Deciphering Discrepancies: A Comparative Analysis of Docker Image Security
As the use of microservices continues to grow and become a foundational approach to architecting software solutions, ensuring the security of microservices is paramount. Docker images have emerged as the predominant solution to containerize microservices–and thus, Docker images are becoming a large attack surface. Thus, reducing vulnerabilities in Docker images will reduce microservice cyberattacks. A common way to find vulnerabilities in Docker images employs static analysis tools like Trivy and Grype. However, these tools frequently generate disparate vulnerability reports when analyzing the same Docker image, thus causing uncertainty in tool selection. We collected 927 Docker images, analyzed them with Trivy and Grype, and compared the vulnerabilities reported in each image. Among the 865 images found to have vulnerabilities, Trivy and Grype disagreed on both the number of vulnerabilities and the vulnerability IDs found therein. Since both tools interface with external vulnerability databases, some discrepancies can be attributed to how the tools interface with these external resources. The external vulnerability databases partially overlap and frequently contradict one another, thereby creating challenges for static analysis tool developers and end users alike. This New Ideas and Emerging Results (NIER) study contains new and critical information that practitioners need for selecting and using static analysis tools–given that increases in the use of Docker technologies means increases in the size of the attack surfaces.
Tue 8 OctDisplayed time zone: Arizona change
15:30 - 16:20 | Engineering / NIERNew Ideas and Emerging Results / Engineering Track at Fremont Chair(s): Eduardo Figueiredo Federal University of Minas Gerais | ||
15:30 10mResearch paper | GitRev: An LLM-based Gamification Framework for Modern Code Review Activities Engineering Track Jasem Khelifi ETS Montreal, University of Quebec, Moataz Chouchen ETS, Ali Ouni ETS Montreal, University of Quebec, Raula Gaikovina Kula Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Salma Hamza Mediterranean Institute of Technology, South Mediterranean University, Tunisia, Mohamed Wiem Mkaouer University of Michigan - Flint | ||
15:40 10mResearch paper | An Empirical Study on Understanding Performance Issues and Causes in Android Apps New Ideas and Emerging Results Nisha Kumari Oulu University of Applied Sciences, Teerath Das University of Jyväskylä, Tommi Mikkonen University of Jyvaskyla | ||
15:50 10mResearch paper | An Experiment Using Partial Evaluation for Transformational DebuggingOnline presentation New Ideas and Emerging Results Kanae Tsushima Research Organization of Information and Systems (ROIS), Robert Glück University of Copenhagen | ||
16:00 10mResearch paper | Deciphering Discrepancies: A Comparative Analysis of Docker Image Security New Ideas and Emerging Results Brittany Boles Montana State University, Eric O'Donoghue Montana State University, Garrett Perkins Montana State University, Clemente Izurieta Montana State University, Ann Marie Reinhold Montana State University | ||
16:10 10mLive Q&A | Discussion (Engineering / NIER) New Ideas and Emerging Results |