Security Analysis of Docker Containers for ARM Architecture

被引:2
作者
Haq, Md Sadun [1 ]
Tosun, Ali Saman [2 ]
Korkmaz, Turgay [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] Univ N Carolina, Dept Math & Comp Sci, Pembroke, NC USA
来源
2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022) | 2022年
关键词
Raspberry Pi; Images; Security; Containers; ARM Architecture; DockerHub;
D O I
10.1109/SEC54971.2022.00025
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Containers provide a better performance, faster deployment than virtual machines and provide near-native performance, with isolation and security drawbacks. Although the security of containers for the Intel architecture has been investigated in more detail, there is limited work on the security of containers for the ARM architecture. In this paper, we address this gap in research and focus on the security of containers designed for the ARM architecture, which is heavily used in IoT devices. Edge computing offers many advantages, including reduced latency and resource requirements at the cloud because data can be processed at the edge before it is sent to the cloud. Using containers at the edge nodes of IoT-Edge-Cloud systems can enhance such advantages at the cost of increasing security vulnerabilities in such systems. Therefore, it is essential to investigate the security of containers designed for the ARM architecture. Accordingly, we obtained official ARM images from DockerHub and used various security tools to scan these ARM images. We found that 72% of all the vulnerabilities show varying severity levels and each tool seems to work best for particular base images. We investigated how each tool detects sub-packages and achieves a different hit ratio while none of them alone can detect at least 80% of all the vulnerabilities. In addition, we also investigated how the Docker images and their vulnerability landscape change over a period of six months by running the scanning tools twice. Finally, we also conducted a dynamic analysis of some of the images on the Raspberry Pi and study their effects. We believe this paper will facilitate the use of ARM containers at the ARM-based edge nodes by addressing security issues.
引用
收藏
页码:264 / 276
页数:13
相关论文
共 50 条
  • [21] Efficiency and Security of Docker Based Honeypot Systems
    Sever, Dubravko
    Kisasondi, Tonimir
    [J]. 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2018, : 1167 - 1173
  • [22] A Secure Platform for IoT Devices based on ARM Platform Security Architecture
    Jung, Junyoung
    Cho, Jinsung
    Lee, Ben
    [J]. PROCEEDINGS OF THE 2020 14TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM), 2020,
  • [23] On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies
    Wong, Ann Yi
    Chekole, Eyasu Getahun
    Ochoa, Martin
    Zhou, Jianying
    [J]. COMPUTERS & SECURITY, 2023, 128
  • [24] Enabling Docker Containers for High-Performance and Many-Task Computing
    Azab, Abdulrahman
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2017), 2017, : 279 - 285
  • [25] FUSE: A Microservice Approach to Cross-domain Federation using Docker Containers
    Goethals, Tom
    Kerkhove, Dwight
    Van Hoye, Laurens
    Sebrechts, Merlijn
    De Turck, Filip
    Volckaert, Bruno
    [J]. CLOSER: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2019, : 90 - 99
  • [26] WiMAX security architecture - Analysis and assessment
    Eren, Evren
    [J]. IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 673 - 677
  • [27] Security Analysis of an IoT Architecture for Healthcare
    Teresa Villalba, M.
    de Buenaga, Manuel
    Gachet, Diego
    Aparicio, Fernando
    [J]. INTERNET OF THINGS: IOT INFRASTRUCTURES, PT I, 2016, 169 : 454 - 460
  • [28] Workload-aware Resource Management for Energy Efficient Heterogeneous Docker Containers
    Kang, Dong-Ki
    Choi, Gyu-Beom
    Kim, Seong-Hwan
    Hwang, Il-Sun
    Youn, Chan-Hyun
    [J]. PROCEEDINGS OF THE 2016 IEEE REGION 10 CONFERENCE (TENCON), 2016, : 2428 - 2431
  • [29] Security Analysis of a Future Internet Architecture
    Chen, Zhe
    Luo, Hongbin
    Cui, Jianbo
    Jin, Mingshuang
    [J]. 2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [30] Enhancing Security of Docker using Linux hardening techniques
    Raj, Amith M. P.
    Pai, Sahithya J.
    Kumar, Ashok
    Gopal, Ashika
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 94 - 99