Security Analysis of Docker Containers for ARM Architecture

被引:1
|
作者
Haq, Md Sadun [1 ]
Tosun, Ali Saman [2 ]
Korkmaz, Turgay [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] Univ N Carolina, Dept Math & Comp Sci, Pembroke, NC USA
关键词
Raspberry Pi; Images; Security; Containers; ARM Architecture; DockerHub;
D O I
10.1109/SEC54971.2022.00025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Containers provide a better performance, faster deployment than virtual machines and provide near-native performance, with isolation and security drawbacks. Although the security of containers for the Intel architecture has been investigated in more detail, there is limited work on the security of containers for the ARM architecture. In this paper, we address this gap in research and focus on the security of containers designed for the ARM architecture, which is heavily used in IoT devices. Edge computing offers many advantages, including reduced latency and resource requirements at the cloud because data can be processed at the edge before it is sent to the cloud. Using containers at the edge nodes of IoT-Edge-Cloud systems can enhance such advantages at the cost of increasing security vulnerabilities in such systems. Therefore, it is essential to investigate the security of containers designed for the ARM architecture. Accordingly, we obtained official ARM images from DockerHub and used various security tools to scan these ARM images. We found that 72% of all the vulnerabilities show varying severity levels and each tool seems to work best for particular base images. We investigated how each tool detects sub-packages and achieves a different hit ratio while none of them alone can detect at least 80% of all the vulnerabilities. In addition, we also investigated how the Docker images and their vulnerability landscape change over a period of six months by running the scanning tools twice. Finally, we also conducted a dynamic analysis of some of the images on the Raspberry Pi and study their effects. We believe this paper will facilitate the use of ARM containers at the ARM-based edge nodes by addressing security issues.
引用
收藏
页码:264 / 276
页数:13
相关论文
共 50 条
  • [21] The impact of Docker containers on the performance of genomic pipelines
    Di Tommaso, Paolo
    Palumbo, Emilio
    Chatzou, Maria
    Prieto, Pablo
    Heuer, Michael L.
    Notredame, Cedric
    PEERJ, 2015, 3
  • [22] Slacker: Fast Distribution with Lazy Docker Containers
    Harter, Tyler
    Salmon, Brandon
    Liu, Rose
    Arpaci-Dusseau, Andrea C.
    Arpaci-Dusseau, Remzi H.
    14TH USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES (FAST '16), 2016, : 181 - 195
  • [23] ConHub: A Metadata Management System for Docker Containers
    Tian, Chris Xing
    Pan, Aditya
    Tay, Y. C.
    CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 2453 - 2455
  • [24] Autonomic Vertical Elasticity of Docker Containers with ELASTICDOCKER
    Al-Dhuraibi, Yahya
    Paraiso, Fawaz
    Djarallah, Nabil
    Merle, Philippe
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 472 - 479
  • [25] Model-Driven Management of Docker Containers
    Paraiso, Fawaz
    Challita, Stephanie
    Al-Dhuraibi, Yahya
    Merle, Philippe
    PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 718 - 725
  • [26] Analysis of Network IO Performance in Hadoop Cluster Environments Based on Docker Containers
    Varma, P. China Venkanna
    Chakravarthy, K. V. Kalyan
    Kumari, V. Valli
    Raju, S. Viswanadha
    PROCEEDINGS OF FIFTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2015), VOL 2, 2016, 437 : 227 - 237
  • [27] Value-Based Allocation of Docker Containers
    Dziurzanski, Piotr
    Indrusiak, Leandro Soares
    2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 358 - 362
  • [28] A Holistic Evaluation of Docker Containers for Interfering Microservices
    Jha, Devki Nandan
    Garg, Saurabh
    Jayaraman, Prem Prakash
    Buyya, Rajkumar
    Li, Zheng
    Ranjan, Rajiv
    2018 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2018), 2018, : 33 - 40
  • [29] Analysis of a Network IO Bottleneck in Big Data Environments Based on Docker Containers
    Varma, P. China Venkanna
    Chakravarthy, K. Venkata Kalyan
    Kumari, V. Valli
    Raju, S. Viswanadha
    BIG DATA RESEARCH, 2016, 3 : 24 - 28
  • [30] Experimental Analysis of Security Attacks for Docker Container Communications
    Lee, Haneul
    Kwon, Soonhong
    Lee, Jong-Hyouk
    ELECTRONICS, 2023, 12 (04)