2023
DOI: 10.1007/s10664-023-10330-x
|View full text |Cite
|
Sign up to set email alerts
|

An empirical study of vulnerabilities in edge frameworks to support security testing improvement

Abstract: Edge computing is a distributed computing paradigm aiming at ensuring low latency in modern data intensive applications (e.g., video streaming and IoT). It consists of deploying computation and storage nodes close to the end-users. Unfortunately, being distributed and close to end-users, Edge systems have a wider attack surface (e.g., they may be physically reachable) and are more complex to update than other types of systems (e.g., Cloud systems) thus requiring thorough security testing activities, possibly t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…Besides being commonly used as targets of fuzzing techniques (Candea and Godefroid 2019 ; Malik and Pastore 2023 ; Payer 2019 ), assertions can model a broad range of safety properties (Lamport 1977 ). These include memory-related errors (e.g., violating corresponds to a null pointer dereferencing error), as well as (partial) correctness errors (e.g., violating corresponds to a postcondition error), but exclude liveness properties such as termination.…”
Section: Experimental Designmentioning
confidence: 99%
“…Besides being commonly used as targets of fuzzing techniques (Candea and Godefroid 2019 ; Malik and Pastore 2023 ; Payer 2019 ), assertions can model a broad range of safety properties (Lamport 1977 ). These include memory-related errors (e.g., violating corresponds to a null pointer dereferencing error), as well as (partial) correctness errors (e.g., violating corresponds to a postcondition error), but exclude liveness properties such as termination.…”
Section: Experimental Designmentioning
confidence: 99%
“…The utilization of specialized frameworks that provide tools and methodologies for conducting comprehensive security testing is crucial [194][195][196]. These frameworks encompass a range of techniques, including vulnerability scanning, code analysis, and security assessment [196][197][198].…”
Section: Security Testing Frameworkmentioning
confidence: 99%
“…The utilization of specialized frameworks that provide tools and methodologies for conducting comprehensive security testing is crucial [194][195][196]. These frameworks encompass a range of techniques, including vulnerability scanning, code analysis, and security assessment [196][197][198]. They assist in automating security testing processes, identifying security weaknesses, and ensuring adherence to established security standards [199][200][201].…”
Section: Security Testing Frameworkmentioning
confidence: 99%