Visible to the public 2013 NSCU Summer Workshop: Building a Science of Security

Note on links to most articles: the links are to the public citation pages in online databases (ACM Digital Library, IEEEXplore, etc.) or electronically published journals. All of these linked items are available through the NCSU libraries, and should also be available through other institutional libraries.

Monday, June 3

9:00 am - Noon: Foundations
9:00 - 9:30 Metrics Validation "Validating Software Metrics: A Spectrum of Philosophies."
ACM Transactions of Software Engineering and Methodology (TOSEM),
Vol. 21, No. 4, November 2012, Article 24.
  Presentation, Jason King
9:30 - 10:00 Grounded Theory Strauss, A. & Corbin, J. "Grounded Theory Methodology: An Overview." in Strategies of Qualitative Inquiry,
Denzin, N.K. & Lincoln, Y.S. (Eds.) Sage Publications, 1998
  Goede, R. & de Villiers, C. "The Applicability of Grounded Theory as Research Methodology in Studies on the Use of Methodologies in IS Practices."
SAICSIT '03: Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, 2003, 208-217.
Presentation, Tsung-Hsuan Ho & Vasant Tendulkar
10:00 - 10:15 Break
10:15 - 10:45 Experimental Design Shadish, W.R. & Luellen, "Quasi-Experimental Design." 
Handbook of Complimentaryy Methods in Education Research. 
J. K. Green, J.L.; Camilli, G.; Elmore, P.B. & Skukauskaite, A. (Eds.) Lawrence Erlbaum Associates, 2006, 539-550
  Lundstedt, T.; Seifert, E.; Abramo, L.; Thelin, B.; Nyström, A.; Pettersen, J. Bergman, R. "Experimental design and optimization." 
Chemometrics and Intelligent Laboratory Systems1998, 42, 3-40.
Presentation, KyungWha Hong & Arpan Chakraborty
10:45 - 11:15 Theory Building Sarker, S.; Lau, F. & Sahay, S. "Using an Adapted Grounded Theory Approach for Inductive Theory Building About Virtual Team Development."
SIGMIS Database, ACM Press, 2001, 32, 38-56
  Hannay, J.E.; Sjoberg, Dag I K; Dyba, Tore, " A Systematic Review of Theory Use in Software Engineering Experiments",
Software Engineering, IEEE Transactions on, vol. 33, no. 2, pp. 87-107, Feb. 2007
Presentation, Vivek Nair & Zach Jorgensen
11:15 - Noon Open Discussion
Noon - 1:00 Lunch
1:00 - 5:00 pm: Workshop on Creating Guidelines for our Science of Security work
1:00 - 1:30 Guidelines 1 Per Runeson and Martin Höst. "Guidelines for Conducting and Reporting Case Study Researching Software Engineering."
Empirical Softw. Engg. 14, 2 (April 2009), 131-164
   
1:30 - 2:00 Guidelines 2 Jedlitschka, Andreas, Marcus Ciolkowski, and Dietmar Pfahl. "Reporting Experiments in Software Engineering."
In Guide to Advanced Empirical Software Engineering, pp. 201-228. Springer London, 2008.
  Presentation, Maria Riaz
2:00 - 2:45 Break
3:00 - 3:45   Small group work; random group formation and discussion of creating general guidelines for conducting and reporting SoS work
3:45 - 4:15   Groups report their guidelines to the Lablet
4:15 - 5:00 Open Discussion

Tuesday, June 4

Working Papers
Everyone will have been randomly assigned 3 of the following 5 papers to read before the workshop.

  1. John Demme, Robert Martin, Adam Waksman, and Simha Sethumadhavan. 2012. "Side-channel vulnerability factor: a metric for measuring information leakage." In Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA '12). IEEE Computer Society, Washington, D.C., USA, 106-117.
  2. Brandimarte, L.; Acquisiti, A. & Loewenstein, G. "Misplaced Condifences: Privacy and the Control Paradox" Social Psychological and Personality Science, 2013, 4, 340-347.
  3. Bonneau, J. " The Science of Guessing: Analayzing and Anonymized Corpus of 70 Million Passwords." Security and Privacy (SP), 2012 IEEE Symposium on, 2012, 538-552.
  4. Leyla Bilge and Tudor Dumitras. 2012. "Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World." In Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS'12). ACM, New York, NY, USA, 883-844.
  5. Martín Abadi and Gordon D. Plotkin. 2012. "On Protection by Layout Randomization." ACM Trans. Inf. Syst. Secur. 15, 2, Article 8 (July 2012), 29 pages.
9:00 am - Noon: Applying and Revising Guidelines 
9:00 - 9:30 Applying guidelines to published papers, grouped by first assigned paper
9:30 - 10:00 Applying guidelines to published papers, grouped by second assigned paper
10:00 - 10:30 Applying guidelines to published papers, grouped by third assigned paper
10:30 - 10:45 Break
10:45 - 11:30 Guidelines Revision Discussion in Small Groups
11:30 - Noon Open Discussion on Guideline Revisions
Noon - 1:00 pm Lunch
1:00 - 5:00 Working as a Community to Build a Science of Security
1:00 - 1:30 Family of Experiments Basili, V.R.; Shull, F.; Lanubile, F., "Building knowledge through families of experiments", Software Engineering, IEEE Transactions on, vol. 25, no. 4, pp. 456-473, Jul/Aug 1999
  Presentation, Ling Chen
1:30-2:30 Methods of Assessing Science Committee on Assessing Behavioral and Social Science Research on Aging. The National Academies Press, 2006. Chapter 4: Progress in Science
  Committee on Assessing Behavioral and Social Science Research on Aging, Irwin Feller and Paul C. Stern, editors, National Research Council, A Strategy for Assessing Science: Behavioral and Social Research on Aging. The National Academies Press, 2006. Chapter 5: Methods of Assessing Science
  Presentation, Brent Harrison
2:30 - 2:45 Break
2:45 - 3:15 Assessing Basic Research Martin, B. R. & Irvine, J. "Assessing Basic Research: Some Partial Indicators of Scientific Progress in Radio Astronomy" Research Policy, 1983, 12, 61 - 90
  Presentation, Amiangshu Bosu
3:15 - 3:45 Replication Omar S. Gomez, Natalia Juristo, and Sira Vegas. 2010. "Replications Types in Experimental Disciplines." Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM '10). ACM, New York, NY, USA, Article 3
  Presentation, Trisha Biswas
3:45 - 5:00 Open Discussion and Action Plans

Post-Workshop Evaluation

Follow-on Activities

  • Each project documents a research design for their SoS work and submits by June 14. Each project will be assigned 2-3 other projects for which they will review their submitted research design. The groups will get together to discuss the research design from June 14-June 27.
    Research Design Groups:
    • Group 1: Vasant Tendulkar, Tsung-Hsuan Ho, Ashwin Shashidharan, Vivek Nair
    • Group 2: KyungWha Hong, Rucha Tembe, Magreth Mushi, Trisha Biswas
    • Group 3: Arpan Cakraborty, Brent Harrison, Nirav Ajmeri, Neelesh Salian
    • Group 4: Maria Riaz, Jason King, Ling Chen, Jorgensen Zachary
  • The afternoon of June 27, each project will present their research design and what they have learned through this process.
Event Details
Location: 
NCSU, Engineering Building 2, Room 3211