Despite the wide usage of container-based cloud computing, container auditing for security analysis relies mostly on built-in host …