DFScan: Security Scanner of the Dockerfile Based on Instruction Coverage and Attack Perspective

被引:1
|
作者
Hao, Jiawei [1 ]
Lu, Hui [1 ]
Jiang, Yu [1 ]
Gupta, Brij B. [2 ,3 ,4 ,5 ,6 ]
Almomani, Ammar [4 ,7 ]
Zhang, Man [8 ]
Tian, Zhihong [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[2] Asia Univ, Int Ctr AI & Cyber Secur Res & Innovat, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Lebanese Amer Univ, Dept Elect & Comp Engn, Beirut, Lebanon
[4] Skyline Univ Coll, Sch Comp, Sharjah, U Arab Emirates
[5] Symbiosis Int Univ, Symbiosis Ctr Informat Technol SCIT, Pune, India
[6] Univ Petr Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, India
[7] Al Balqa Appl Univ, Al Huson Univ Coll, IT Dept, Irbid, Jordan
[8] PENG CHENG Lab, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Dockfile; Docker Security; DFScan; Instruction Coverage; Attack Perspective;
D O I
10.22967/HCIS.2024.14.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cloud technology's development and widespread use, container technology plays an essential role in the Internet-of-Things field. However, containers also face security threats, mainly due to the ever-looming security flaw of a Dockerfile with the entire lifecycle of a docker, while previous Dockerfile scanning solutions are not enough. They mainly focus on the grammar problems of a Dockerfile or the reason for the build error, or just focus on package security in it. To solve the problem of insufficient security-scanning capabilities, we introduce DFScan-a Dockerfile security scanning system to complement existing scanning capabilities. We transform the raw content of a Dockerfile into structured data and design appropriate analysis rules to extract potential vulnerabilities based on existing best practices and container attack tools. Based on DFScan, we analyzed the security problems of 10,064 Dockerfile projects with a high STAR ranking in GitHub for more than 30 mainstream risk types, and the results have shown that more than 90% of the projects suffer from at least one security risk. Moreover, DFScan has a higher problem coverage and more inspection types than Hadolint, DAYS, and Shipwright.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] On the Security of a Universal Cryptocomputer: The Chosen Instruction Attack
    Rass, Stefan
    Schartner, Peter
    IEEE ACCESS, 2016, 4 : 7874 - 7882
  • [2] The Innovation of the Instruction Strategy for the Information Security Course Based on the Network Attack and Defense Training
    Jia, Xueming
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTER SCIENCE (ICEMC 2016), 2016, 129 : 49 - 52
  • [3] On Coverage-Based Attack Profiles
    Rivers, Anthony T.
    Vouk, Mladen A.
    Williams, Laurie
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 5 - 6
  • [4] STRUCTURAL INABILITY TO ATTACK AS A EUROPEAN-SECURITY PERSPECTIVE
    BRIE, A
    MULLER, M
    IPW BERICHTE, 1989, 18 (09): : 13 - 19
  • [5] Security Testing Based on Attack Patterns
    Bozic, Josip
    Wotawa, Franz
    2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 4 - 11
  • [6] Smart Grid Security: Attack Modeling from a CPS Perspective
    Luo, Bo
    Beuran, Razvan
    Tan, Yasuo
    2020 IEEE COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2021,
  • [7] MEMS based computed tomographic scanner for border security
    Arunachalam, K.
    Udpa, L.
    Udpa, S. S.
    2005 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT 2005), 2005, : 68 - 72
  • [8] Fast network attack modeling and security evaluation based on attack graphs
    Kotenko, Igor
    Chechulin, Andrey
    1600, River Publishers (03): : 27 - 46
  • [9] Network Attack Chain Security Model Construction Based On Attack Framework
    Hu, Jian
    Wang, Hailin
    Li, Hanruo
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (04) : 116 - 127
  • [10] Network Security Metric Based on Attack Duration
    Forghani, Shahab
    Habibi, Navid
    Firoozbakht, Mohsen
    2015 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED ENGINEERING AND INNOVATION (KBEI), 2015, : 1093 - 1096