TY - JOUR
T1 - BEACON
T2 - Automatic container policy generation using environment-aware dynamic analysis
AU - Kang, Haney
AU - Marin, Eduard
AU - You, Myoungsung
AU - Perino, Diego
AU - Shin, Seungwon
AU - Kim, Jinwoo
N1 - Publisher Copyright:
© 2025 Elsevier Ltd
PY - 2026/3
Y1 - 2026/3
N2 - This paper introduces BEACON, a novel tool for the automated generation of adjustable container security policies. Unlike prior approaches, BEACON leverages dynamic analysis to simulate realistic environments, uncovering container execution paths that may remain hidden during the profiling phase. To address the challenge of exploring vast profiling spaces, we employ efficient heuristics to reveal additional system events with minimal effort. In addition, BEACON incorporates a security and functionality scoring mechanism to prioritize system calls and capabilities based on their impact on the host OS kernel's security and the functionality of containerized applications. By integrating these scores, BEACON achieves a customized balance between security and functionality, enabling cloud providers to enforce security measures while maintaining tenant availability. We implemented a prototype of BEACON using eBPF kernel technology and conducted extensive evaluations. Results from the top 15 containers, which revealed significant improvements, demonstrate that BEACON identifies an average of 16.5 % additional syscalls by applying diverse environments. Furthermore, we evaluated its effectiveness in mitigating risks associated with 45 known vulnerabilities (e.g., CVEs), showcasing its potential to significantly enhance container security. Additionally, we performed proof-of-concept demonstrations for two well-known security vulnerabilities, showing that BEACON successfully reduces attack surface by blocking these exploits.
AB - This paper introduces BEACON, a novel tool for the automated generation of adjustable container security policies. Unlike prior approaches, BEACON leverages dynamic analysis to simulate realistic environments, uncovering container execution paths that may remain hidden during the profiling phase. To address the challenge of exploring vast profiling spaces, we employ efficient heuristics to reveal additional system events with minimal effort. In addition, BEACON incorporates a security and functionality scoring mechanism to prioritize system calls and capabilities based on their impact on the host OS kernel's security and the functionality of containerized applications. By integrating these scores, BEACON achieves a customized balance between security and functionality, enabling cloud providers to enforce security measures while maintaining tenant availability. We implemented a prototype of BEACON using eBPF kernel technology and conducted extensive evaluations. Results from the top 15 containers, which revealed significant improvements, demonstrate that BEACON identifies an average of 16.5 % additional syscalls by applying diverse environments. Furthermore, we evaluated its effectiveness in mitigating risks associated with 45 known vulnerabilities (e.g., CVEs), showcasing its potential to significantly enhance container security. Additionally, we performed proof-of-concept demonstrations for two well-known security vulnerabilities, showing that BEACON successfully reduces attack surface by blocking these exploits.
KW - Attack surface reduction
KW - Cloud computing security
KW - Dynamic analysis
KW - System events
UR - https://www.scopus.com/pages/publications/105024492510
U2 - 10.1016/j.cose.2025.104789
DO - 10.1016/j.cose.2025.104789
M3 - Article
AN - SCOPUS:105024492510
SN - 0167-4048
VL - 162
JO - Computers and Security
JF - Computers and Security
M1 - 104789
ER -