An empirical study of vulnerabilities in edge frameworks to support security testing improvement

被引:3
|
作者
Malik, Jahanzaib [1 ]
Pastore, Fabrizio [1 ]
机构
[1] Univ Luxembourg, SnT Ctr, 29 Ave John F Kennedy, Luxembourg, Luxembourg
关键词
Security testing; Edge computing; Empirical study;
D O I
10.1007/s10664-023-10330-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Edge computing is a distributed computing paradigm aiming at ensuring low latency in modern data intensive applications (e.g., video streaming and IoT). It consists of deploying computation and storage nodes close to the end-users. Unfortunately, being distributed and close to end-users, Edge systems have a wider attack surface (e.g., they may be physically reachable) and are more complex to update than other types of systems (e.g., Cloud systems) thus requiring thorough security testing activities, possibly tailored to be cost-effective. To support the development of effective and automated Edge security testing solutions, we conducted an empirical study of vulnerabilities affecting Edge frameworks. The study is driven by eight research questions that aim to determine what test triggers, test harnesses, test oracles, and input types should be considered when defining new security testing approaches dedicated to Edge systems. preconditions and inputs leading to a successful exploit, the security properties being violated, the most frequent vulnerability types, the software behaviours and developer mistakes associated to these vulnerabilities, and the severity of Edge vulnerabilities. We have inspected 147 vulnerabilities of four popular Edge frameworks. Our findings indicate that vulnerabilities slip through the testing process because of the complexity of the Edge features. Indeed, they can't be exhaustively tested in-house because of the large number of combinations of inputs, outputs, and interfaces to be tested. Since we observed that most of the vulnerabilities do not affect the system integrity and, further, only one action (e.g., requesting a URL) is sufficient to exploit a vulnerability
引用
收藏
页数:65
相关论文
共 50 条
  • [31] Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security
    Zhang, Mengyuan
    de Carnavalet, Xavier de Carne
    Wang, Lingyu
    Ragab, Ahmed
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (09) : 2315 - 2330
  • [32] Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security
    Salas, M. I. P.
    Martins, E.
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2014, 302 : 133 - 154
  • [33] Architectural Security Weaknesses in Industrial Control Systems (ICS) An Empirical Study based on Disclosed Software Vulnerabilities
    Gonzalez, Danielle
    Alhenaki, Fawaz
    Mirakhorli, Mehdi
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA), 2019, : 31 - 40
  • [34] An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios
    Paulo Nunes
    Ibéria Medeiros
    José Fonseca
    Nuno Neves
    Miguel Correia
    Marco Vieira
    [J]. Computing, 2019, 101 : 161 - 185
  • [35] An Empirical Study of Gamification Frameworks
    Buckley, Patrick
    Noonan, Seamus
    Geary, Conor
    Mackessy, Thomas
    Nagle, Eoghan
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2019, 31 (01) : 22 - 38
  • [36] An Empirical Study on Android-related Vulnerabilities
    Linares-Vasquez, Mario
    Bavota, Gabriele
    Escobar-Velasquez, Camilo
    [J]. 2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017), 2017, : 2 - 13
  • [37] A Study of Security Vulnerabilities and Software Weaknesses in Vehicles
    Xiong, Wenjun
    Gulsever, Melek
    Kaya, Koray Mustafa
    Lagerstrom, Robert
    [J]. SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 204 - 218
  • [38] Addressing internet security vulnerabilities - A Benchmarking study
    Alayed, A
    Furnell, SM
    Barlow, IM
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 121 - 132
  • [39] An experimental study of security vulnerabilities caused by errors
    Xu, J
    Chen, S
    Kalbarczyk, Z
    Iyer, RK
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 421 - 430
  • [40] Augmented testing to support manual GUI-based regression testing: An empirical study
    Bauer, Andreas
    Frattini, Julian
    Alegroth, Emil
    [J]. EMPIRICAL SOFTWARE ENGINEERING, 2024, 29 (06)