An empirical study of vulnerabilities in edge frameworks to support security testing improvement

被引:3
|
作者
Malik, Jahanzaib [1 ]
Pastore, Fabrizio [1 ]
机构
[1] Univ Luxembourg, SnT Ctr, 29 Ave John F Kennedy, Luxembourg, Luxembourg
关键词
Security testing; Edge computing; Empirical study;
D O I
10.1007/s10664-023-10330-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Edge computing is a distributed computing paradigm aiming at ensuring low latency in modern data intensive applications (e.g., video streaming and IoT). It consists of deploying computation and storage nodes close to the end-users. Unfortunately, being distributed and close to end-users, Edge systems have a wider attack surface (e.g., they may be physically reachable) and are more complex to update than other types of systems (e.g., Cloud systems) thus requiring thorough security testing activities, possibly tailored to be cost-effective. To support the development of effective and automated Edge security testing solutions, we conducted an empirical study of vulnerabilities affecting Edge frameworks. The study is driven by eight research questions that aim to determine what test triggers, test harnesses, test oracles, and input types should be considered when defining new security testing approaches dedicated to Edge systems. preconditions and inputs leading to a successful exploit, the security properties being violated, the most frequent vulnerability types, the software behaviours and developer mistakes associated to these vulnerabilities, and the severity of Edge vulnerabilities. We have inspected 147 vulnerabilities of four popular Edge frameworks. Our findings indicate that vulnerabilities slip through the testing process because of the complexity of the Edge features. Indeed, they can't be exhaustively tested in-house because of the large number of combinations of inputs, outputs, and interfaces to be tested. Since we observed that most of the vulnerabilities do not affect the system integrity and, further, only one action (e.g., requesting a URL) is sufficient to exploit a vulnerability
引用
收藏
页数:65
相关论文
共 50 条
  • [1] An empirical study of vulnerabilities in edge frameworks to support security testing improvement
    Jahanzaib Malik
    Fabrizio Pastore
    [J]. Empirical Software Engineering, 2023, 28
  • [2] Forecasting IT security vulnerabilities - An empirical analysis
    Yasasin, Emrah
    Prester, Julian
    Wagner, Gerit
    Schryen, Guido
    [J]. COMPUTERS & SECURITY, 2020, 88
  • [3] Automatic Testing of Program Security Vulnerabilities
    Shahriar, Hossain
    Zulkernine, Mohammad
    [J]. 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1223 - 1228
  • [4] Empirical analysis of security vulnerabilities in Python packages
    Mahmoud Alfadel
    Diego Elias Costa
    Emad Shihab
    [J]. Empirical Software Engineering, 2023, 28
  • [5] Competition and patching of security vulnerabilities: An empirical analysis
    Arora, Ashish
    Forman, Chris
    Nandkumar, Anand
    Telang, Rahul
    [J]. INFORMATION ECONOMICS AND POLICY, 2010, 22 (02) : 164 - 177
  • [6] An Empirical Study on the Usage of Mocking Frameworks in Software Testing
    Mostafa, Shaikh
    Wang, Xiaoyin
    [J]. 2014 14TH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE (QSIC 2014), 2014, : 127 - 132
  • [7] PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities
    Li, Qiang
    Song, Jinke
    Tan, Dawei
    Wang, Haining
    Liu, Jiqiang
    [J]. 51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2021), 2021, : 161 - 173
  • [8] Security Vulnerabilities in Categories of Clones and Non-Cloned Code: An Empirical Study
    Islam, Md Rakibul
    Zibran, Minhaz F.
    Nagpal, Aayush
    [J]. 11TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2017), 2017, : 20 - 29
  • [9] An Empirical Investigation of Security Vulnerabilities within Web Applications
    Abunadi, Ibrahim
    Alenezi, Mamdouh
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 537 - 551
  • [10] Empirical analysis of security vulnerabilities in Python']Python packages
    Alfadel, Mahmoud
    Costa, Diego Elias
    Shihab, Emad
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (03)