Research activities are divided into two parts: single paper reviews with provided papers, and a self-directed research paper on a topic of your choice. For general background into standards and practice of research in computer security, see the Research in Computer Science and Computer Security overview.

Single Paper Reviews (Jan 16 – Feb 27)

For part of this course, you will be given current research papers to read and review. In general, you will be given 2 weeks to read these papers and consider the results, and write a 1-2 page summary of each paper.

In your review, you should (briefly!) address the following issues:

These points should be clearly woven into a narrative report – don’t make a bullet list or answer these as if they were individual questions! In your review, remember that everything you write should be your own words, so don’t copy any text (including conclusions) from the paper.

Assigned Papers

The first two papers below are somewhat light in technical content, but are easy to read as we start out in the class. The first is a study about research practices, and the second is about dealing with the large volume of vulnerability reports in the NVD (similar to your first homework assignment!).

  1. Report due Thursday, Jan 25: Daniel Olszewski, Allison Lu, Carson Stillman, Kevin Warren, Cole Kitroser, Alejandro Pascual, Divyajyoti Ukirde, Kevin Butler, and Patrick Traynor. “Get in Researchers; We’re Measuring Reproducibility”: A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS ’23), pp. 3433–3459. doi: 10.1145/3576915.3623130

  2. Report due Tuesday, Feb 6: S. de Smale, R. van Dijk, X. Bouwman, J. van der Ham and M. van Eeten, “No One Drinks From the Firehose: How Organizations Filter and Prioritize Vulnerability Information,” in 2023 IEEE Symposium on Security and Privacy (SP), pp. 1980-1996. doi: 10.1109/SP46215.2023.10179447

  3. Report due Tuesday, Feb 20: V. Cheval, C. Cremers, A. Dax, L. Hirschi, C. Jacomme, and S. Kremer, “Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses,” in the 32nd USENIX Security Symposium (USENIX Security 23), pp. 5899–5916. Available at: https://www.usenix.org/conference/usenixsecurity23/presentation/cheval

Project Research Component (March 14 – May 2)

For this part, you are to select a security research topic that you are interested in, locate research papers to read to learn about current research in that topic, and then write a paper summarizing current state-of-the-art research related to that topic. To keep this “current,” your primary references should be publications from within the past five years. If at any point you are uncertain about what is expected, or if you would like some guidance, please contact me – don’t just make guesses about what you should do! The major “project milestones” are explained below.

Final Notes

This is intended to be a research oriented project, not a technology description. A topic which describes a product or system but without any significant underlying research question is not appropriate. For instance, a report on IPsec isn’t appropriate, but a report on how security protocols are analyzed using IPsec as an example would be good.

Keep in mind that this is a computer science class, and technical depth is important. Formulas, theorems, proofs, and analysis are certainly important and should be included as appropriate. Since this is a research topic, it’s also important to think about (and write about) what questions are left unanswered by the current research that should be investigated (“open problems”). As for the length of the paper, something around 10 pages (11 or 12 point font, single spaced, with 1 inch margins) should be enough to cover the important parts. There’s no need to try to write about everything that’s out there related to your topic.

Remember that the writing should be entirely your own – it is not acceptable to copy text from a paper or the web. My general advice to people is this: Investigate and read as much about the topic as you can until you really understand it, taking some light notes. Then you should know the topic well enough to put aside all your references, and do the writing without looking at the original material. That ensures that the writing is coming from you and not the reference material.

The following are some of the leading security conferences, and provide excellent material (there are, of course, other good quality conferences and journals, but these are the best places to start). Note that while most recent papers are “open access,” some are only available to subscribers. UNCG has subscriptions to all these sources, so they should be accessible from on-campus computers, or through the UNCG Library Proxy.