Docker images are used to distribute and deploy cloud-native applications in containerised form. A container engine runs them with separated privileges according to namespaces. Recent studies have investigated security vulnerabilities and runtime characteristics of Docker images. In contrast, little is known about the extent of hardware-dependent features in them such as processor-specific trusted execution environments, graphics acceleration or extension boards. This problem can be generalised to missing knowledge about the extent of any hardware-bound instructions within the images that may require elevated privileges. We first conduct a systematic one-year evolution analysis of a sample of Docker images concerning their use of hardware-s...
Dataset with the container image metadata used for our IEEE/ACM CCGRID 2023 paper "An Empirical Stud...
Over the last few years, the cloud computing industry has witnessed the wider adoption of the contai...
International audienceThe transition from virtual machine-based infrastructures to container-based o...
Docker images are commonly used to package, distribute and deploy complex cloud-native applications ...
Docker images are used to distribute and deploy cloud-native applications in containerised form. A c...
With the growing use of cloud computing and need for resource effectiveness, the use of container te...
Docker is a popular tool for virtualization that allows for fast and easy deployment of applications...
The technology landscape for container adoption has greatly evolved over the years from the first kn...
Because of the ease of use and effectiveness, Docker containers have become immensely popular among ...
Container technology for hosting applications on the web is gaining traction as the preferred mode o...
This record contains pre-built images of the Docker containers used for running the tools of the pap...
Containers have evolved to support microservice architecture as a low-cost alternative to virtual ma...
As the use of software containerisation has increased, so too has the need for security research on ...
Containers have enabled new computing paradigms such as Functions-as-a- Service in data centers toda...
Virtualization technology plays a vital role in cloud computing. In particular, benefits of virtuali...
Dataset with the container image metadata used for our IEEE/ACM CCGRID 2023 paper "An Empirical Stud...
Over the last few years, the cloud computing industry has witnessed the wider adoption of the contai...
International audienceThe transition from virtual machine-based infrastructures to container-based o...
Docker images are commonly used to package, distribute and deploy complex cloud-native applications ...
Docker images are used to distribute and deploy cloud-native applications in containerised form. A c...
With the growing use of cloud computing and need for resource effectiveness, the use of container te...
Docker is a popular tool for virtualization that allows for fast and easy deployment of applications...
The technology landscape for container adoption has greatly evolved over the years from the first kn...
Because of the ease of use and effectiveness, Docker containers have become immensely popular among ...
Container technology for hosting applications on the web is gaining traction as the preferred mode o...
This record contains pre-built images of the Docker containers used for running the tools of the pap...
Containers have evolved to support microservice architecture as a low-cost alternative to virtual ma...
As the use of software containerisation has increased, so too has the need for security research on ...
Containers have enabled new computing paradigms such as Functions-as-a- Service in data centers toda...
Virtualization technology plays a vital role in cloud computing. In particular, benefits of virtuali...
Dataset with the container image metadata used for our IEEE/ACM CCGRID 2023 paper "An Empirical Stud...
Over the last few years, the cloud computing industry has witnessed the wider adoption of the contai...
International audienceThe transition from virtual machine-based infrastructures to container-based o...