Vulnerability Analysis of 2500 Docker Hub Images
نویسندگان
چکیده
The use of container technology has skyrocketed during the last few years, with Docker as leading platform. Docker’s online repository for publicly available images, called Hub, hosts over 3.5 million images at time writing, making it world’s largest community images. We perform an extensive vulnerability analysis 2500 It is particular interest to this type because landscape a rapidly changing category, scanners are constantly developed and updated, new vulnerabilities discovered, volume on Hub increasing every day. Our main findings reveal that (1) number newly introduced increasing; (2) certified most vulnerable; (3) official least (4) there no correlation between image features (i.e., pulls, stars, days since update); (5) severe originate from two popular scripting languages, JavaScript Python; (6) Python 2.x packages jackson-databind contain highest vulnerabilities. perceive our study published in open literature couple years.
منابع مشابه
Analysis of Docker Security
Over the last few years, the use of virtualization technologies has increased dramatically. This makes the demand for efficient and secure virtualization solutions become more obvious. Container-based virtualization and hypervisor-based virtualization are two main types of virtualization technologies that have emerged to the market. Of these two classes, container-based virtualization is able t...
متن کاملWith Great Brain Hub Connectivity Comes Great Vulnerability.
Theoretical and empirical studies have begun to explore the structure and function of the human brain from a system perspective, using network science to abstractly model the brain as a set of nodes (e.g., brain regions) and edges (e.g., structural or functional connections) [1]. Within this framework, many studies have identified a small set of highly connected network nodes, referred to as hu...
متن کاملActivity Dependent Degeneration Explains Hub Vulnerability in Alzheimer's Disease
Brain connectivity studies have revealed that highly connected 'hub' regions are particularly vulnerable to Alzheimer pathology: they show marked amyloid-β deposition at an early stage. Recently, excessive local neuronal activity has been shown to increase amyloid deposition. In this study we use a computational model to test the hypothesis that hub regions possess the highest level of activity...
متن کاملLarge-scale image analysis using docker sandboxing
With the advent of specialized hardware such as Graphics Processing Units (GPUs), large scale image localization, classification and retrieval have seen increased prevalence. Designing scalable software architecture that co-evolves with such specialized hardware is a challenge in the commercial setting. In this paper, we describe one such architecture (Cortexica) that leverages scalability of G...
متن کاملwoman-defined identity: analysis of selected poems of adrienne rich
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on computational science and computational intelligence
سال: 2021
ISSN: ['2569-7072', '2569-7080']
DOI: https://doi.org/10.1007/978-3-030-71017-0_22