Mining container image repositories for software configuration and beyond

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper introduces the idea of mining container image repositories for configuration and other deployment information of software systems. Unlike traditional software repositories (e.g., source code repositories and app stores), image repositories encapsulate the entire execution ecosystem for running target software, including its configurations, dependent libraries and components, and OS-level utilities, which contributes to a wealth of data and information. We showcase the opportunities based on concrete software engineering tasks that can benefit from mining image repositories. To facilitate future mining efforts, we summarize the challenges of analyzing image repositories and the approaches that can address these challenges. We hope that this paper will stimulate exciting research agenda of mining this emerging type of software repositories.

Original languageEnglish (US)
Title of host publicationProceedings 2018 ACM/IEEE 40th International Conference on Software Engineering
Subtitle of host publicationNew Ideas and Emerging Results, ICSE-NIER 2018
PublisherIEEE Computer Society
Pages49-52
Number of pages4
ISBN (Electronic)9781450356626
DOIs
StatePublished - May 27 2018
Event40th ACM/IEEE International Conference on Software Engineering: New Ideas and Emerging Results, ICSE-NIER 2018 - Gothenburg, Sweden
Duration: May 30 2018Jun 1 2018

Publication series

NameProceedings - International Conference on Software Engineering
ISSN (Print)0270-5257

Other

Other40th ACM/IEEE International Conference on Software Engineering: New Ideas and Emerging Results, ICSE-NIER 2018
Country/TerritorySweden
CityGothenburg
Period5/30/186/1/18

Keywords

  • Container
  • Docker
  • configuration
  • image
  • software repository

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Mining container image repositories for software configuration and beyond'. Together they form a unique fingerprint.

Cite this