TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. In specs we trust? Conformance-analysis of implementation to specifications in Node-RED and associated security risks
 
Options

In specs we trust? Conformance-analysis of implementation to specifications in Node-RED and associated security risks

Publikationstyp
Conference Paper
Date Issued
2025-08
Sprache
English
Author(s)
Schneider, Simon Malte  
Software Security E-22  
Kashish, Komal  
Tuma, Katja  
Scandariato, Riccardo  
Software Security E-22  
TORE-URI
https://hdl.handle.net/11420/57227
First published in
Lecture notes in computer science  
Number in series
15992 LNCS
Start Page
278
End Page
300
Citation
20th International Conference on Availability, Reliability and Security, ARES 2025
Contribution to Conference
20th International Conference on Availability, Reliability and Security, ARES 2025  
Publisher DOI
10.1007/978-3-032-00624-0_14
Scopus ID
2-s2.0-105013742051
Publisher
Springer
ISBN of container
978-3-032-00624-0
978-3-032-00623-3
978-3-032-00625-7
Low-code development frameworks for IoT platforms offer a simple drag-and-drop mechanism to create applications for the billions of existing IoT devices without the need for extensive programming knowledge. The security of such software is crucial given the close integration of IoT devices in many highly sensitive areas such as healthcare or home automation. Node-RED is a framework to build applications from nodes that are contributed by open-source developers. Its reliance on unvetted contributions and lack of security checks raises the concern that the applications could be vulnerable to attacks, thereby posing a security risk to end users. The low-code approach could imply that users lack the technical knowledge to mitigate or even realize such security concerns. This paper focuses on hidden information flows in Node-RED nodes, meaning flows that are not captured by the specifications. They could (unknowingly or with malicious intent) cause leaks of sensitive information to unauthorized entities. We report the results of a conformance analysis of all nodes in the Node-RED framework, for which we compared the numbers of specified inputs and outputs of each node against the number of sources and sinks detected with CodeQL. The results show, that 55% of all nodes exhibit more possible flows than are specified. A risk assessment of a subset of the nodes showed, that 28% of them are associated with a high severity and 36% with a medium severity rating.
Subjects
conformance analysis
information flow analysis
IoT
low-code
Node-RED
security
DDC Class
005.8: Computer Security
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback