SoK: Benchmarking Flaws in Systems Security

被引:13
|
作者
van der Kouwe, Erik [1 ]
Heiser, Gernot [3 ,4 ]
Andriesse, Dennis [2 ]
Bos, Herbert [2 ]
Giuffrida, Cristiano [2 ]
机构
[1] Leiden Univ, Leiden, Netherlands
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] NICTA, Data61, Sydney, NSW, Australia
[4] UNSW, Sydney, NSW, Australia
关键词
benchmarking; computer systems; security;
D O I
10.1109/EuroSP.2019.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Properly benchmarking a system is a difficult and intricate task. Even a seemingly innocuous mistake can compromise the guarantees provided by a systems security defense and threaten reproducibility and comparability. Moreover, as many modern defenses trade security for performance, the damage caused by benchmarking mistakes is increasingly worrying. To analyze the magnitude of the phenomenon, we identify 22 benchmarking flaws that threaten the validity of systems security evaluations, and survey 50 defense papers published in top venues. We show that benchmarking flaws are widespread even in papers published at tier-1 venues; tier-1 papers contain an average of five benchmarking flaws and we find only a single paper in our sample without any benchmarking flaws. Moreover, the scale of the problem appears constant over time, suggesting that the community is not yet taking sufficient countermeasures. This threatens the scientific process, which relies on reproducibility and comparability to ensure that published research advances the state of the art. We hope to raise awareness and provide recommendations for improving benchmarking quality and safeguard the scientific process in our community.
引用
收藏
页码:310 / 325
页数:16
相关论文
共 50 条
  • [21] SoK: Rowhammer on Commodity Operating Systems
    Zhang, Zhi
    Chen, Decheng
    Qi, Jiahao
    Cheng, Yueqiang
    Jiang, Shijie
    Lin, Yiyang
    Gao, Yansong
    Nepal, Surya
    Zou, Yi
    Zhang, Jiliang
    Xiang, Yang
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 436 - 452
  • [22] Benchmarking the Performance Impact of Transport Layer Security in Cloud Database Systems
    Mueller, Steffen
    Bermbach, David
    Tai, Stefan
    Pallas, Frank
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 27 - 36
  • [23] An ontology description for SIP security flaws
    Geneiatakis, Dimitris
    Lambrinoudakis, Costas
    COMPUTER COMMUNICATIONS, 2007, 30 (06) : 1367 - 1374
  • [24] Quantum snake oil and security flaws
    D'Oliveiro, Lawrence
    NEW SCIENTIST, 2015, 228 (3049) : 52 - 52
  • [25] Lotus domino security flaws redux
    Hancock, B
    COMPUTERS & SECURITY, 1998, 17 (07) : 565 - 566
  • [26] SoK: Cyber Insurance - Technical Challenges and a System Security Roadmap
    Dambra, Savino
    Bilge, Leyla
    Balzarotti, Davide
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1367 - 1383
  • [27] SoK: Single Sign-On Security - An Evaluation of OpenID Connect
    Mainka, Christian
    Mladenov, Vladislav
    Schwenk, Joerg
    Wich, Tobias
    2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 251 - 266
  • [28] SoK: Security Evaluation of Home-Based IoT Deployments
    Alrawi, Omar
    Lever, Chaz
    Antonakakis, Manos
    Monrose, Fabian
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
  • [29] SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability
    Bhusal, Dipkamal
    Shin, Rosalyn
    Shewale, Ajay Ashok
    Veerabhadran, Monish Kumar Manikya
    Clifford, Michael
    Rampazzi, Sara
    Rastogi, Nidhi
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [30] SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare
    Tazi, Faiza
    Dykstra, Josiah
    Rajivan, Prashanth
    Das, Sanchari
    SOCIO-TECHNICAL ASPECTS IN SECURITY, STAST 2021, 2022, 13176 : 153 - 181