| Keyword search (4,163 papers available) | ![]() |
"Hanna A" Authored Publications:
| Title | Authors | PubMed ID | |
|---|---|---|---|
| 1 | An analysis of security vulnerabilities in container images for scientific data analysis | Kaur B; Dugré M; Hanna A; Glatard T; | 34080631 ENCS |
| 2 | Electrokinetic nondestructive in-situ technique for rehabilitation of liners damaged by fuels. | Bani Baker M, Elektorowicz M, Hanna A | 30086521 ENCS |
| Title: | An analysis of security vulnerabilities in container images for scientific data analysis | ||||
| Authors: | Kaur B, Dugré M, Hanna A, Glatard T | ||||
| Link: | https://pubmed.ncbi.nlm.nih.gov/34080631/ | ||||
| DOI: | 10.1093/gigascience/giab025 | ||||
| Publication: | GigaScience | ||||
| Keywords: | Docker; containers; neuroimaging; security vulnerabilities; singularity; | ||||
| PMID: | 34080631 | Category: | Date Added: | 2021-06-03 | |
| Dept Affiliation: |
ENCS
1 Department of Computer Science and Software Engineering, Concordia University, Montreal, QC H3G 1M8, Canada. |
||||
Description: |
Background: Software containers greatly facilitate the deployment and reproducibility of scientific data analyses in various platforms. However, container images often contain outdated or unnecessary software packages, which increases the number of security vulnerabilities in the images, widens the attack surface in the container host, and creates substantial security risks for computing infrastructures at large. This article presents a vulnerability analysis of container images for scientific data analysis. We compare results obtained with 4 vulnerability scanners, focusing on the use case of neuroscience data analysis, and quantifying the effect of image update and minification on the number of vulnerabilities. Results: We find that container images used for neuroscience data analysis contain hundreds of vulnerabilities, that software updates remove roughly two-thirds of these vulnerabilities, and that removing unused packages is also effective. Conclusions: We provide recommendations on how to build container images with fewer vulnerabilities. |



