2019 IEEE 5th International Conference on Computer and Communications (ICCC) 2019
DOI: 10.1109/iccc47050.2019.9064441
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Threats Detection Techniques on Docker Container

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Docker Images: Besides Git, researchers and developers, early on without evidence, assumed leaked secrets in images for virtual machines or Docker and provided countermeasures [2,4,5,8,23,42,80]. Nevertheless, non-academic Web-blog studies [43,66,70,77] still find leaked secrets in images on Docker Hub.…”
Section: Related Workmentioning
confidence: 99%
“…Docker Images: Besides Git, researchers and developers, early on without evidence, assumed leaked secrets in images for virtual machines or Docker and provided countermeasures [2,4,5,8,23,42,80]. Nevertheless, non-academic Web-blog studies [43,66,70,77] still find leaked secrets in images on Docker Hub.…”
Section: Related Workmentioning
confidence: 99%
“…Huang et al [31] noted that security is compromised due to immature auditing procedures of Docker images. To protect the security of host computers and local Docker containers from malicious Docker container attacks, it is necessary to detect potential threats of Docker images and discover risks when running Docker container instances on host computers.…”
Section: Data Protection For Containermentioning
confidence: 99%
“…Because of that, they are being widely adopted (Kwon & Lee, 2020). Nevertheless, Docker containers are known to be vulnerable (Wenhao & Zheng, 2020;Huang et al, 2019), as they share operating system kernels, and run on root user by default. This fact allows containers to easily execute privileged operations, as well as easily access hardware resources.…”
Section: Related Workmentioning
confidence: 99%