Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation
arXiv:2510.03720v1 Announce Type: new Abstract: Linux Seccomp is widely used by the program developers and the system maintainers to secure the operating systems, which can block unused syscalls for different applications and containers to shrink the attack surface of the operating systems. However, it is difficult to configure the whitelist of a container or application without the help of program developers. Docker containers block about only 50 syscalls by default, and lots of unblocked...