Docker ecosystem - Vulnerability Analysis

@article{Martin2018DockerE,
  title={Docker ecosystem - Vulnerability Analysis},
  author={Antony Martin and Simone Raponi and Th{\'e}o Combe and R. D. Pietro},
  journal={Comput. Commun.},
  year={2018},
  volume={122},
  pages={30-43}
}
Abstract Cloud based infrastructures have typically leveraged virtualization. However, the need for always shorter development cycles, continuous delivery and cost savings in infrastructures, led to the rise of containers. Indeed, containers provide faster deployment than virtual machines and near-native performance. In this paper, we study the security implications of the use of containers in typical use-cases, through a vulnerability-oriented analysis of the Docker ecosystem. Indeed, among… Expand
Container Security: Issues, Challenges, and the Road Ahead
An Empirical Study of Docker Vulnerabilities and of Static Code Analysis Applicability
  • Ana Duarte, Nuno Antunes
  • Computer Science
  • 2018 Eighth Latin-American Symposium on Dependable Computing (LADC)
  • 2018
Container Based On-Premises Cloud Security Framework
ConPan: A Tool to Analyze Packages in Software Containers
Understanding the Quality of Container Security Vulnerability Detection Tools
Network Virtualization: Proof of Concept for Remote Management of Multi-Tenant Infrastructure
  • S. Ugwuanyi, R. Asif, J. Irvine
  • Computer Science
  • 2020 IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application (DependSys)
  • 2020
Evaluation on the Security of Commercial Cloud Container Services
Understanding the Security Risks of Docker Hub
Lic-Sec: an enhanced AppArmor Docker security profile generator
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 34 REFERENCES
To Docker or Not to Docker: A Security Perspective
Securing Docker Containers from Denial of Service (DoS) Attacks
Virtualization vs Containerization to Support PaaS
Virtualization and Cloud Security: Benefits, Caveats, and Future Developments
Integrating Containers into Workflows: A Case Study Using Makeflow, Work Queue, and Docker
A Study of Security Vulnerabilities on Docker Hub
A Defense Method against Docker Escape Attack
Secure virtualization for cloud computing
Security of Cloud Computing
...
1
2
3
4
...