{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:54:44Z","timestamp":1768838084714,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62372297"],"award-info":[{"award-number":["No. 62372297"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714653","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:57:28Z","timestamp":1745362648000},"page":"2813-2823","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Dr. Docker: A Large-Scale Security Measurement of Docker Image Ecosystem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3240-6340","authenticated-orcid":false,"given":"Hequan","family":"Shi","sequence":"first","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7445-9103","authenticated-orcid":false,"given":"Lingyun","family":"Ying","sequence":"additional","affiliation":[{"name":"QI-ANXIN Technology Research Institute, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3236-4805","authenticated-orcid":false,"given":"Libo","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0083-733X","authenticated-orcid":false,"given":"Haixin","family":"Duan","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2658-5678","authenticated-orcid":false,"given":"Ming","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2875-304X","authenticated-orcid":false,"given":"Zhi","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"New Malware Campaign Exploits 9hits in Docker Assault. https:\/\/www.infosecurity-magazine.com\/news\/malware-exploits-9hits-docker Retrieved","author":"Alessandro Mascellino","year":"2024","unstructured":"Mascellino Alessandro. 2024. New Malware Campaign Exploits 9hits in Docker Assault. https:\/\/www.infosecurity-magazine.com\/news\/malware-exploits-9hits-docker Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/anchore.com\/opensource Retrieved","year":"2024","unstructured":"Anchore. 2024. Anchore. https:\/\/anchore.com\/opensource Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_3_1","volume-title":"Threat Alert: Supply Chain Attacks Using Container Images. https:\/\/www.aquasec.com\/blog\/supply-chain-threats-using-container-images Retrieved","author":"Assaf Morag","year":"2021","unstructured":"Morag Assaf. 2021. Threat Alert: Supply Chain Attacks Using Container Images. https:\/\/www.aquasec.com\/blog\/supply-chain-threats-using-container-images Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_4_1","unstructured":"Remillano Augusto. 2020. Malicious Docker Hub Container Images Used for Cryptocurrency Mining. https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/malicious-docker-hub-container-images-cryptocurrency-mining Retrieved March 19 2024 from"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM56168.2023.10304853"},{"key":"e_1_3_2_1_6_1","volume-title":"Docker Index Shows Momentum in Developer Community Activity. https:\/\/www.docker.com\/blog\/docker-index-shows-surging-momentum-in-developer-community-activity-again Retrieved","author":"Carter Matt","year":"2024","unstructured":"Matt Carter. 2021. Docker Index Shows Momentum in Developer Community Activity. https:\/\/www.docker.com\/blog\/docker-index-shows-surging-momentum-in-developer-community-activity-again Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103351"},{"key":"e_1_3_2_1_8_1","volume-title":"Attackers Cryptojacking Docker Images to Mine for Monero. https:\/\/unit42.paloaltonetworks.com\/cryptojacking-docker-images-for-mining-monero Retrieved","author":"Chitwadgi Ashutosh","year":"2024","unstructured":"Ashutosh Chitwadgi and Rajewar Rahul. 2020. Attackers Cryptojacking Docker Images to Mine for Monero. https:\/\/unit42.paloaltonetworks.com\/cryptojacking-docker-images-for-mining-monero Retrieved May 31, 2024) from"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3590329"},{"key":"e_1_3_2_1_10_1","volume-title":"Container running as privileged. https:\/\/securitylabs.datadoghq.com\/cloud-security-atlas\/vulnerabilities\/use-of-privileged-containers Retrieved","year":"2024","unstructured":"Datadog. 2023. Container running as privileged. https:\/\/securitylabs.datadoghq.com\/cloud-security-atlas\/vulnerabilities\/use-of-privileged-containers Retrieved April 30, 2024 from"},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/www.docker.com\/ Retrieved","year":"2024","unstructured":"Docker. 2024. Docker. https:\/\/www.docker.com\/ Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639143"},{"key":"e_1_3_2_1_13_1","volume-title":"Software Supply Chain Attacks: 6 Examples and 6 Defensive Strategies. https:\/\/www.aquasec.com\/cloud-native-academy\/supply-chain-security\/software-supply-chain-attacks Retrieved","author":"Native Experts The Cloud","year":"2024","unstructured":"The Cloud Native Experts. 2022. Software Supply Chain Attacks: 6 Examples and 6 Defensive Strategies. https:\/\/www.aquasec.com\/cloud-native-academy\/supply-chain-security\/software-supply-chain-attacks Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.49"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354227"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2879605"},{"key":"e_1_3_2_1_17_1","volume-title":"An Empirical Study of Malicious Code In PyPI Ecosystem. In 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 166--177","author":"Guo Wenbo","year":"2023","unstructured":"Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, and Yang Liu. 2023. An Empirical Study of Malicious Code In PyPI Ecosystem. In 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 166--177."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00124"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/docs.docker.com\/reference\/cli\/docker\/container\/run Retrieved","author":"Docker Inc. 2024a. Docker Docs.","year":"2024","unstructured":"Docker Inc. 2024a. Docker Docs. https:\/\/docs.docker.com\/reference\/cli\/docker\/container\/run Retrieved March 31, 2024 from"},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/hub.docker.com Retrieved","author":"Docker Inc. 2024b. Docker Hub.","year":"2024","unstructured":"Docker Inc. 2024b. Docker Hub. https:\/\/hub.docker.com Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_21_1","volume-title":"Docker HUB API. https:\/\/docs.docker.com\/reference\/api\/hub\/latest Retrieved","author":"Docker Inc. 2024c.","year":"2024","unstructured":"Docker Inc. 2024c. Docker HUB API. https:\/\/docs.docker.com\/reference\/api\/hub\/latest Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_22_1","volume-title":"2024 d. Docker Hub The world's largest container registry. https:\/\/www.docker.com\/products\/docker-hub Retrieved","author":"Docker Inc.","year":"2024","unstructured":"Docker Inc. 2024 d. Docker Hub The world's largest container registry. https:\/\/www.docker.com\/products\/docker-hub Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_23_1","volume-title":"2024 e. Docker Scout. https:\/\/docs.docker.com\/scout Retrieved","author":"Docker Inc.","year":"2024","unstructured":"Docker Inc. 2024 e. Docker Scout. https:\/\/docs.docker.com\/scout Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_24_1","volume-title":"2024 f. Dockerfile reference. https:\/\/docs.docker.com\/reference\/dockerfile Retrieved","author":"Docker Inc.","year":"2024","unstructured":"Docker Inc. 2024 f. Dockerfile reference. https:\/\/docs.docker.com\/reference\/dockerfile Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_25_1","volume-title":"2024 g. Running containers. https:\/\/docs.docker.com\/engine\/containers\/run Retrieved","author":"Docker Inc.","year":"2024","unstructured":"Docker Inc. 2024 g. Running containers. https:\/\/docs.docker.com\/engine\/containers\/run Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_26_1","volume-title":"The menlo report: Ethical principles guiding information and communication technology research. Available at SSRN 2445102","author":"Kenneally Erin","year":"2012","unstructured":"Erin Kenneally and David Dittrich. 2012. The menlo report: Ethical principles guiding information and communication technology research. Available at SSRN 2445102 (2012)."},{"key":"e_1_3_2_1_27_1","volume-title":"DIMVA 2017, Bonn, Germany, July 6--7, 2017, Proceedings 14","author":"Lei Lingguang","year":"2017","unstructured":"Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, and Qi Li. 2017. SPEAKER: Split-phase execution of application containers. In Detection of Intrusions and Malware, and Vulnerability Assessment: 14th International Conference, DIMVA 2017, Bonn, Germany, July 6--7, 2017, Proceedings 14. Springer, 230--251."},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/github.com\/docker-library\/official-images Retrieved","author":"Library Docker","year":"2024","unstructured":"Docker Library. 2024. Official Images. https:\/\/github.com\/docker-library\/official-images Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00043"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274720"},{"key":"e_1_3_2_1_31_1","volume-title":"How I was hacking docker containers by exploiting ImageMagick vulnerabilities. https:\/\/snyk.io\/blog\/hacking-docker-containers-by-exploiting-base-image-vulnerabilities Retrieved","author":"Liran Tal","year":"2024","unstructured":"Tal Liran. 2021. How I was hacking docker containers by exploiting ImageMagick vulnerabilities. https:\/\/snyk.io\/blog\/hacking-docker-containers-by-exploiting-base-image-vulnerabilities Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_32_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Liu Guannan","year":"2022","unstructured":"Guannan Liu, Xing Gao, Haining Wang, and Kun Sun. 2022. Exploring the unchartered space of container registry typosquatting. In 31st USENIX Security Symposium (USENIX Security 22). 35--51."},{"key":"e_1_3_2_1_33_1","volume-title":"ESORICS 2020, Guildford, UK, September 14--18, 2020, Proceedings, Part I 25","author":"Liu Peiyu","year":"2020","unstructured":"Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, and Raheem Beyah. 2020. Understanding the security risks of docker hub. In Computer Security--ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14--18, 2020, Proceedings, Part I 25. Springer, 257--276."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Michael Meli Matthew R McNiece and Bradley Reaves. 2019. How bad can it git? characterizing secret leakage in public github repositories.. In NDSS.","DOI":"10.14722\/ndss.2019.23418"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103478"},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/www.mongodb.com Retrieved","author":"DB.","year":"2024","unstructured":"MongoDB. 2024. MongoDB. https:\/\/www.mongodb.com Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_37_1","volume-title":"https:\/\/neo4j.com Retrieved","year":"2024","unstructured":"Neo4j. 2024. Neo4j. https:\/\/neo4j.com Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_38_1","volume-title":"National Vulnerability Database. https:\/\/nvd.nist.gov\/vuln\/data-feeds Retrieved","author":"NIST.","year":"2024","unstructured":"NIST. 2024. National Vulnerability Database. https:\/\/nvd.nist.gov\/vuln\/data-feeds Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_39_1","volume-title":"https:\/\/chatgpt.com Retrieved","author":"AI.","year":"2024","unstructured":"OpenAI. 2024. ChatGPT. https:\/\/chatgpt.com Retrieved August 20, 2024 from"},{"key":"e_1_3_2_1_40_1","volume-title":"malicious packages. https:\/\/github.com\/ossf\/malicious-packages Retrieved","author":"SSF.","year":"2024","unstructured":"OpenSSF. 2024. malicious packages. https:\/\/github.com\/ossf\/malicious-packages Retrieved May 09, 2024 from"},{"key":"e_1_3_2_1_41_1","volume-title":"Docker Security Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Docker_Security_Cheat_Sheet.html Retrieved","author":"OWASP.","year":"2024","unstructured":"OWASP. 2024. Docker Security Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Docker_Security_Cheat_Sheet.html Retrieved April 30, 2024 from"},{"key":"e_1_3_2_1_42_1","volume-title":"Thousands of secrets lurk in app images on Docker Hub. https:\/\/securityaffairs.com\/154957\/security\/secrets-exposed-on-docker-hub.html Retrieved","author":"Pierluigi Paganini","year":"2024","unstructured":"Paganini Pierluigi. 2023. Thousands of secrets lurk in app images on Docker Hub. https:\/\/securityaffairs.com\/154957\/security\/secrets-exposed-on-docker-hub.html Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_43_1","volume-title":"https:\/\/github.com\/quay\/clair Retrieved","year":"2024","unstructured":"Quay. 2024. Clair. https:\/\/github.com\/quay\/clair Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_44_1","volume-title":"https:\/\/github.com\/scrapy\/scrapy Retrieved","year":"2024","unstructured":"Scrapy. 2024. Scrapy. https:\/\/github.com\/scrapy\/scrapy Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_45_1","volume-title":"https:\/\/github.com\/aquasecurity\/trivy Retrieved","author":"Security Aqua","year":"2024","unstructured":"Aqua Security. 2024a. Trivy. https:\/\/github.com\/aquasecurity\/trivy Retrieved March 19, 2024 from"},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/github.com\/telekom-security\/tpotce Retrieved","author":"Security Telekom","year":"2024","unstructured":"Telekom Security. 2024b. T-Pot. https:\/\/github.com\/telekom-security\/tpotce Retrieved May 20, 2024 from"},{"key":"e_1_3_2_1_47_1","unstructured":"Truffle Security. 2024c. Trufflehog. ''https:\/\/github.com\/trufflesecurity\/trufflehog'' Retrieved March 31 2024 from"},{"key":"e_1_3_2_1_48_1","volume-title":"https:\/\/github.com\/SecurityFail\/kompromat Retrieved","year":"2024","unstructured":"SecurityFail. 2024. Kompromat. https:\/\/github.com\/SecurityFail\/kompromat Retrieved May 10, 2024 from"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. 269--280","author":"Enck W","year":"2017","unstructured":"Enck W Shu R, Gu X. 2017. A study of security vulnerabilities on docker hub. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. 269--280."},{"key":"e_1_3_2_1_50_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Sun Yuqiong","year":"2018","unstructured":"Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, and Trent Jaeger. 2018. Security namespace: making linux security frameworks available to containers. In 27th USENIX Security Symposium (USENIX Security 18). 1423--1439."},{"key":"e_1_3_2_1_51_1","volume-title":"https:\/\/hub.docker.com\/r\/taskesenbey\/taskesen Retrieved","year":"2024","unstructured":"Taskesenbey. 2022. Taskesen. https:\/\/hub.docker.com\/r\/taskesenbey\/taskesen Retrieved August 20, 2024 from"},{"key":"e_1_3_2_1_52_1","volume-title":"https:\/\/github.com\/xmrig\/xmrig Retrieved","year":"2024","unstructured":"XMRig. 2024. XMRig. https:\/\/github.com\/xmrig\/xmrig Retrieved May 17, 2024 from"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484744"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564634"},{"key":"e_1_3_2_1_55_1","volume-title":"On the relation between outdated docker containers, severity vulnerabilities, and bugs. In 2019 ieee 26th international conference on software analysis, evolution and reengineering (saner)","author":"Zerouali Ahmed","unstructured":"Ahmed Zerouali, Tom Mens, Gregorio Robles, and Jesus M Gonzalez-Barahona. 2019. On the relation between outdated docker containers, severity vulnerabilities, and bugs. In 2019 ieee 26th international conference on software analysis, evolution and reengineering (saner). IEEE, 491--501."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00064"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:56Z","timestamp":1750295936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714653"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":56,"alternative-id":["10.1145\/3696410.3714653","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714653","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}