Visible to the public NCSU SoS Lablet Research Methods, Community Development and Support - October 2015Conflict Detection Enabled

Public Audience
Purpose: To highlight project progress. Information is generally at a higher level which is accessible to the interested public. All information contained in the report (regions 1-3) is a Government Deliverable/CDRL.

PI(s):  Jeff Carver, Ehab Al-Shaer, Lindsey McGowen, Laurie Williams, Jon Stallings, Rahul Pandita
Researchers: Morgan Burcham (UA), Christopher Corley (UA)

PROBLEM ADDRESSED

  • Community Development - The goal is to build an extended and vibrant interdisciplinary community of science of security researchers, research methodologists, and practitioners (Carver, Williams).
  • Community Resources - To create and maintain a repository of defensible scientific methods for security research (Carver, Williams).
  • Oversight for the Application of Defensible Scientific Research Methodologies - To encourage the application of scientifically defensible research through various methods of consultation and feedback (Carver).
  • Usable Data Sharing - To enable open, efficient, and secure sharing of data and experimental results for experimentation among SoS researchers (Al-Shaer).

PUBLICATIONS
Report papers written as a result of this research. If accepted by or submitted to a journal, which journal. If presented at a conference, which conference.

 

ACCOMPLISHMENT HIGHLIGHTS

  • We refined the rubrics for analyzing security papers with respect to the Science of Security guidelines. We are currently analyzing papers to include in a submission to IEEE Security & Privacy 2016.
  • We developed technique to facilitate data sharing of security-related repositories by automatically extracting meta data from the data description and use them to enhance the searchability. In specific, users description of the data will be automatically enhanced  to make searching through these data more effective and less time consuming.
  • We further enhanced our research guidelines, creating a version for (1) empirical evaluation of real-world data; (2) analytical studies that use mathematical proofs; and (3) build-then-evaluate studies of security solutions. The research teams are guided in their plans through these guidelines. Students learn to critique others work through the use of the guidelines.