Exploiting and Mitigating Information Leakage at the Container-Kernel Interface
Published in Under Review, 2025
Containers rely on the Linux kernel for resource management, scheduling, and I/O, creating a rich set of shared state that can be exploited as a side channel. In this paper, we systematically map the information leakage surface at the container-kernel interface, identify novel leakage vectors that persist even in hardened container configurations, and demonstrate practical attacks including co-residence detection and workload fingerprinting in serverless cloud environments. We also propose and evaluate kernel-level and runtime mitigations to reduce the leakage surface without breaking container semantics.
Recommended citation: D. R. Dipta, E. Marin, B. Gulmezoglu and T. Eisenbarth, "Exploiting and Mitigating Information Leakage at the Container-Kernel Interface." Under review.
