identity is closing the gap of preventing access to secrets by an untrusted operator during the process of obtaining auth…☆27Sep 17, 2025Updated 6 months ago
- A GPU-accelerated DNN inference serving system that supports instant kernel preemption and biased concurrent execution in GPU scheduling.☆43May 29, 2022Updated 3 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- ☆13Oct 8, 2021Updated 4 years ago
- The Volcano Descheduler☆24Jan 24, 2025Updated last year
- ☆13Oct 17, 2021Updated 4 years ago
- HBM is an application to authorize and manage authorized docker commands using Docker AuthZ plugin☆45May 24, 2019Updated 6 years ago
- A container engine from scratch in C language, without any LXC or Docker☆18Jun 17, 2022Updated 3 years ago
- A PSO based Task Scheduling which has been compared against Random Scheduling☆31May 24, 2019Updated 6 years ago
- competition☆16Aug 1, 2020Updated 5 years ago
- ☆11Oct 10, 2024Updated last year
- This tool set can generate SECCOMP profiles for Docker images. It mainly relies on static analysis, making its results more reliable than…☆70May 3, 2022Updated 3 years ago
- Code supporting capabilities blog☆20Sep 25, 2019Updated 6 years ago
- Trustzone vexpress helloworld example☆18May 1, 2016Updated 9 years ago
- CoAP-to-HTTP translator proxy☆69Oct 10, 2019Updated 6 years ago
- 如何使用ARIMA模型预测世界肺炎确诊人数?【时序数据预测】☆40Apr 5, 2020Updated 5 years ago
- ☆21Updated this week
- eBPF-based SYN Flood Detector☆23Oct 9, 2020Updated 5 years ago
- Dragonball-sandbox is a collection of Rust crates to help build custom Virtual Machine Monitors and hypervisors.☆94Jul 17, 2023Updated 2 years ago
- Meta framework for providing digital provenance and integrity to documents.☆64Mar 4, 2025Updated last year
- ☆28Nov 16, 2021Updated 4 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago