The Enemy Within: Running Untrusted Code with gVisor - Ian Lewis, Google
gvisor fun with uname syscall
A real-world example: Running untrusted user code
gvisor
NanoVisor: Modernizing Container Runtime with an Architecture Refactor..- Jianfeng Tan & Tianyu Zhou
SREUniversity - gVisor and KataContainers Install
Introduction to gVisor: Sandboxed Linux Container Runtime
Christo Goosen - Google gvisor container runtime sandbox
Untrusted User Code Isolation
OSS Unboxing - Kubernetes TrustedSandbox containers with gVisor
Blending Containers and Virtual Machines: A Study of Firecracker and gVisor
Kata and gVisor: A Quantitative Comparison - Xu Wang, hyper.sh
Kubernetes Security - Container Runtime Sandboxes gVisor runsc/kata containers - 15
Sandboxing is frequently used to inspect untested or untrusted code
BKK19-105 - gVisor Container on Arm64: Let‘s Talk about Our Progress!
gVisor The Future of Container Security - Andy Nguyen
Custom Map and Enemies in UNAME Game!
A New Secure Container Solution on Arm Platform: gVisor - Bin Lu, Arm
Securing Untrusted Workloads with Kata Containers on Kubernetes - David Angot & Alex Price
gVisor+Falco-Strengthen K8s & container security without losing visibility
Container Isolation at Scale (Introducing gVisor) - Dawn Chen & Zhengyu He, Google
In a Container, Nobody Hears Your Screams: Next Generation Process Isolation - Andrew Martin
How to use deno_core to run untrusted JavaScript in your application
gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?
Faster, Safer: Compiling Untrusted Code to WebAssembly in the Browser - Jordan Eldredge