Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Uncovering vulnerabilities in container security scanning tools using malicious images
Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
2024 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Containerization is a popular and growing trend in software development. It allows users to save an ‘image’ of an operating system and its installed programs that can be replicated on another computer. It is common practice to download community-made images from sites such as Docker Hub. These images may contain software with known vulnerabilities which is why there are scanning tools that can be used to determine if an image contains any vulnerable software. Scanning tools are effective at detecting vulnerabilities but it has been proven that they can be fooled into giving incorrect results by manipulating the images. While there is research that has covered this topic it has only been done in a broad sense without exploring the details of individual exploits against scanners through maliciously modified images. This thesis aimed to fill this knowledge gap by answering the following research question.

How can container images be maliciously manipulated in order to disrupt container image scanners?

The research question was answered through a series of experiments where an image was manipulated in various ways with the goal of passing vulnerable software through one of the scanning tools undetected. This was done mainly through editing the package manager in the Linux operating system that keeps track of all installed software which it was discovered that the scanners heavily relied upon.

The thesis achieved its goal of creating new research that expands upon the field and covers individual exploits in depth that has previously been lacking in publically available research. The research can be used by users and developers as a warning of dangers that must be addressed and kept in mind when using community-made images. The individual exploits could also be used by bad actors with malicious intent until the scanners have been adapted to protect against them. The research can also be used as a base for future research such as going beyond the limitations of this thesis to discover and address new exploits.

Place, publisher, year, edition, pages
2024.
Keywords [en]
Containerization, Container Security, Container Scanning, Software Vulnerabilities, Common Vulnerabilities and Exposures (CVE), Docker, DevSecOps
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:su:diva-242839OAI: oai:DiVA.org:su-242839DiVA, id: diva2:1955772
Available from: 2025-04-30 Created: 2025-04-30

Open Access in DiVA

fulltext(395 kB)22 downloads
File information
File name FULLTEXT01.pdfFile size 395 kBChecksum SHA-512
9e799a5251776b3637566db5a58191156d20e4e14418782492e46f5e05242f7129ea2bd74f71a0f1c3b87e230c07dfa3cadd9939ccd6e70a80f6d637e922febf
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Träff, Kevin
By organisation
Department of Computer and Systems Sciences
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 22 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 194 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf