SoK: Benchmarking Flaws in Systems Security

被引:13
|
作者
van der Kouwe, Erik [1 ]
Heiser, Gernot [3 ,4 ]
Andriesse, Dennis [2 ]
Bos, Herbert [2 ]
Giuffrida, Cristiano [2 ]
机构
[1] Leiden Univ, Leiden, Netherlands
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] NICTA, Data61, Sydney, NSW, Australia
[4] UNSW, Sydney, NSW, Australia
关键词
benchmarking; computer systems; security;
D O I
10.1109/EuroSP.2019.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Properly benchmarking a system is a difficult and intricate task. Even a seemingly innocuous mistake can compromise the guarantees provided by a systems security defense and threaten reproducibility and comparability. Moreover, as many modern defenses trade security for performance, the damage caused by benchmarking mistakes is increasingly worrying. To analyze the magnitude of the phenomenon, we identify 22 benchmarking flaws that threaten the validity of systems security evaluations, and survey 50 defense papers published in top venues. We show that benchmarking flaws are widespread even in papers published at tier-1 venues; tier-1 papers contain an average of five benchmarking flaws and we find only a single paper in our sample without any benchmarking flaws. Moreover, the scale of the problem appears constant over time, suggesting that the community is not yet taking sufficient countermeasures. This threatens the scientific process, which relies on reproducibility and comparability to ensure that published research advances the state of the art. We hope to raise awareness and provide recommendations for improving benchmarking quality and safeguard the scientific process in our community.
引用
收藏
页码:310 / 325
页数:16
相关论文
共 50 条
  • [31] SoK: A Comprehensive Reexamination of Phishing Research From the Security Perspective
    Das, Avisha
    Baki, Shahryar
    El Aassal, Ayman
    Verma, Rakesh
    Dunbar, Arthur
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 671 - 708
  • [32] SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption
    Micciancio, Daniele
    Vaikuntanathan, Vinod
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 291 - 321
  • [33] SoK: Anonymity of Lightweight Clients in Cryptocurrency Systems
    Zhang, Yiyin
    2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC, 2023,
  • [34] Benchmarking, nuclear and aviation security
    Howsley, Roger
    NUCLEAR ENGINEERING INTERNATIONAL, 2019, 64 (782): : 18 - 19
  • [35] SoK: DAG-based Blockchain Systems
    Wang, Qin
    Yu, Jiangshan
    Chen, Shiping
    Xiang, Yang
    ACM COMPUTING SURVEYS, 2023, 55 (12)
  • [36] SoK: Auditability and Accountability in Distributed Payment Systems
    Chatzigiannis, Panagiotis
    Baldimtsi, Foteini
    Chalkias, Konstantinos
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2021, PT II, 2021, 12727 : 311 - 337
  • [37] SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices
    Billawa, Priyanka
    Tukaram, Anusha Bambhore
    Ferreyra, Nicolas E. Diaz
    Steghofer, Jan Philipp
    Scandariato, Riccardo
    Simhandl, Georg
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [38] SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective
    Tazi, Faiza
    Nandakumar, Archana
    Dykstra, Josiah
    Rajivan, Prashanth
    Das, Sanchari
    ACM TRANSACTIONS ON COMPUTING FOR HEALTHCARE, 2024, 5 (02):
  • [39] SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks
    Rushanan, Michael
    Rubin, Avid D.
    Kune, Denis Foo
    Swanson, Colleen M.
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 524 - 539
  • [40] Inspection Guidelines to Identify Security Design Flaws
    Tuma, Katja
    Hosseini, Danial
    Malamas, Kyriakos
    Scandariato, Riccardo
    13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 116 - 122