Investigating and Mitigating the Impact of Technical Lag and Different architectures on Container Image Security

dc.contributor.authorWilliamson, Mosope
dc.contributor.authorDarbouy, Sina
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data och informationstekniksv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineeringen
dc.contributor.examinerHorkoff, Jennifer
dc.contributor.supervisorLeitner, Philipp
dc.date.accessioned2023-12-20T14:56:21Z
dc.date.available2023-12-20T14:56:21Z
dc.date.issued2023
dc.date.submitted2023
dc.description.abstractContainerization technology has revolutionized software development and deployment by providing a more lightweight and scalable alternative to traditional virtualization. However, containers running on different architectures, such as ARM or AMD, use distinct images, which could lead to more security issues when selecting different architectures. Moreover, there needs to be more knowledge of how containers become outdated when released in production. This article addresses these questions by performing a deep comparison and analysis of two major container image architectures, namely ARM and AMD, for a dataset of 2500 container images using vulnerability scanners such as Clair, Trivy, Anchore, and Snyk and by measuring and comparing three dimensions of technical lag that Docker container images can face: time lag, version lag, and vulnerability lag. Finally, we applied what we learned from this research to our partner company to enhance the security of the company’s container images in production. Our results indicate no significant difference in the context of vulnerabilities among different architectures. Furthermore, our analysis revealed that the various dimensions of technical lag are complementary, providing multiple insights. Specifically, we found that official images consistently have a lower vulnerability lag than community images. Based on our findings, we recommend to our partner company the regular monitoring and updating of container images, with a focus on official images, to minimize vulnerability lag. In addition, our research highlights the importance of taking proactive measures to manage container image security in a production environment.
dc.identifier.coursecodeDATX05
dc.identifier.urihttp://hdl.handle.net/20.500.12380/307453
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectContainerization
dc.subjectSecurity
dc.subjectTechnical lag
dc.subjectVulnerability scanners
dc.subjectDeployment
dc.subjectSoftware development
dc.subjectthesis
dc.titleInvestigating and Mitigating the Impact of Technical Lag and Different architectures on Container Image Security
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster's Thesisen
dc.type.uppsokH
local.programmeSoftware engineering and technology (MPSOF), MSc

Ladda ner

Original bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
CSE 23-73 SD MW.pdf
Storlek:
2.5 MB
Format:
Adobe Portable Document Format

License bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
license.txt
Storlek:
2.35 KB
Format:
Item-specific license agreed upon to submission
Beskrivning: