과제정보
본 논문은 2024년도 산업통상자원부 및 한국산업기술진흥원의 산업혁신인재성장지원사업(RS-2024-00415520)과 과학기술정보통신부 및 정보통신기획평가원의 ICT혁신인재4.0 사업의 연구결과로 수행되었음 (No. IITP-2022-RS-2022-00156310)
참고문헌
- Docker Hub. https://hub.docker.com.
- G Liu, X Gao, H Wang, K Sun, "Exploring the Unchartered Space of Container Registry Typosquatting", USENIX Security Symposium, Boston, 2022
- Sysdig, "Analysis on Docker Hub malicious images: Attacks through public container images", https://sysdig.com/blog/analysis-of-supply-chain-attacks-through-public-docker-images.
- Docker Scout, https://docs.docker.com/scout.
- Clair, https://github.com/quay/clair.
- Trivy, https://trivy.dev.
- Anchore, https://anchore.com/
- Virus Total, https://www.virustotal.com/gui/home/upload
- S. Kwon and J. -H. Lee, "DIVDS: Docker Image Vulnerability Diagnostic System," in IEEE Access, vol. 8, pp. 42666-42673, 2020. https://doi.org/10.1109/ACCESS.2020.2976874
- Doan, T. P. Jung, S. "DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning." Computers, Materials & Continua 72(1) 2022.