An empirical study of vulnerabilities in edge frameworks to support security testing improvement

被引:3
|
作者
Malik, Jahanzaib [1 ]
Pastore, Fabrizio [1 ]
机构
[1] Univ Luxembourg, SnT Ctr, 29 Ave John F Kennedy, Luxembourg, Luxembourg
关键词
Security testing; Edge computing; Empirical study;
D O I
10.1007/s10664-023-10330-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Edge computing is a distributed computing paradigm aiming at ensuring low latency in modern data intensive applications (e.g., video streaming and IoT). It consists of deploying computation and storage nodes close to the end-users. Unfortunately, being distributed and close to end-users, Edge systems have a wider attack surface (e.g., they may be physically reachable) and are more complex to update than other types of systems (e.g., Cloud systems) thus requiring thorough security testing activities, possibly tailored to be cost-effective. To support the development of effective and automated Edge security testing solutions, we conducted an empirical study of vulnerabilities affecting Edge frameworks. The study is driven by eight research questions that aim to determine what test triggers, test harnesses, test oracles, and input types should be considered when defining new security testing approaches dedicated to Edge systems. preconditions and inputs leading to a successful exploit, the security properties being violated, the most frequent vulnerability types, the software behaviours and developer mistakes associated to these vulnerabilities, and the severity of Edge vulnerabilities. We have inspected 147 vulnerabilities of four popular Edge frameworks. Our findings indicate that vulnerabilities slip through the testing process because of the complexity of the Edge features. Indeed, they can't be exhaustively tested in-house because of the large number of combinations of inputs, outputs, and interfaces to be tested. Since we observed that most of the vulnerabilities do not affect the system integrity and, further, only one action (e.g., requesting a URL) is sufficient to exploit a vulnerability
引用
收藏
页数:65
相关论文
共 50 条
  • [21] The sigmoidal growth of operating system security vulnerabilities: An empirical revisit
    Ruohonen, Jukka
    Hyrynsalmi, Sami
    Leppanen, Ville
    [J]. COMPUTERS & SECURITY, 2015, 55 : 1 - 20
  • [22] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    [J]. 2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [23] A Study of Security Vulnerabilities on Docker Hub
    Shu, Rui
    Gu, Xiaohui
    Enck, William
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 269 - 280
  • [24] Security vulnerabilities in computer software testing technology and its application
    Lan, Jiang
    [J]. INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 541 - 545
  • [25] Analysis of Software Vulnerabilities, Measures for Prevention and Protection and Security Testing
    Nakov, Ognian
    Trifonov, Roumen
    Pavlova, Galya
    Nakov, Plamen
    [J]. 2021 29TH NATIONAL CONFERENCE WITH INTERNATIONAL PARTICIPATION (TELECOM), 2021, : 73 - 76
  • [26] The Importance of Testing Smart Grid IEDs against Security Vulnerabilities
    Weerathunga, Pubudu Eroshan
    Cioraca, Anca
    [J]. 2016 69TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS (CPRE), 2016,
  • [27] An Empirical Model to Predict Security Vulnerabilities using Code Complexity Metrics
    Shin, Yonghee
    Williams, Laurie
    [J]. ESEM'08: PROCEEDINGS OF THE 2008 ACM-IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2008, : 315 - 317
  • [28] Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey
    El Bouanani, Salim
    Achbarou, Omar
    Kiram, My Ahmed
    Outchakoucht, Aissam
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (10) : 337 - 345
  • [29] An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios
    Nunes, Paulo
    Medeiros, Iberia
    Fonseca, Jose
    Neves, Nuno
    Correia, Miguel
    Vieira, Marco
    [J]. COMPUTING, 2019, 101 (02) : 161 - 185
  • [30] Machine Learning to Combine Static Analysis Alerts with Software Metrics to Detect Security Vulnerabilities: An Empirical Study
    Pereira, Jose D'Abruzzo
    Campos, Joao R.
    Vieira, Marco
    [J]. 2021 17TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2021), 2021, : 1 - 8