Security Analysis of Docker Containers for ARM Architecture

被引:2
|
作者
Haq, Md Sadun [1 ]
Tosun, Ali Saman [2 ]
Korkmaz, Turgay [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] Univ N Carolina, Dept Math & Comp Sci, Pembroke, NC USA
来源
2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022) | 2022年
关键词
Raspberry Pi; Images; Security; Containers; ARM Architecture; DockerHub;
D O I
10.1109/SEC54971.2022.00025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Containers provide a better performance, faster deployment than virtual machines and provide near-native performance, with isolation and security drawbacks. Although the security of containers for the Intel architecture has been investigated in more detail, there is limited work on the security of containers for the ARM architecture. In this paper, we address this gap in research and focus on the security of containers designed for the ARM architecture, which is heavily used in IoT devices. Edge computing offers many advantages, including reduced latency and resource requirements at the cloud because data can be processed at the edge before it is sent to the cloud. Using containers at the edge nodes of IoT-Edge-Cloud systems can enhance such advantages at the cost of increasing security vulnerabilities in such systems. Therefore, it is essential to investigate the security of containers designed for the ARM architecture. Accordingly, we obtained official ARM images from DockerHub and used various security tools to scan these ARM images. We found that 72% of all the vulnerabilities show varying severity levels and each tool seems to work best for particular base images. We investigated how each tool detects sub-packages and achieves a different hit ratio while none of them alone can detect at least 80% of all the vulnerabilities. In addition, we also investigated how the Docker images and their vulnerability landscape change over a period of six months by running the scanning tools twice. Finally, we also conducted a dynamic analysis of some of the images on the Raspberry Pi and study their effects. We believe this paper will facilitate the use of ARM containers at the ARM-based edge nodes by addressing security issues.
引用
收藏
页码:264 / 276
页数:13
相关论文
共 50 条
  • [1] To Docker or Not to Docker: A Security Perspective
    Combe, Theo
    Martin, Antony
    Di Pietro, Roberto
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 54 - 62
  • [2] Performance Analysis of an Hyperconverged Infrastructure using Docker Containers and GlusterFS
    Leite, Rodrigo
    Solis, Priscila
    Alchieri, Eduardo
    CLOSER: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2019, : 339 - 346
  • [3] Monitoring the Energy Consumption of Docker Containers
    Warade, Mehul
    Lee, Kevin
    Ranaweera, Chathurika
    Schneider, Jean-Guy
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1703 - 1710
  • [4] Zero Trust Container Architecture (ZTCA): A Framework for Applying Zero Trust Principals to Docker Containers
    Leahy, Darragh
    Thorpe, Christina
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 111 - 120
  • [5] Evaluation of Docker Containers Based on Hardware Utilization
    Preeth, E. N.
    Mulerickal, Fr Jaison Paul
    Paul, Biju
    Sastri, Yedhu
    2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 697 - 700
  • [6] Containers and Cloud: From LXC to Docker to Kubernetes
    Bernstein, David
    IEEE CLOUD COMPUTING, 2014, 1 (03): : 81 - 84
  • [7] Analysis of a Network IO Bottleneck in Big Data Environments Based on Docker Containers
    Varma, P. China Venkanna
    Chakravarthy, K. Venkata Kalyan
    Kumari, V. Valli
    Raju, S. Viswanadha
    BIG DATA RESEARCH, 2016, 3 : 24 - 28
  • [8] Experimental Analysis of Security Attacks for Docker Container Communications
    Lee, Haneul
    Kwon, Soonhong
    Lee, Jong-Hyouk
    ELECTRONICS, 2023, 12 (04)
  • [9] Performance Comparison Between Virtual Machines And Docker Containers
    Yadav, R. R.
    Sousa, E. T. G.
    Callou, G. R. A.
    IEEE LATIN AMERICA TRANSACTIONS, 2018, 16 (08) : 2282 - 2288
  • [10] Containers & Docker: Emerging Roles & Future of Cloud Technology
    Singh, Sachchidanand
    Singh, Nirmala
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 804 - 807