Skip to main content

Showing 1–14 of 14 results for author: Elder, S

.
  1. arXiv:2312.17726  [pdf, ps, other

    cs.CR cs.SE

    Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System

    Authors: Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, Nusrat Zahan, Laurie Williams

    Abstract: Security resources are scarce, and practitioners need guidance in the effective and efficient usage of techniques and tools available in the cybersecurity industry. Two emerging tool types, Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP), have not been thoroughly evaluated against well-established counterparts such as Dynamic Application Security Test… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

  2. arXiv:2208.01595  [pdf, other

    cs.SE cs.CR

    Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application

    Authors: Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie Williams

    Abstract: CONTEXT: Applying vulnerability detection techniques is one of many tasks using the limited resources of a software project. OBJECTIVE: The goal of this research is to assist managers and other decision-makers in making informed choices about the use of software vulnerability detection techniques through an empirical study of the efficiency and effectiveness of four techniques on a Java-based we… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    ACM Class: D.2.5

  3. Fast Universal Control of an Oscillator with Weak Dispersive Coupling to a Qubit

    Authors: Alec Eickbusch, Volodymyr Sivak, Andy Z. Ding, Salvatore S. Elder, Shantanu R. Jha, Jayameenakshi Venkatraman, Baptiste Royer, S. M. Girvin, Robert J. Schoelkopf, Michel H. Devoret

    Abstract: A controlled evolution generated by nonlinear interactions is required to perform full manipulation of a quantum system, and such control is only coherent when the rate of nonlinearity is large compared to the rate of decoherence. As a result, engineered quantum systems typically rely on a bare nonlinearity much stronger than all decoherence rates, and this hierarchy is usually assumed to be neces… ▽ More

    Submitted 10 February, 2022; v1 submitted 11 November, 2021; originally announced November 2021.

    Comments: 31 pages, 14 figures

    Journal ref: Nature Physics, 2022

  4. arXiv:2103.05160  [pdf, other

    cs.SE cs.CR

    Vulnerability Detection is Just the Beginning

    Authors: Sarah Elder

    Abstract: Vulnerability detection plays a key role in secure software development. There are many different vulnerability detection tools and techniques to choose from, and insufficient information on which vulnerability detection techniques to use and when. The goal of this research is to assist managers and other decision-makers on software projects in making informed choices about the use of different so… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: 5 pages, 1 figure, submitted to International Conference on Software Engineering: Doctoral Symposium (ICSE-DS)

    ACM Class: D.2.4; D.4.6

  5. arXiv:2103.05088  [pdf, other

    cs.SE cs.CR

    Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard

    Authors: Sarah Elder, Nusrat Zahan, Val Kozarev, Rui Shu, Tim Menzies, Laurie Williams

    Abstract: Lack of security expertise among software practitioners is a problem with many implications. First, there is a deficit of security professionals to meet current needs. Additionally, even practitioners who do not plan to work in security may benefit from increased understanding of security. The goal of this paper is to aid software engineering educators in designing a comprehensive software securit… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: 10 pages, 5 figures, 1 table, submitted to International Conference on Software Engineering: Joint Track on Software Engineering Education and Training (ICSE-JSEET)

    ACM Class: K.3.0; D.2.0; K.6.5

  6. Single-shot number-resolved detection of microwave photons with error mitigation

    Authors: Jacob C. Curtis, Connor T. Hann, Salvatore S. Elder, Christopher S. Wang, Luigi Frunzio, Liang Jiang, Robert J. Schoelkopf

    Abstract: Single-photon detectors are ubiquitous and integral components of photonic quantum cryptography, communication, and computation. Many applications, however, require not only detecting the presence of any photons, but distinguishing the number present with a single shot. Here, we implement a single-shot, high-fidelity photon number-resolving detector of up to 15 microwave photons in a cavity-qubit… ▽ More

    Submitted 10 February, 2021; v1 submitted 9 October, 2020; originally announced October 2020.

    Comments: 15 pages, 7 figures

    Journal ref: Phys. Rev. A 103, 023705 (2021)

  7. High-fidelity measurement of qubits encoded in multilevel superconducting circuits

    Authors: Salvatore S. Elder, Christopher S. Wang, Philip Reinhold, Connor T. Hann, Kevin S. Chou, Brian J. Lester, Serge Rosenblum, Luigi Frunzio, Liang Jiang, Robert J. Schoelkopf

    Abstract: Qubit measurements are central to quantum information processing. In the field of superconducting qubits, standard readout techniques are not only limited by the signal-to-noise ratio, but also by state relaxation during the measurement. In this work, we demonstrate that the limitation due to relaxation can be suppressed by using the many-level Hilbert space of superconducting circuits: in a multi… ▽ More

    Submitted 23 August, 2019; v1 submitted 5 August, 2019; originally announced August 2019.

    Journal ref: Phys. Rev. X 10, 011001 (2020)

  8. arXiv:1809.07937  [pdf, other

    cs.SE

    Bugs in Infrastructure as Code

    Authors: Akond Rahman, Sarah Elder, Faysal Hossain Shezan, Vanessa Frost, Jonathan Stallings, Laurie Williams

    Abstract: Infrastructure as code (IaC) scripts are used to automate the maintenance and configuration of software development and deployment infrastructure. IaC scripts can be complex in nature, containing hundreds of lines of code, leading to defects that can be difficult to debug, and lead to wide-scale system discrepancies such as service outages at scale. Use of IaC scripts is getting increasingly popul… ▽ More

    Submitted 17 July, 2019; v1 submitted 21 September, 2018; originally announced September 2018.

    Comments: Not peer-reviewed

  9. The materials data ecosystem: materials data science and its role in data-driven materials discovery

    Authors: Hai-Qing Yin, Xue Jiang, Guo-Quan Liu, Sharon Elder, Bin Xu1, Qing-Jun Zheng, Xuan-Hui Qu

    Abstract: Since its launch in 2011, Materials Genome Initiative (MGI) has drawn the attention of researchers from across academia, government, and industry worldwide.As one of the three tools of MGI, the materials data, for the first time, emerged as an extremely significant approach in materials discovery. Data science has been applied in different disciplines as an interdisciplinary field to extract knowl… ▽ More

    Submitted 29 August, 2018; originally announced September 2018.

  10. Robust readout of bosonic qubits in the dispersive coupling regime

    Authors: Connor T. Hann, Salvatore S. Elder, Christopher S. Wang, Kevin Chou, Robert J. Schoelkopf, Liang Jiang

    Abstract: High-fidelity qubit measurements play a crucial role in quantum computation, communication, and metrology. In recent experiments, it has been shown that readout fidelity may be improved by performing repeated quantum non-demolition (QND) readouts of a qubit's state through an ancilla. For a qubit encoded in a two-level system, the fidelity of such schemes is limited by the fact that a single error… ▽ More

    Submitted 8 August, 2018; v1 submitted 20 December, 2017; originally announced December 2017.

    Comments: 15 pages, 8 figures

    Journal ref: Phys. Rev. A 98, 022305 (2018)

  11. arXiv:1611.00065  [pdf, other

    cs.LG math.PR stat.ML

    Bayesian Adaptive Data Analysis Guarantees from Subgaussianity

    Authors: Sam Elder

    Abstract: The new field of adaptive data analysis seeks to provide algorithms and provable guarantees for models of machine learning that allow researchers to reuse their data, which normally falls outside of the usual statistical paradigm of static data analysis. In 2014, Dwork, Feldman, Hardt, Pitassi, Reingold and Roth introduced one potential model and proposed several solutions based on differential pr… ▽ More

    Submitted 20 March, 2017; v1 submitted 31 October, 2016; originally announced November 2016.

  12. arXiv:1604.02492  [pdf, other

    cs.LG stat.ML

    Challenges in Bayesian Adaptive Data Analysis

    Authors: Sam Elder

    Abstract: Traditional statistical analysis requires that the analysis process and data are independent. By contrast, the new field of adaptive data analysis hopes to understand and provide algorithms and accuracy guarantees for research as it is commonly performed in practice, as an iterative process of interacting repeatedly with the same data set, such as repeated tests against a holdout set. Previous wor… ▽ More

    Submitted 20 March, 2017; v1 submitted 8 April, 2016; originally announced April 2016.

  13. arXiv:1410.6801  [pdf, ps, other

    cs.DS cs.LG

    Dimensionality Reduction for k-Means Clustering and Low Rank Approximation

    Authors: Michael B. Cohen, Sam Elder, Cameron Musco, Christopher Musco, Madalina Persu

    Abstract: We show how to approximate a data matrix $\mathbf{A}$ with a much smaller sketch $\mathbf{\tilde A}$ that can be used to solve a general class of constrained k-rank approximation problems to within $(1+ε)$ error. Importantly, this class of problems includes $k$-means clustering and unconstrained low rank approximation (i.e. principal component analysis). By reducing data points to just $O(k)$ dime… ▽ More

    Submitted 2 April, 2015; v1 submitted 24 October, 2014; originally announced October 2014.

  14. arXiv:1207.5811  [pdf, ps, other

    math.NT

    Flat Cyclotomic Polynomials: A New Approach

    Authors: Sam Elder

    Abstract: We build a new theory for analyzing the coefficients of any cyclotomic polynomial by considering it as a gcd of simpler polynomials. Using this theory, we generalize a result known as periodicity and provide two new families of flat cyclotomic polynomials. One, of order 3, was conjectured by Broadhurst: $Φ_{pqr}(x)$ is flat where $p<q<r$ are primes and there is a positive integer $w$ such that… ▽ More

    Submitted 24 July, 2012; originally announced July 2012.

    Comments: 52 pages; to be submitted to International Journal of Number Theory

    MSC Class: 11B83; 11C08