Abstract
AbstractEdge computing is a distributed computing paradigm aiming at ensuring low latency in modern data intensive applications (e.g., video streaming and IoT). It consists of deploying computation and storage nodes close to the end-users. Unfortunately, being distributed and close to end-users, Edge systems have a wider attack surface (e.g., they may be physically reachable) and are more complex to update than other types of systems (e.g., Cloud systems) thus requiring thorough security testing activities, possibly tailored to be cost-effective. To support the development of effective and automated Edge security testing solutions, we conducted an empirical study of vulnerabilities affecting Edge frameworks. The study is driven by eight research questions that aim to determine what test triggers, test harnesses, test oracles, and input types should be considered when defining new security testing approaches dedicated to Edge systems. preconditions and inputs leading to a successful exploit, the security properties being violated, the most frequent vulnerability types, the software behaviours and developer mistakes associated to these vulnerabilities, and the severity of Edge vulnerabilities. We have inspected 147 vulnerabilities of four popular Edge frameworks. Our findings indicate that vulnerabilities slip through the testing process because of the complexity of the Edge features. Indeed, they can’t be exhaustively tested in-house because of the large number of combinations of inputs, outputs, and interfaces to be tested. Since we observed that most of the vulnerabilities do not affect the system integrity and, further, only one action (e.g., requesting a URL) is sufficient to exploit a vulnerability
Funder
Fonds National de la Recherche Luxembourg
Publisher
Springer Science and Business Media LLC
Reference146 articles.
1. Jude A (2023) How will 5G and edge computing transform the future of mobile gaming? Last Accessed: 2023. https://www.ericsson.com/en/blog/2021/3/5g-edge-computing-gaming
2. Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M (2021) A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet of Things Journal 8(6):4004–4022. https://doi.org/10.1109/JIOT.2020.3015432
3. Ammann P, Offutt J (2016) Introduction to software testing -, 2nd edn. Cambridge University Press
4. Analysis Tools team (2022) Static analysis tools for GO Last Accessed: 2022. https://analysis-tools.dev/tag/go
5. Apache foundation (2022) Last Accessed: 2022. https://www.apache.org/
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献