Reverse Engineering Methodology Applied to Containers - Enhancing Intruder Dilemma Part II
Read Time: 5 Minutes
Continuing sharing my research that started last year I am releasing my slide deck for "REM(Containers) - The real Xanthe". I just presented on this and plan to continue to release content that addresses forensic analysis of containerization related technology and eventually relating that back to full CI/CD analysis. The release list as of now looks like this:
- Docker Forensics*
- Malicious Container Analysis*
- K8S Forensics
- SAAS Containerization Forensics
- CI/CD Forensics
Stay tuned for more content and leave your suggestions below!
Comments
Post a Comment