Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy 2017
DOI: 10.1145/3029806.3029832
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Security Vulnerabilities on Docker Hub

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
78
0
11

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 139 publications
(90 citation statements)
references
References 16 publications
1
78
0
11
Order By: Relevance
“…Comparing our results about vulnerabilities to previous observations [22], we found Debian-based Docker containers to have an average number of vulnerabilities (i.e., 460) that is above the average for all Docker containers (i.e., 120). However, the number of vulnerabilities depends on the number of installed packages found.…”
Section: Discussion and Actionable Resultssupporting
confidence: 73%
See 1 more Smart Citation
“…Comparing our results about vulnerabilities to previous observations [22], we found Debian-based Docker containers to have an average number of vulnerabilities (i.e., 460) that is above the average for all Docker containers (i.e., 120). However, the number of vulnerabilities depends on the number of installed packages found.…”
Section: Discussion and Actionable Resultssupporting
confidence: 73%
“…Shu et al [22] performed a generic large scale study on the state of security vulnerabilities in both community and official Docker Hub repositories. They proposed the Docker Image Vulnerability Analysis (DIVA) framework to automatically discover, download, and analyze Docker images for security vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…Image repositories can be searched based on keywords. Although Docker Hub does not provide the entire list of image repositories, Shu et al [22] show that a dictionary-based search method can collect the vast majority of public repositories on Docker Hub. Containers.…”
Section: Image Repositoriesmentioning
confidence: 99%
“…Prior studies on Docker images mostly focus on analyzing Dockerfiles as a special type of code [4] and the security implications of adopting Docker images [5,22,23]. Differently, our focus is not about how they were created and how secure to deploy them, but about the data and information that can be distilled from the images for the good and evil of software engineering research.…”
Section: Related Workmentioning
confidence: 99%
“…Improved support for container security is needed to deal with a large array of known security vulnerabilities at the level of container images [256] and container runtimes [257]. This aspect, therefore, covers features that an application manager must understand in order to manage sensitive information, manage passwords for getting access to private Docker repositories, and limiting the security attack interface of containers by limiting the access of containers towards the underlying Linux kernel.…”
Section: Securing Containersmentioning
confidence: 99%