Article (Scientific journals)
An empirical study of vulnerabilities in edge frameworks to support security testing improvement
MALIK, Jahanzaib; PASTORE, Fabrizio
2023In Empirical Software Engineering, 28 (4)
Peer Reviewed verified by ORBi Dataset
 

Files


Full Text
Jahazaib_VulnerabilitiesOfEdgeFrameworks.pdf
Author postprint (1.3 MB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Edge computing; Empirical study; Security testing; Computation nodes; Computing paradigm; Data-intensive application; Empirical studies; End-users; Low latency; Storage nodes; Video-streaming; Software
Abstract :
[en] Edge computing is a distributed computing paradigm aiming at ensuring low latency in modern data intensive applications (e.g., video streaming and IoT). It consists of deploying computation and storage nodes close to the end-users. Unfortunately, being distributed and close to end-users, Edge systems have a wider attack surface (e.g., they may be physically reachable) and are more complex to update than other types of systems (e.g., Cloud systems) thus requiring thorough security testing activities, possibly tailored to be cost-effective. To support the development of effective and automated Edge security testing solutions, we conducted an empirical study of vulnerabilities affecting Edge frameworks. The study is driven by eight research questions that aim to determine what test triggers, test harnesses, test oracles, and input types should be considered when defining new security testing approaches dedicated to Edge systems. preconditions and inputs leading to a successful exploit, the security properties being violated, the most frequent vulnerability types, the software behaviours and developer mistakes associated to these vulnerabilities, and the severity of Edge vulnerabilities. We have inspected 147 vulnerabilities of four popular Edge frameworks. Our findings indicate that vulnerabilities slip through the testing process because of the complexity of the Edge features. Indeed, they can’t be exhaustively tested in-house because of the large number of combinations of inputs, outputs, and interfaces to be tested. Since we observed that most of the vulnerabilities do not affect the system integrity and, further, only one action (e.g., requesting a URL) is sufficient to exploit a vulnerability
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > SVV - Software Verification and Validation
Disciplines :
Computer science
Author, co-author :
MALIK, Jahanzaib  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SVV
PASTORE, Fabrizio  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SVV
External co-authors :
no
Language :
English
Title :
An empirical study of vulnerabilities in edge frameworks to support security testing improvement
Publication date :
05 July 2023
Journal title :
Empirical Software Engineering
ISSN :
1382-3256
eISSN :
1573-7616
Publisher :
Springer
Volume :
28
Issue :
4
Peer reviewed :
Peer Reviewed verified by ORBi
Name of the research project :
R-AGR-3929 - IPBG19/14016225/INSTRUCT - SES (01/10/2020 - 30/09/2026) - CHATZINOTAS Symeon
Funders :
Fonds National de la Recherche Luxembourg
Funding text :
This work has been supported by SES Luxembourg () and the Luxembourg National Research Fund (FNR) under the project INSTRUCT (Luxembourg National Research Fund ).
Available on ORBilu :
since 03 November 2023

Statistics


Number of views
168 (7 by Unilu)
Number of downloads
151 (1 by Unilu)

Scopus citations®
 
7
Scopus citations®
without self-citations
7
OpenCitations
 
0
OpenAlex citations
 
9
WoS citations
 
4

Bibliography


Similar publications



Contact ORBilu