SoK: Benchmarking Flaws in Systems Security

被引:13
|
作者
van der Kouwe, Erik [1 ]
Heiser, Gernot [3 ,4 ]
Andriesse, Dennis [2 ]
Bos, Herbert [2 ]
Giuffrida, Cristiano [2 ]
机构
[1] Leiden Univ, Leiden, Netherlands
[2] Vrije Univ Amsterdam, Amsterdam, Netherlands
[3] NICTA, Data61, Sydney, NSW, Australia
[4] UNSW, Sydney, NSW, Australia
关键词
benchmarking; computer systems; security;
D O I
10.1109/EuroSP.2019.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Properly benchmarking a system is a difficult and intricate task. Even a seemingly innocuous mistake can compromise the guarantees provided by a systems security defense and threaten reproducibility and comparability. Moreover, as many modern defenses trade security for performance, the damage caused by benchmarking mistakes is increasingly worrying. To analyze the magnitude of the phenomenon, we identify 22 benchmarking flaws that threaten the validity of systems security evaluations, and survey 50 defense papers published in top venues. We show that benchmarking flaws are widespread even in papers published at tier-1 venues; tier-1 papers contain an average of five benchmarking flaws and we find only a single paper in our sample without any benchmarking flaws. Moreover, the scale of the problem appears constant over time, suggesting that the community is not yet taking sufficient countermeasures. This threatens the scientific process, which relies on reproducibility and comparability to ensure that published research advances the state of the art. We hope to raise awareness and provide recommendations for improving benchmarking quality and safeguard the scientific process in our community.
引用
收藏
页码:310 / 325
页数:16
相关论文
共 50 条
  • [41] The security flaws in some authentication watermarking schemes
    Wu, YD
    Bao, F
    Xu, CS
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 493 - 496
  • [42] SoK: Autonomic Computing based Methods for ICS/SCADA and IIoT Security
    Rouff, Christopher
    Tekeoglu, Ali
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 807 - 812
  • [43] Evaluating the effectiveness of a security flaws prevention tool
    Gershfeld, Itzhak
    Sturm, Arnon
    INFORMATION AND SOFTWARE TECHNOLOGY, 2024, 170
  • [44] Security flaws in a recent RFID delegation protocol
    Imran Erguler
    Emin Anarim
    Personal and Ubiquitous Computing, 2012, 16 : 337 - 349
  • [45] SUPPORTING SECURITY TESTERS IN DISCOVERING INJECTION FLAWS
    Tuerpe, Sven
    Poller, Andreas
    Trukenmueller, Jan
    Repp, Juergen
    Bornmann, Christian
    TACI PART 2008:TESTING: ACADEMIC AND INDUSTRIAL CONFERENCE PRACTICE AND RESEARCH TECHNIQUES, PROCEEDINGS, 2008, : 64 - 68
  • [46] Security flaws in 802.11 data link Protocols
    Cam-Winget, N
    Housley, R
    Wagner, D
    Walker, J
    COMMUNICATIONS OF THE ACM, 2003, 46 (05) : 35 - 39
  • [47] On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems
    Dheerendra Mishra
    Journal of Medical Systems, 2015, 39
  • [48] Security Flaws and Improvement of A Cloud-Based Authentication Protocol for RFID Supply Chain Systems
    Khor, Jing Huey
    Sidorov, Michail
    PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 487 - 491
  • [49] A TAXONOMY OF COMPUTER-PROGRAM SECURITY FLAWS
    LANDWEHR, CE
    BULL, AR
    MCDERMOTT, JP
    CHOI, WS
    ACM COMPUTING SURVEYS, 1994, 26 (03) : 211 - 254
  • [50] SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
    Tan, Xi
    Ma, Zheyuan
    Pinto, Sandro
    Guan, Le
    Zhang, Ning
    Xu, Jun
    Lin, Zhiqiang
    Hu, Hongxin
    Zhao, Ziming
    PROCEEDINGS OF THE 18TH USENIX WOOT CONFERENCE ON OFFENSIVE TECHNOLOGIES, WOOT 2024, 2024, : 149 - 169