@inproceedings{733ec74855f943bcb5ff046ea0b5bce3,
title = "Module Architecture of Docker Image and Container Security",
abstract = "The security of Docker images has attracted a lot of attention recently, and the lack of content security checks on Docker images has led users to deploy vulnerable systems. In addition, malicious attackers may inject malware when building the image, and once deployed, it may become a cryptocurrency mining node or leak confidential information on the system. Therefore, it is imperative to establish a complete diagnostic process. In this paper, we propose an architecture of DICDS, which consists of four modules: integrity checker module, vulnerability checker module, malware checker module and suspicious behavior checker module. We can ensure that Docker users are using clean images and containers after the process of DICDS.",
keywords = "Cloud security, Container, Docker, Malicious, Vulnerability",
author = "Wang, {Guan Yu} and Ko, {Hung Jui} and Tsai, {Min Yi} and Wang, {Wei Jen}",
note = "Publisher Copyright: {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.; 25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022 ; Conference date: 15-12-2022 Through 17-12-2022",
year = "2022",
doi = "10.1007/978-981-19-9582-8_58",
language = "???core.languages.en_GB???",
isbn = "9789811995811",
series = "Communications in Computer and Information Science",
publisher = "Springer Science and Business Media Deutschland GmbH",
pages = "661--669",
editor = "Sun-Yuan Hsieh and Ling-Ju Hung and Sheng-Lung Peng and Ralf Klasing and Chia-Wei Lee",
booktitle = "New Trends in Computer Technologies and Applications - 25th International Computer Symposium, ICS 2022, Proceedings",
}