SoK: Benchmarking Flaws in Systems Security

被引:11
|
作者
van der Kouwe, Erik [1 ]
Heiser, Gernot [3 ,4 ]
Andriesse, Dennis [2 ]
Bos, Herbert [2 ]
Giuffrida, Cristiano [2 ]
机构
[1] Leiden Univ, Leiden, Netherlands
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] NICTA, Data61, Sydney, NSW, Australia
[4] UNSW, Sydney, NSW, Australia
关键词
benchmarking; computer systems; security;
D O I
10.1109/EuroSP.2019.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Properly benchmarking a system is a difficult and intricate task. Even a seemingly innocuous mistake can compromise the guarantees provided by a systems security defense and threaten reproducibility and comparability. Moreover, as many modern defenses trade security for performance, the damage caused by benchmarking mistakes is increasingly worrying. To analyze the magnitude of the phenomenon, we identify 22 benchmarking flaws that threaten the validity of systems security evaluations, and survey 50 defense papers published in top venues. We show that benchmarking flaws are widespread even in papers published at tier-1 venues; tier-1 papers contain an average of five benchmarking flaws and we find only a single paper in our sample without any benchmarking flaws. Moreover, the scale of the problem appears constant over time, suggesting that the community is not yet taking sufficient countermeasures. This threatens the scientific process, which relies on reproducibility and comparability to ensure that published research advances the state of the art. We hope to raise awareness and provide recommendations for improving benchmarking quality and safeguard the scientific process in our community.
引用
收藏
页码:310 / 325
页数:16
相关论文
共 50 条
  • [1] Benchmarking Flaws Undermine Security Research
    van der Kouwe, Erik
    Heiser, Gernot
    Andriesse, Dennis
    Bos, Herbert
    Giuffrida, Cristiano
    [J]. IEEE SECURITY & PRIVACY, 2020, 18 (03) : 48 - 57
  • [2] SoK: Security in Real-Time Systems
    Hasan, Monowar
    Kashinath, Ashish
    Chen, Chien-Ying
    Mohan, Sibin
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (09)
  • [3] SoK: Benchmarking the Performance of a Quantum Computer
    Wang, Junchao
    Guo, Guoping
    Shan, Zheng
    [J]. ENTROPY, 2022, 24 (10)
  • [4] SoK: Sanitizing for Security
    Song, Dokyung
    Lettner, Julian
    Rajasekaran, Prabhu
    Na, Yeoul
    Volckaert, Stijn
    Larsen, Per
    Franz, Michael
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1275 - 1295
  • [5] SoK: Enabling Security Analyses of Embedded Systems via Rehosting
    Fasano, Andrew
    Ballo, Tiemoko
    Muench, Marius
    Leek, Tim
    Bulekov, Alexander
    Dolan-Gavitt, Brendan
    Egele, Manuel
    Francillon, Aurelien
    Lu, Long
    Gregory, Nick
    Balzarotti, Davide
    Robertson, William
    [J]. ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 687 - 701
  • [6] Critical security flaws in electronic commerce systems
    Moyer, Philip R.
    [J]. Computer Security Journal, 14 (04): : 7 - 15
  • [7] Serious Security Flaws Identified in Cloud Systems
    Garber, Lee
    [J]. COMPUTER, 2011, 44 (12) : 21 - 23
  • [8] SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
    Chen, Yuxuan
    Zhang, Jiangshan
    Yuan, Xuejing
    Zhang, Shengzhi
    Chen, Kai
    Wang, Xiaofeng
    Guo, Shanqing
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (03)
  • [9] SECURITY FLAWS
    Teodoro, Jose
    [J]. FILM COMMENT, 2019, 55 (05) : 50 - 53
  • [10] A Taxonomy for Security Flaws in Event-Based Systems
    Lee, Youn Kyu
    Kim, Dohoon
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (20): : 1 - 21