Docker images are used to distribute and deploy cloud-native applications in containerised form. A container engine runs them with separated privileges according to namespaces. Recent studies have investigated security vulnerabilities and runtime characteristics of Docker images. In contrast, little is known about the extent of hardware-dependent features in them such as processor-specific trusted execution environments, graphics acceleration or extension boards. This problem can be generalised to missing knowledge about the extent of any hardware-bound instructions within the images that may require elevated privileges. We first conduct a systematic one-year evolution analysis of a sample of Docker images concerning their use of hardware-specific features. To improve the state of technology, we contribute novel tools to manage such images. Our heuristic hardware dependency detector and a hardware-aware Docker executor give early warnings upon missing dependencies instead of leading to silent or untimely failures. Our dataset and tools are released to the research community.
翻译:容器引擎根据名称空间分别运行。最近的研究调查了多克图像的安全弱点和运行时间特点。相反,对于这些图像中硬件依赖性特征的范围,例如处理器特定信任的执行环境、图形加速或扩展板等,知之甚少。这个问题可以概括为缺少对图像中可能需要更高权限的任何硬件限制指示的程度的了解。我们首先对多克图像样本进行一年的系统进化分析,以了解它们使用硬件特定特性的情况。为了改进技术状况,我们提供了管理这些图像的新工具。我们超强的硬件依赖性探测器和硬件敏锐的多克执行器对缺失的依赖性而不是导致静默或不及时失灵的情况发出预警。我们的数据设置和工具被发布到研究界。