Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based infrastructure Management

نویسندگان

چکیده

Despite being beneficial for managing computing infrastructure automatically, Puppet manifests are susceptible to security weaknesses, e.g., hard-coded secrets and use of weak cryptography algorithms. Adequate mitigation weaknesses in is thus necessary secure that managed with manifests. A characterization how propagate affect Puppet-based management, can inform practitioners on the relevance detected as well help them take actions mitigation. We conduct an empirical study 17,629 Taint Tracker xmlns:xlink="http://www.w3.org/1999/xlink">Pup pet Manifests ( xmlns:xlink="http://www.w3.org/1999/xlink">TaintPup ). observe 2.4 times more precision, 1.8 F-measure TaintPup, compared a state-of-the-art static analysis tool. From our study, we into 4,457 resources, i.e, Puppet-specific code elements used manage infrastructure. single instance weakness many 35 distinct resources. 7 categories which include resources continuous integration servers network controllers. According survey 24 practitioners, propagation data storage-related rated have most severe impact management.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

supply and demand security of energy in central asia and the caucasus

امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...

15 صفحه اول

Security Weaknesses in Bluetooth

We point to three types of potential vulnerabilities in the Bluetooth standard, version 1.0B. The first vulnerability opens up the system to an attack in which an adversary under certain circumstances is able to determine the key exchanged by two victim devices, making eavesdropping and impersonation possible. This can be done either by exhaustively searching all possible PINs (but without inte...

متن کامل

Security Infrastructure for A Web Service Based Resource Management System

symmetric key cryptography, authentication, access control, integrity checking, Kerberos, global resource management, grid computing A global resource management system intends to aggregate all kinds of heterogeneous resources that are geographically distributed so that a uniform resource programming interface can be provided to applications. The emerging web service model with single SOAP-base...

متن کامل

langauge needs analysis of undergraduate business management and economics students

the aim of conducting this study was to investigate the foreign language learning needs of undergraduate economics students and business management students in faculties of social sciences of alzahra and azad naragh university. in the study, which was designed on the basis of a qualitative-quantitative basis using interviews and questionnaires, 146 female undergraduate business management as we...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Software Engineering

سال: 2023

ISSN: ['0098-5589', '1939-3520', '2326-3881']

DOI: https://doi.org/10.1109/tse.2023.3265962