{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:12Z","timestamp":1740102252985,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","funder":[{"name":"Institute for Information & communication Technology Planning & Evaluation (IITP)","award":["No.2018-0-00532, No.2019-0-01343, No.2022-0-00995, No.2022-0-00688"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607244","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"669-685","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Why Johnny Can\u2019t Use Secure Docker Images: Investigating the Usability Challenges in Using Docker Image Vulnerability Scanners through Heuristic Evaluation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7505-7931","authenticated-orcid":false,"given":"Taeyoung","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9849-9599","authenticated-orcid":false,"given":"Seonhye","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1605-3866","authenticated-orcid":false,"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Dagda. Retrieved Feburary 15 2023 from https:\/\/github.com\/eliasgranderubio\/dagda.git"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Engine Anchore","year":"2022","unstructured":"2022. Anchore Engine. Retrieved December 11, 2022 from https:\/\/github.com\/anchore\/anchore-engine.git"},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Docker. Retrieved February 27 2023 from https:\/\/www.docker.com\/"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_4_1","unstructured":"2022. Docker hub. Retrieved December 10, 2022 from https:\/\/hub.docker.com\/"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_5_1","unstructured":"2022. Snyk. Retrieved December 11, 2022 from https:\/\/snyk.io\/"},{"volume-title":"Retrieved","year":"2022","key":"e_1_3_2_1_6_1","unstructured":"2022. Trivy. Retrieved December 11, 2022 from https:\/\/github.com\/aquasecurity\/trivy.git"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Clair. Retrieved February 14 2023 from https:\/\/github.com\/quay\/clair"},{"volume-title":"Retrieved","year":"2023","key":"e_1_3_2_1_8_1","unstructured":"2023. Docker Bench security. Retrieved February 14, 2023 from https:\/\/github.com\/docker\/docker-bench-security"},{"volume-title":"gocui. Retrieved march 20","year":"2023","key":"e_1_3_2_1_9_1","unstructured":"2023. gocui. Retrieved march 20, 2023 from https:\/\/github.com\/jroimartin\/gocui"},{"key":"e_1_3_2_1_10_1","unstructured":"2023. Grype. Retrieved Feburary 15 2023 from https:\/\/github.com\/anchore\/grype.git"},{"volume-title":"pyCUI. Retrieved","year":"2023","key":"e_1_3_2_1_11_1","unstructured":"2023. pyCUI. Retrieved March 29, 2023 from https:\/\/github.com\/jwlodek\/py_cui"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Raniah\u00a0N Aldekhyyel Jwaher\u00a0A Almulhem and Samar Binkheder. 2021. Usability of telemedicine mobile applications during COVID-19 in Saudi Arabia: A heuristic evaluation of patient user interfaces. In Healthcare Vol.\u00a09. MDPI 1574.","DOI":"10.3390\/healthcare9111574"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031195"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.111"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3004525"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER52604.2021.00029"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC47050.2019.9064441"},{"key":"e_1_3_2_1_19_1","volume-title":"Users\u2019 Perceptions of Chrome Compromised Credential Notification. In Symposium on Usable Privacy and Security (SOUPS). 155\u2013174","author":"Huang Yue","year":"2022","unstructured":"Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov. 2022. Users\u2019 Perceptions of Chrome Compromised Credential Notification. In Symposium on Usable Privacy and Security (SOUPS). 155\u2013174."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Omar Javed and Salman Toor. 2021. Understanding the quality of container security vulnerability detection tools. https:\/\/doi.org\/10.48550\/ARXIV.2101.03844","DOI":"10.48550\/ARXIV.2101.03844"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108862"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Christina Koeffel Wolfgang Hochleitner Jakob Leitner Michael Haller Arjan Geven and Manfred Tscheligi. 2010. Using heuristics to evaluate the overall user experience of video games and advanced interaction games. (2010). https:\/\/doi.org\/10.1007\/978-1-84882-963-3_13","DOI":"10.1007\/978-1-84882-963-3_13"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_13"},{"key":"e_1_3_2_1_25_1","article-title":"Docker: lightweight linux containers for consistent development and deployment","volume":"2014","author":"Merkel Dirk","year":"2014","unstructured":"Dirk Merkel. 2014. Docker: lightweight linux containers for consistent development and deployment. Linux Journal 2014, 239 (2014).","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_26_1","unstructured":"Douglas\u00a0C Montgomery. 2017. Design and analysis of experiments. John wiley & sons."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534374"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved Feburary 15","author":"Nielsen Jakob","year":"1994","unstructured":"Jakob Nielsen. 1994. Severity Ratings for Usability Problems. Retrieved Feburary 15, 2023 from https:\/\/www.nngroup.com\/articles\/how-to-rate-the-severity-of-usability-problems\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Jakob Nielsen. 2005. Ten usability heuristics."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97281"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357282"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_32_1","unstructured":"Prevasio. 2020. Operation Red Kangaroo. Retrieved May 24, 2022 from https:\/\/knowledge-base.prevasio.io\/pdf.html?file=Red_Kangaroo.pdf"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc0903_2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029832"},{"key":"e_1_3_2_1_35_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). 221\u2013238","author":"Smith Justin","year":"2020","unstructured":"Justin Smith, Lisa Nguyen\u00a0Quang Do, and Emerson Murphy-Hill. 2020. Why can\u2019t johnny fix vulnerabilities: A usability evaluation of static analysis tools for security. In Symposium on Usable Privacy and Security (SOUPS). 221\u2013238."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786812"},{"volume-title":"Retrieved","year":"2023","key":"e_1_3_2_1_37_1","unstructured":"Snyk. 2023. Fixed in version vs. fixable attribute in vulnerabilities. Retrieved Feb 12, 2023 from https:\/\/docs.snyk.io\/manage-issues\/starting-to-fix-vulnerabilities\/fixed-in-version-vs.-fixable-attribute-in-vulnerabilities"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445616"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2019.00026"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503460"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394504.1394506"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71017-0_22"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546932.3547000"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1532-0464(03)00060-1"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:28:18Z","timestamp":1729074498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":45,"alternative-id":["10.1145\/3607199.3607244","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607244","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}