NC State -- Department of Computer Science Page
Research Methods
- Prof. William Enck
1
Research Methods Prof. William Enck NC State -- Department of - - PowerPoint PPT Presentation
Research Methods Prof. William Enck NC State -- Department of Computer Science Page 1 Reading papers What is the purpose of reading papers? How do you read papers? NC State -- Department of Computer Science Page 2 Understanding
NC State -- Department of Computer Science Page
1
NC State -- Department of Computer Science Page
2
NC State -- Department of Computer Science Page
paper should detail the relevant literature. Papers that do not do this or do a superficial job are almost sure to be bad ones.
and understand the basic approaches in the area, and how they differ from the present work.
3
NC State -- Department of Computer Science Page
4
NC State -- Department of Computer Science Page
the abstract, introduction, and/or conclusions.
journal does necessarily not mean that it is true. Always be circumspect.
5
NC State -- Department of Computer Science Page
6
NC State -- Department of Computer Science Page
software in this paper. He describes an approach whereby he can embed a Trojan horse in a compiler that can insert malicious code on a trigger (e.g., recognizing a login program).
horse is a program that serves a legitimate purpose on the surface, but includes malicious code that will be executed with it. Examples include the Sony/BMG rootkit: the program provided music legitimately, but also installed spyware.
to compile compilers. Since the compiler code looks OK and the malice is in the binary compiler compiler, it is difficult to detect.
the command to accept a particular password known to the attacker.
that you did not totally create yourself.” We all depend on code, but constructing a basis for trusting it is very hard, even today.
7
NC State -- Department of Computer Science Page
Your margin notes will serve as invaluable sign-posts when you come back to the paper (e.g., “here is the experimental setup” or “main result described here”)
to the questions in the preceding slides. If you can’t answer (at least at a high level) these questions without referring to the paper, it may be worth scanning again.
8
NC State -- Department of Computer Science Page
9
NC State -- Department of Computer Science Page
10
NC State -- Department of Computer Science Page
11
NC State -- Department of Computer Science Page
12
NC State -- Department of Computer Science Page
13
Start
AE Assign to Reviewers Assign to Reviewer Assign to Reviewer Assign to Reviewer Review Assign Rating Review Assign Rating EIC Assign AE AE Evaluate Review Assign Rating Author Prepare Revision
Reject Accept
Major Revision
Minor Revision Reject Accept
NC State -- Department of Computer Science Page
14
Start
Chair Assign to PC Members PC Member Assign Rating PC Member Assign Rating Discuss at PC Meeting? PC Member Assign Rating PC Meeting Discussion
Reject
No
Accept
NC State -- Department of Computer Science Page
15
NC State -- Department of Computer Science Page
16
NC State -- Department of Computer Science Page
17
NC State -- Department of Computer Science Page
18
NC State -- Department of Computer Science Page
19
NC State -- Department of Computer Science Page
20
NC State -- Department of Computer Science Page
following reasons. The authors …
… don’t formulate the problem well (or at all). … don’t motivate the problem well (or at all). … address an unimportant or moot problem. … are not familiar with the breadth or depth of the area. … do not discuss important related work. … don’t realize the problem has been solved (or at least better addressed). … don’t have a coherent solution or it does not solve the problem. . . . don’t have a coherent or appropriate methodology. … don’t apply the methodology well. … don’t draw the correct conclusions from the results. … don’t present the work well enough to be understandable. … don’t articulate the take away.
21
NC State -- Department of Computer Science Page
22
NC State -- Department of Computer Science Page
23
NC State -- Department of Computer Science Page
a particular area.
problems, solutions, and terminology of the community.
addressing problems in this area?
community going to affect the known problems and solutions?
24
NC State -- Department of Computer Science Page
would be used by/related to/observance of the field and problems and solutions
come up with the following (just a start):
paper content,
25
NC State -- Department of Computer Science Page
26
storage provenance, network provenance, tracking information as it goes between systems in the cloud, state of systems when creating data, processing data, sending data to the next stage, pipelines of information flow, pipelines in SCADA systems, relation of provenance to real world workflows, real world workflows vs workflows of information between applications, how isolated are applications in their data use?, many phone applications are isolated, but communicate with cloud servers, are smartphone apps producers or consumers of information?, does this related to provenance anymore? healthcare workers use smartphones rather frequently, can geographic location be used as a provenance source in a phone-cloud system? location and provenance are both sometimes used for access control.
NC State -- Department of Computer Science Page
27
NC State -- Department of Computer Science Page
28
NC State -- Department of Computer Science Page
29
NC State -- Department of Computer Science Page
30
NC State -- Department of Computer Science Page
impression of the work based on a quick read of the abstract.
31
NC State -- Department of Computer Science Page
32
NC State -- Department of Computer Science Page
Protection systems exist to prevent the leakage or corruption of system and user data. Traditional discretionary access control mechanisms do not differentiate between a user's running applications and hence provide no means of preventing one application from exploiting another's data. Because commercial mandatory access control mechanisms, such as SELinux and AppArmor, aim to protect system files, they can do little to prevent similar misuse of user data. This paper presents the PinUP access control overlay which extends filesystem protections by limiting the set of user applications that can access the user's high-value files. We describe our model, architecture, and Linux implementation, evaluate run-time costs, and detail use-cases illustrating the power and utility of the augmented policy. Our performance experiments show that all costs are nominal, with a maximum
tens of microseconds at each access check. In this, we provide efficient application-oriented access controls that avoid inter-application misuse of user data.
33
NC State -- Department of Computer Science Page
Protection systems exist to prevent the leakage or corruption of system and user data. Traditional discretionary access control mechanisms do not differentiate between a user's running applications and hence provide no means of preventing one application from exploiting another's data. Because commercial mandatory access control mechanisms, such as SELinux and AppArmor, aim to protect system files, they can do little to prevent similar misuse of user data. This paper presents the PinUP access control overlay which extends filesystem protections by limiting the set of user applications that can access the user's high-value files. We describe our model, architecture, and Linux implementation, evaluate run-time costs, and detail use-cases illustrating the power and utility of the augmented policy. Our performance experiments show that all costs are nominal, with a maximum observed delay of 40 milliseconds occurring at application startup and a few tens of microseconds at each access check. In this, we provide efficient application-oriented access controls that avoid inter-application misuse of user data.
34
NC State -- Department of Computer Science Page
35
NC State -- Department of Computer Science Page
paragraph
36
NC State -- Department of Computer Science Page
“This paper considers how the operational characteristics of BGP can be exploited to close the security infrastructure cost/security model gap. The central observation driving this work is that the vast majority of ASes offer few distinct paths for a prefix, and that those paths are largely static. We confirm this through a study of path stability. We study the 40 RouteViews listening points, and found that in the average case, less than 2% of prefixes were advertised using more than 10 paths, and less than 0.06% were advertised with more than 20 paths during a single month.”
37
NC State -- Department of Computer Science Page
problem or solution
38
NC State -- Department of Computer Science Page
39
NC State -- Department of Computer Science Page
40
NC State -- Department of Computer Science Page
41
NC State -- Department of Computer Science Page
42
NC State -- Department of Computer Science Page
43
NC State -- Department of Computer Science Page
should try to organize in such a way as you can see how the work evolves from start to finish.
present work is needed.
the requirements X, Y, and, Z by bit-twiddling. However such approaches eventually lead to blah and duh, to differing degrees.
problem, but failed ...
enough to solve the problem, so it was left to me.
44
NC State -- Department of Computer Science Page
problems it faces, advances and failures, and motivating articles.
paper (often a fatality if done wrong)
45
NC State -- Department of Computer Science Page
46
NC State -- Department of Computer Science Page
47
NC State -- Department of Computer Science Page
48
NC State -- Department of Computer Science Page
49
NC State -- Department of Computer Science Page
50
NC State -- Department of Computer Science Page
51
NC State -- Department of Computer Science Page
52
NC State -- Department of Computer Science Page
53
NC State -- Department of Computer Science Page
54
NC State -- Department of Computer Science Page
55
NC State -- Department of Computer Science Page
56