Skip to main content

Showing 1–9 of 9 results for author: Elder, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.17726  [pdf, ps, other

    cs.CR cs.SE

    Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System

    Authors: Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, Nusrat Zahan, Laurie Williams

    Abstract: Security resources are scarce, and practitioners need guidance in the effective and efficient usage of techniques and tools available in the cybersecurity industry. Two emerging tool types, Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP), have not been thoroughly evaluated against well-established counterparts such as Dynamic Application Security Test… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

  2. arXiv:2208.01595  [pdf, other

    cs.SE cs.CR

    Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application

    Authors: Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie Williams

    Abstract: CONTEXT: Applying vulnerability detection techniques is one of many tasks using the limited resources of a software project. OBJECTIVE: The goal of this research is to assist managers and other decision-makers in making informed choices about the use of software vulnerability detection techniques through an empirical study of the efficiency and effectiveness of four techniques on a Java-based we… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    ACM Class: D.2.5

  3. arXiv:2103.05160  [pdf, other

    cs.SE cs.CR

    Vulnerability Detection is Just the Beginning

    Authors: Sarah Elder

    Abstract: Vulnerability detection plays a key role in secure software development. There are many different vulnerability detection tools and techniques to choose from, and insufficient information on which vulnerability detection techniques to use and when. The goal of this research is to assist managers and other decision-makers on software projects in making informed choices about the use of different so… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: 5 pages, 1 figure, submitted to International Conference on Software Engineering: Doctoral Symposium (ICSE-DS)

    ACM Class: D.2.4; D.4.6

  4. arXiv:2103.05088  [pdf, other

    cs.SE cs.CR

    Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard

    Authors: Sarah Elder, Nusrat Zahan, Val Kozarev, Rui Shu, Tim Menzies, Laurie Williams

    Abstract: Lack of security expertise among software practitioners is a problem with many implications. First, there is a deficit of security professionals to meet current needs. Additionally, even practitioners who do not plan to work in security may benefit from increased understanding of security. The goal of this paper is to aid software engineering educators in designing a comprehensive software securit… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

    Comments: 10 pages, 5 figures, 1 table, submitted to International Conference on Software Engineering: Joint Track on Software Engineering Education and Training (ICSE-JSEET)

    ACM Class: K.3.0; D.2.0; K.6.5

  5. arXiv:1809.07937  [pdf, other

    cs.SE

    Bugs in Infrastructure as Code

    Authors: Akond Rahman, Sarah Elder, Faysal Hossain Shezan, Vanessa Frost, Jonathan Stallings, Laurie Williams

    Abstract: Infrastructure as code (IaC) scripts are used to automate the maintenance and configuration of software development and deployment infrastructure. IaC scripts can be complex in nature, containing hundreds of lines of code, leading to defects that can be difficult to debug, and lead to wide-scale system discrepancies such as service outages at scale. Use of IaC scripts is getting increasingly popul… ▽ More

    Submitted 17 July, 2019; v1 submitted 21 September, 2018; originally announced September 2018.

    Comments: Not peer-reviewed

  6. The materials data ecosystem: materials data science and its role in data-driven materials discovery

    Authors: Hai-Qing Yin, Xue Jiang, Guo-Quan Liu, Sharon Elder, Bin Xu1, Qing-Jun Zheng, Xuan-Hui Qu

    Abstract: Since its launch in 2011, Materials Genome Initiative (MGI) has drawn the attention of researchers from across academia, government, and industry worldwide.As one of the three tools of MGI, the materials data, for the first time, emerged as an extremely significant approach in materials discovery. Data science has been applied in different disciplines as an interdisciplinary field to extract knowl… ▽ More

    Submitted 29 August, 2018; originally announced September 2018.

  7. arXiv:1611.00065  [pdf, other

    cs.LG math.PR stat.ML

    Bayesian Adaptive Data Analysis Guarantees from Subgaussianity

    Authors: Sam Elder

    Abstract: The new field of adaptive data analysis seeks to provide algorithms and provable guarantees for models of machine learning that allow researchers to reuse their data, which normally falls outside of the usual statistical paradigm of static data analysis. In 2014, Dwork, Feldman, Hardt, Pitassi, Reingold and Roth introduced one potential model and proposed several solutions based on differential pr… ▽ More

    Submitted 20 March, 2017; v1 submitted 31 October, 2016; originally announced November 2016.

  8. arXiv:1604.02492  [pdf, other

    cs.LG stat.ML

    Challenges in Bayesian Adaptive Data Analysis

    Authors: Sam Elder

    Abstract: Traditional statistical analysis requires that the analysis process and data are independent. By contrast, the new field of adaptive data analysis hopes to understand and provide algorithms and accuracy guarantees for research as it is commonly performed in practice, as an iterative process of interacting repeatedly with the same data set, such as repeated tests against a holdout set. Previous wor… ▽ More

    Submitted 20 March, 2017; v1 submitted 8 April, 2016; originally announced April 2016.

  9. arXiv:1410.6801  [pdf, ps, other

    cs.DS cs.LG

    Dimensionality Reduction for k-Means Clustering and Low Rank Approximation

    Authors: Michael B. Cohen, Sam Elder, Cameron Musco, Christopher Musco, Madalina Persu

    Abstract: We show how to approximate a data matrix $\mathbf{A}$ with a much smaller sketch $\mathbf{\tilde A}$ that can be used to solve a general class of constrained k-rank approximation problems to within $(1+ε)$ error. Importantly, this class of problems includes $k$-means clustering and unconstrained low rank approximation (i.e. principal component analysis). By reducing data points to just $O(k)$ dime… ▽ More

    Submitted 2 April, 2015; v1 submitted 24 October, 2014; originally announced October 2014.