May 13, 2025
Conference Paper

Deciphering Discrepancies: A Comparative Analysis of Docker Image Security

Abstract

As the use of microservices continues to grow and become a foundational approach to architecting software solutions, ensuring the security of microservices is paramount. Docker images have emerged as the predominant solution to containerize microservices–and thus, Docker images are becoming a large attack surface. Thus, reducing vulnerabilities in Docker images will reduce microservice cyberattacks. A common way to find vulnerabilities in Docker images employs static analysis tools like Trivy and Grype. However, these tools frequently generate disparate vulnerability reports when analyzing the same Docker image, thus causing uncertainty in tool selection. We collected 927 Docker images, analyzed them with Trivy and Grype, and compared the vulnerabilities reported in each image. Among the 865 images found to have vulnerabilities, Trivy and Grype disagreed on both the number of vulnerabilities and the vulnerability IDs found therein. Since both tools interface with external vulnerability databases, some discrepancies can be attributed to how the tools interface with these external resources. The external vulnerability databases partially overlap and frequently contradict one another, thereby creating challenges for static analysis tool developers and end users alike. This New Ideas and Emerging Results (NIER) study contains new and critical information that practitioners need for selecting and using static analysis tools–given that increases in the use of Docker technologies means increases in the size of the attack surfaces.

Published: May 13, 2025

Citation

Boles B., E. O'Donoghue, A. Manzi Muneza, G. Perkins, C.I. Izurieta, and A. Reinhold. 2024. Deciphering Discrepancies: A Comparative Analysis of Docker Image Security. In IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2024), October 7-8, 2024, Flagstaff, AZ, 254-259. Piscataway, New Jersey:IEEE. PNNL-SA-200393. doi:10.1109/SCAM63643.2024.00034

Research topics