Top Banner
COMPGA11: Research in Information Security Steven Murdoch University College London Term 2 – 2016/17 based on a course by Tony Morton
33

COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Aug 14, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

COMPGA11:Research in Information Security

Steven Murdoch University College London

Term 2 – 2016/17

based on a course by Tony Morton

Page 2: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Course summary• “To develop an understanding of what research in

information security is about, how to identify a contribution, what the quality standards in scientific publications are, and to study selected technical sub-topics in depth”

• “Students will be exposed to research on information security, by reading quality technical research papers in information security”

• Understand how to interpret, summarise and write research (important skills for your future)

• Read some important work in the field

Page 3: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Aims and outcomes• “To develop an understanding of what research in

information security is about,… • Understand different research approaches and the

idea of scientific method • Recognise if a paper follows the principles of

scientific method • If not, is there a justifiable reason

• Not all topics naturally follow the scientific method e.g. papers describing frameworks

• Be able to read and critically review research literature in information security

Page 4: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Aims and outcomes

• ...how to identify a contribution,... • Be able to recognise, contextualise and evaluate

a contribution to a field of work • ...what the quality standards in scientific

publications are,... • Able to identify a good (or bad) piece of

scientific research and explain why • Understand what makes a good (or bad)

academic paper

Page 5: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Aims and outcomes

• ...and to study selected technical sub-topics in depth.” • Be able to carry out – independently - a literature

review of a chosen topic in information security

Page 6: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Structure of course• Week 20 Friday (this lecture)

• Introduction • Dissertation project presentations (1)

• Week 21 Friday • The scientific process • Dissertation project presentations (2)

• Weeks 22–29 Fridays, excluding weeks 25 and 30 • Student presentations and discussion

• Week 25 Friday • Reading week – no lecture

• Week 30 Friday (provisional) • Ethics (Sasse and Courtois)

Page 7: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Assessment

• Two information security paper reviews (20%) – 10% each

• Presentation in class (20%) • You are expected to attend all presentations and

be able to discuss papers • Literature review – usually, but not required to be,

on the topic for your MSc dissertation (60%) • More details later…

Page 8: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Types of publication venue• Journal

• No presentations, no meetings, just article • Symposium/conference

• Published proceedings, presentation at event • Pre-print

• Little or no peer review, just article • Book

• Reviewed by publisher that it will sell, but not necessarily peer review

• Workshop • Presentation at event, perhaps no publication

Page 9: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Ranking of research

• There is a desire for an objective way to decide whether research is important

• Very difficult to do reliably but you will encounter such metrics in practice

• Mostly based around bibliometrics • Some legitimate reason for this • Though mostly because it can be processed

automatically

Page 10: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Ranking publications

• Number of citations (per year) • Why might this not reliably represent the

importance of a paper? • Why do people cite papers? • How might people increase their citation count?

Page 11: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Ranking publication venue

• Thomson Reuters impact factor = A/B where • A: number of citations to articles published in

previous two years • B: number of articles published

• Many problems with bibliometrics • Venues do have a reputation, which is somewhat

consistent

Page 12: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Funding for publication venue• Reader pays (most common, e.g. IEEE S&P, CCS)

• Pay-per-article • Institutional subscription

• Author pays (e.g. PLoS One) • Normally author’s institution pays • Article then made available open-access • Exemptions often available

• Society pays (e.g. USENIX, PoPETs) • Society sponsors an open access publication

Page 13: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Ranking researchers

• “A scientist has index h if h of his/her Np papers have at least h citations each, and the other (Np − h) papers have no more than h citations each.”[An index to quantify an individual's scientific research output, J. E. Hirsch]

Page 14: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

2015-01-12 09:15Steven J. Murdoch - Google Scholar Citations

Page 1 of 2https://scholar.google.co.uk/citations?user=vlPUYJEAAAAJ&hl=en

Steven J. MurdochDepartment of Computer Science, UniversityCollege LondonSecurity, Privacy, Anonymous

Communications, Chip and PIN, EMV

Google Scholar

Citation indices All Since 2010Citations 1949 1397h-index 19 16i10-index 25 23

Title 1–20 Cited by Year

Low-cost traffic analysis of TorSJ Murdoch, G DanezisSecurity and Privacy, 2005 IEEE Symposium on, 183-195

413 2005

Embedding covert channels into TCP/IPS Murdoch, S LewisInformation Hiding, 247-261

238 2005

Hot or not: Revealing hidden services by their clock skewSJ MurdochProceedings of the 13th ACM conference on Computer and communications ...

159 2006

Keep your enemies close: distance bounding against smartcard relay attacksS Drimer, SJ MurdochUSENIX Security Symposium, 87-102

149 2007

Ignoring the great firewall of chinaR Clayton, SJ Murdoch, RNM WatsonPrivacy Enhancing Technologies, 20-35

126 2006

Sampled traffic analysis by internet-exchange-level adversariesSJ Murdoch, P ZielińskiPrivacy Enhancing Technologies, 167-183

120 2007

Chip and PIN is BrokenSJ Murdoch, S Drimer, R Anderson, M BondSecurity and Privacy (SP), 2010 IEEE Symposium on, 433-446

101 2010

Optimised to fail: Card readers for online bankingS Drimer, S Murdoch, R AndersonFinancial Cryptography and Data Security, 184-200

64 2009

Metrics for security and performance in low-latency anonymity systemsSJ Murdoch, RNM WatsonPrivacy Enhancing Technologies, 115-132

57 2008

Thinking inside the box: system-level failures of tamper proofingS Drimer, SJ Murdoch, R AndersonSecurity and Privacy, 2008. SP 2008. IEEE Symposium on, 281-295

51 2008

Performance Improvements on Tor or, Why Tor is slow and what we’re goingto do about itR Dingledine, SJ MurdochOnline: http://www. torproject. org/press/presskit/2009-03-11-performance. pdf

49 2009

*

2015-01-12 09:15Steven J. Murdoch - Google Scholar Citations

Page 2 of 2https://scholar.google.co.uk/citations?user=vlPUYJEAAAAJ&hl=en

Tools and technology of Internet filteringSJ Murdoch, R AndersonAccess Denied: The Practice and Policy of Global Internet Filtering, ed ...

45 2008

Verified by visa and mastercard securecode: or, how not to designauthenticationSJ Murdoch, R AndersonFinancial Cryptography and Data Security, 336-342

41 2010

A case study on measuring statistical data in the tor anonymity networkK Loesing, S Murdoch, R DingledineFinancial Cryptography and Data Security, 203-215

35 2010

Chip and spinR Anderson, M Bond, SJ MurdochComputer Security Journal 22 (2), 1-6

34 2006

An Improved Clock-skew Measurement Technique for Revealing HiddenServices.S Zander, SJ MurdochUSENIX Security Symposium, 211-226

32 2008

Covert channel vulnerabilities in anonymity systemsSJ MurdochPDF Document

27 2007

Covert channels for collusion in online computer gamesS Murdoch, P ZielińskiInformation Hiding, 419-429

24 2005

Phish and ChipsB Adida, M Bond, J Clulow, A Lin, S Murdoch, R Anderson, R RivestSecurity Protocols, 40-48

22 2009

Chip and Skim: cloning EMV cards with the pre-play attackM Bond, O Choudary, SJ Murdoch, S Skorobogatov, R AndersonarXiv preprint arXiv:1209.2531

16 2012

Dates and citation counts are estimated and are determined automatically by a computer program.

*

*

Page 15: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Peer review

• An expert in the field reads the paper • Time consuming, subjective and expensive • Probably best way to achieve goals • Used by Research Excellence Framework

Page 16: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Understanding a paper

• Have conclusions been properly drawn? • Has data been collected and processed in an

appropriate way? • Were experiments done properly (if appropriate)? • What assumptions were made? • What other papers should you read to learn more?

Page 17: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

How to Read a Paper

S. KeshavDavid R. Cheriton School of Computer Science, University of Waterloo

Waterloo, ON, [email protected]

ABSTRACTResearchers spend a great deal of time reading research pa-pers. However, this skill is rarely taught, leading to muchwasted effort. This article outlines a practical and efficientthree-pass method for reading research papers. I also de-scribe how to use this method to do a literature survey.

Categories and Subject Descriptors: A.1 [Introductoryand Survey]

General Terms: Documentation.

Keywords: Paper, Reading, Hints.

1. INTRODUCTIONResearchers must read papers for several reasons: to re-

view them for a conference or a class, to keep current intheir field, or for a literature survey of a new field. A typi-cal researcher will likely spend hundreds of hours every yearreading papers.

Learning to efficiently read a paper is a critical but rarelytaught skill. Beginning graduate students, therefore, mustlearn on their own using trial and error. Students wastemuch effort in the process and are frequently driven to frus-tration.

For many years I have used a simple approach to efficientlyread papers. This paper describes the ‘three-pass’ approachand its use in doing a literature survey.

2. THE THREE-PASS APPROACHThe key idea is that you should read the paper in up to

three passes, instead of starting at the beginning and plow-ing your way to the end. Each pass accomplishes specificgoals and builds upon the previous pass: The first passgives you a general idea about the paper. The second passlets you grasp the paper’s content, but not its details. Thethird pass helps you understand the paper in depth.

2.1 The first passThe first pass is a quick scan to get a bird’s-eye view of

the paper. You can also decide whether you need to do anymore passes. This pass should take about five to ten minutesand consists of the following steps:

1. Carefully read the title, abstract, and introduction

2. Read the section and sub-section headings, but ignoreeverything else

3. Read the conclusions

4. Glance over the references, mentally ticking off theones you’ve already read

At the end of the first pass, you should be able to answerthe five Cs:

1. Category: What type of paper is this? A measure-ment paper? An analysis of an existing system? Adescription of a research prototype?

2. Context: Which other papers is it related to? Whichtheoretical bases were used to analyze the problem?

3. Correctness: Do the assumptions appear to be valid?

4. Contributions: What are the paper’s main contribu-tions?

5. Clarity: Is the paper well written?

Using this information, you may choose not to read fur-ther. This could be because the paper doesn’t interest you,or you don’t know enough about the area to understand thepaper, or that the authors make invalid assumptions. Thefirst pass is adequate for papers that aren’t in your researcharea, but may someday prove relevant.

Incidentally, when you write a paper, you can expect mostreviewers (and readers) to make only one pass over it. Takecare to choose coherent section and sub-section titles andto write concise and comprehensive abstracts. If a reviewercannot understand the gist after one pass, the paper willlikely be rejected; if a reader cannot understand the high-lights of the paper after five minutes, the paper will likelynever be read.

2.2 The second passIn the second pass, read the paper with greater care, but

ignore details such as proofs. It helps to jot down the keypoints, or to make comments in the margins, as you read.

1. Look carefully at the figures, diagrams and other illus-trations in the paper. Pay special attention to graphs.Are the axes properly labeled? Are results shown witherror bars, so that conclusions are statistically sig-nificant? Common mistakes like these will separaterushed, shoddy work from the truly excellent.

2. Remember to mark relevant unread references for fur-ther reading (this is a good way to learn more aboutthe background of the paper).

ACM SIGCOMM Computer Communication Review 83 Volume 37, Number 3, July 2007

Page 18: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

How to Read a Paper

S. KeshavDavid R. Cheriton School of Computer Science, University of Waterloo

Waterloo, ON, [email protected]

ABSTRACTResearchers spend a great deal of time reading research pa-pers. However, this skill is rarely taught, leading to muchwasted effort. This article outlines a practical and efficientthree-pass method for reading research papers. I also de-scribe how to use this method to do a literature survey.

Categories and Subject Descriptors: A.1 [Introductoryand Survey]

General Terms: Documentation.

Keywords: Paper, Reading, Hints.

1. INTRODUCTIONResearchers must read papers for several reasons: to re-

view them for a conference or a class, to keep current intheir field, or for a literature survey of a new field. A typi-cal researcher will likely spend hundreds of hours every yearreading papers.

Learning to efficiently read a paper is a critical but rarelytaught skill. Beginning graduate students, therefore, mustlearn on their own using trial and error. Students wastemuch effort in the process and are frequently driven to frus-tration.

For many years I have used a simple approach to efficientlyread papers. This paper describes the ‘three-pass’ approachand its use in doing a literature survey.

2. THE THREE-PASS APPROACHThe key idea is that you should read the paper in up to

three passes, instead of starting at the beginning and plow-ing your way to the end. Each pass accomplishes specificgoals and builds upon the previous pass: The first passgives you a general idea about the paper. The second passlets you grasp the paper’s content, but not its details. Thethird pass helps you understand the paper in depth.

2.1 The first passThe first pass is a quick scan to get a bird’s-eye view of

the paper. You can also decide whether you need to do anymore passes. This pass should take about five to ten minutesand consists of the following steps:

1. Carefully read the title, abstract, and introduction

2. Read the section and sub-section headings, but ignoreeverything else

3. Read the conclusions

4. Glance over the references, mentally ticking off theones you’ve already read

At the end of the first pass, you should be able to answerthe five Cs:

1. Category: What type of paper is this? A measure-ment paper? An analysis of an existing system? Adescription of a research prototype?

2. Context: Which other papers is it related to? Whichtheoretical bases were used to analyze the problem?

3. Correctness: Do the assumptions appear to be valid?

4. Contributions: What are the paper’s main contribu-tions?

5. Clarity: Is the paper well written?

Using this information, you may choose not to read fur-ther. This could be because the paper doesn’t interest you,or you don’t know enough about the area to understand thepaper, or that the authors make invalid assumptions. Thefirst pass is adequate for papers that aren’t in your researcharea, but may someday prove relevant.

Incidentally, when you write a paper, you can expect mostreviewers (and readers) to make only one pass over it. Takecare to choose coherent section and sub-section titles andto write concise and comprehensive abstracts. If a reviewercannot understand the gist after one pass, the paper willlikely be rejected; if a reader cannot understand the high-lights of the paper after five minutes, the paper will likelynever be read.

2.2 The second passIn the second pass, read the paper with greater care, but

ignore details such as proofs. It helps to jot down the keypoints, or to make comments in the margins, as you read.

1. Look carefully at the figures, diagrams and other illus-trations in the paper. Pay special attention to graphs.Are the axes properly labeled? Are results shown witherror bars, so that conclusions are statistically sig-nificant? Common mistakes like these will separaterushed, shoddy work from the truly excellent.

2. Remember to mark relevant unread references for fur-ther reading (this is a good way to learn more aboutthe background of the paper).

ACM SIGCOMM Computer Communication Review 83 Volume 37, Number 3, July 2007

Page 19: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

How to Read a Paper

S. KeshavDavid R. Cheriton School of Computer Science, University of Waterloo

Waterloo, ON, [email protected]

ABSTRACTResearchers spend a great deal of time reading research pa-pers. However, this skill is rarely taught, leading to muchwasted effort. This article outlines a practical and efficientthree-pass method for reading research papers. I also de-scribe how to use this method to do a literature survey.

Categories and Subject Descriptors: A.1 [Introductoryand Survey]

General Terms: Documentation.

Keywords: Paper, Reading, Hints.

1. INTRODUCTIONResearchers must read papers for several reasons: to re-

view them for a conference or a class, to keep current intheir field, or for a literature survey of a new field. A typi-cal researcher will likely spend hundreds of hours every yearreading papers.

Learning to efficiently read a paper is a critical but rarelytaught skill. Beginning graduate students, therefore, mustlearn on their own using trial and error. Students wastemuch effort in the process and are frequently driven to frus-tration.

For many years I have used a simple approach to efficientlyread papers. This paper describes the ‘three-pass’ approachand its use in doing a literature survey.

2. THE THREE-PASS APPROACHThe key idea is that you should read the paper in up to

three passes, instead of starting at the beginning and plow-ing your way to the end. Each pass accomplishes specificgoals and builds upon the previous pass: The first passgives you a general idea about the paper. The second passlets you grasp the paper’s content, but not its details. Thethird pass helps you understand the paper in depth.

2.1 The first passThe first pass is a quick scan to get a bird’s-eye view of

the paper. You can also decide whether you need to do anymore passes. This pass should take about five to ten minutesand consists of the following steps:

1. Carefully read the title, abstract, and introduction

2. Read the section and sub-section headings, but ignoreeverything else

3. Read the conclusions

4. Glance over the references, mentally ticking off theones you’ve already read

At the end of the first pass, you should be able to answerthe five Cs:

1. Category: What type of paper is this? A measure-ment paper? An analysis of an existing system? Adescription of a research prototype?

2. Context: Which other papers is it related to? Whichtheoretical bases were used to analyze the problem?

3. Correctness: Do the assumptions appear to be valid?

4. Contributions: What are the paper’s main contribu-tions?

5. Clarity: Is the paper well written?

Using this information, you may choose not to read fur-ther. This could be because the paper doesn’t interest you,or you don’t know enough about the area to understand thepaper, or that the authors make invalid assumptions. Thefirst pass is adequate for papers that aren’t in your researcharea, but may someday prove relevant.

Incidentally, when you write a paper, you can expect mostreviewers (and readers) to make only one pass over it. Takecare to choose coherent section and sub-section titles andto write concise and comprehensive abstracts. If a reviewercannot understand the gist after one pass, the paper willlikely be rejected; if a reader cannot understand the high-lights of the paper after five minutes, the paper will likelynever be read.

2.2 The second passIn the second pass, read the paper with greater care, but

ignore details such as proofs. It helps to jot down the keypoints, or to make comments in the margins, as you read.

1. Look carefully at the figures, diagrams and other illus-trations in the paper. Pay special attention to graphs.Are the axes properly labeled? Are results shown witherror bars, so that conclusions are statistically sig-nificant? Common mistakes like these will separaterushed, shoddy work from the truly excellent.

2. Remember to mark relevant unread references for fur-ther reading (this is a good way to learn more aboutthe background of the paper).

ACM SIGCOMM Computer Communication Review 83 Volume 37, Number 3, July 2007

Page 20: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

The second pass should take up to an hour. After thispass, you should be able to grasp the content of the paper.You should be able to summarize the main thrust of the pa-per, with supporting evidence, to someone else. This level ofdetail is appropriate for a paper in which you are interested,but does not lie in your research speciality.

Sometimes you won’t understand a paper even at the endof the second pass. This may be because the subject matteris new to you, with unfamiliar terminology and acronyms.Or the authors may use a proof or experimental techniquethat you don’t understand, so that the bulk of the pa-per is incomprehensible. The paper may be poorly writtenwith unsubstantiated assertions and numerous forward ref-erences. Or it could just be that it’s late at night and you’retired. You can now choose to: (a) set the paper aside, hopingyou don’t need to understand the material to be successfulin your career, (b) return to the paper later, perhaps afterreading background material or (c) persevere and go on tothe third pass.

2.3 The third passTo fully understand a paper, particularly if you are re-

viewer, requires a third pass. The key to the third passis to attempt to virtually re-implement the paper: that is,making the same assumptions as the authors, re-create thework. By comparing this re-creation with the actual paper,you can easily identify not only a paper’s innovations, butalso its hidden failings and assumptions.

This pass requires great attention to detail. You shouldidentify and challenge every assumption in every statement.Moreover, you should think about how you yourself wouldpresent a particular idea. This comparison of the actualwith the virtual lends a sharp insight into the proof andpresentation techniques in the paper and you can very likelyadd this to your repertoire of tools. During this pass, youshould also jot down ideas for future work.

This pass can take about four or five hours for beginners,and about an hour for an experienced reader. At the endof this pass, you should be able to reconstruct the entirestructure of the paper from memory, as well as be able toidentify its strong and weak points. In particular, you shouldbe able to pinpoint implicit assumptions, missing citationsto relevant work, and potential issues with experimental oranalytical techniques.

3. DOING A LITERATURE SURVEYPaper reading skills are put to the test in doing a literature

survey. This will require you to read tens of papers, perhapsin an unfamiliar field. What papers should you read? Hereis how you can use the three-pass approach to help.

First, use an academic search engine such as Google Scholaror CiteSeer and some well-chosen keywords to find three tofive recent papers in the area. Do one pass on each pa-per to get a sense of the work, then read their related worksections. You will find a thumbnail summary of the recentwork, and perhaps, if you are lucky, a pointer to a recentsurvey paper. If you can find such a survey, you are done.Read the survey, congratulating yourself on your good luck.

Otherwise, in the second step, find shared citations andrepeated author names in the bibliography. These are thekey papers and researchers in that area. Download the keypapers and set them aside. Then go to the websites of thekey researchers and see where they’ve published recently.

That will help you identify the top conferences in that fieldbecause the best researchers usually publish in the top con-ferences.

The third step is to go to the website for these top con-ferences and look through their recent proceedings. A quickscan will usually identify recent high-quality related work.These papers, along with the ones you set aside earlier, con-stitute the first version of your survey. Make two passesthrough these papers. If they all cite a key paper that youdid not find earlier, obtain and read it, iterating as neces-sary.

4. EXPERIENCEI’ve used this approach for the last 15 years to read con-

ference proceedings, write reviews, do background research,and to quickly review papers before a discussion. This dis-ciplined approach prevents me from drowning in the detailsbefore getting a bird’s-eye-view. It allows me to estimate theamount of time required to review a set of papers. More-over, I can adjust the depth of paper evaluation dependingon my needs and how much time I have.

5. RELATED WORKIf you are reading a paper to do a review, you should also

read Timothy Roscoe’s paper on “Writing reviews for sys-tems conferences” [1]. If you’re planning to write a technicalpaper, you should refer both to Henning Schulzrinne’s com-prehensive web site [2] and George Whitesides’s excellentoverview of the process [3].

6. A REQUESTI would like to make this a living document, updating it

as I receive comments. Please take a moment to email meany comments or suggestions for improvement. You can alsoadd comments at CCRo, the online edition of CCR [4].

7. ACKNOWLEDGMENTSThe first version of this document was drafted by my stu-

dents: Hossein Falaki, Earl Oliver, and Sumair Ur Rahman.My thanks to them. I also benefited from Christophe Diot’sperceptive comments and Nicole Keshav’s eagle-eyed copy-editing.

This work was supported by grants from the NationalScience and Engineering Council of Canada, the CanadaResearch Chair Program, Nortel Networks, Microsoft, IntelCorporation, and Sprint Corporation.

8. REFERENCES[1] T. Roscoe, “Writing Reviews for Systems

Conferences,”http://people.inf.ethz.ch/troscoe/pubs/review-writing.pdf.

[2] H. Schulzrinne, “Writing Technical Articles,”http://www.cs.columbia.edu/ hgs/etc/writing-style.html.

[3] G.M. Whitesides, “Whitesides’ Group: Writing aPaper,”http://www.che.iitm.ac.in/misc/dd/writepaper.pdf.

[4] ACM SIGCOMM Computer Communication ReviewOnline, http://www.sigcomm.org/ccr/drupal/.

ACM SIGCOMM Computer Communication Review 84 Volume 37, Number 3, July 2007

Page 21: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Module Assessment• You will choose a set of three papers

• One for presentation in class • Two for review

• Choices are constrained for fairness and to give a diverse range of topics

• To maintain fairness, marks will be calibrated depending on: • Whether it is an early or a late (in the course)

presentation/review • The difficulty of the paper

Page 22: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Presentations

• Presentation slides to be submitted on Moodle by 10am on day of presentation, in PDF format

• As a minimum, you must present most important parts, principal strengths and weaknesses, ethical concerns (if any), and use (if appropriate) of the scientific method

• Maximum time: 15 minutes (will be enforced)

Page 23: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Presentations

• Critically engage with the paper you are presenting – Do not just summarise it

• Assume audience has taken Introduction to Cryptography and Computer Security I

• Try to present something new/interesting • Make presentation easy to follow and engaging • Practice alone, then practice in front of friends

Page 24: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Discussions

• After each presentation the class will be invited to ask the speaker questions and engage in a discussion, particularly those who reviewed the paper

• To be able to properly discuss the paper, read the abstract and conclusion of the papers being presented and skim other parts

• Say what was good about the presentations and what could be improved

Page 25: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Paper review• One page (form and instructions will be on Moodle)

• Summary of the problem and description of the contribution. • The best about the paper for instance new ideas, proofs,

simplifications, formalizations, implementation, performance improvement, new insight, expected impact of paper on society, etc.

• Weaknesses of the paper for instance lack of originality, small increment over previous work, unsubstantiated claims, bad presentation, insufficient discussion of relation with prior work, etc.

• Put the work in context of the field and discuss its contribution • Grade (should it be accepted for publication)

• Due at 10am on day of presentation (same as slides)

Page 26: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Assignment of papers

• You must do one presentation and two paper summaries • All must be on different topics • Choose a number and select from questionnaire on Moodle,

available after the lecture and to be completed by10am on Tuesday 17 January

• The order in students submit the questionnaire is not significant, so there is no rush to complete

Paper1 Paper2 Paper3 Paper4 Paper1 Paper2 Paper3 Paper421 23 9 1122 24 10 1217 18 19 2013 14 15 161 3 25 272 4 26 28

255 6 7 821 22 23 2425 26 27 289 10 11 1213 14 15 161 2 3 45 7 17 196 8 18 20

30

22 23 24

25 26 27 28

14 15 16

17 18 19 20

26

27

28

29

1

5

9

13

21

Presentations Summaries

22

23

24

2 3 4

6 7 8

10 11 12

Page 27: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Assignment of papers

Paper1 Paper2 Paper3 Paper4 Paper1 Paper2 Paper3 Paper421 23 9 1122 24 10 1217 18 19 2013 14 15 161 3 25 272 4 26 28

255 6 7 821 22 23 2425 26 27 289 10 11 1213 14 15 161 2 3 45 7 17 196 8 18 20

30

22 23 24

25 26 27 28

14 15 16

17 18 19 20

26

27

28

29

1

5

9

13

21

Presentations Summaries

22

23

24

2 3 4

6 7 8

10 11 12

Page 28: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Paper1 Paper2 Paper3 Paper4 Paper1 Paper2 Paper3 Paper421 23 9 1122 24 10 1217 18 19 2013 14 15 161 3 25 272 4 26 28

255 6 7 821 22 23 2425 26 27 289 10 11 1213 14 15 161 2 3 45 7 17 196 8 18 20

30

22 23 24

25 26 27 28

14 15 16

17 18 19 20

26

27

28

29

1

5

9

13

21

Presentations Summaries

22

23

24

2 3 4

6 7 8

10 11 12

Page 29: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Paper1 Paper2 Paper3 Paper4 Paper1 Paper2 Paper3 Paper421 23 9 1122 24 10 1217 18 19 2013 14 15 161 3 25 272 4 26 28

255 6 7 821 22 23 2425 26 27 289 10 11 1213 14 15 161 2 3 45 7 17 196 8 18 20

30

22 23 24

25 26 27 28

14 15 16

17 18 19 20

26

27

28

29

1

5

9

13

21

Presentations Summaries

22

23

24

2 3 4

6 7 8

10 11 12

Page 30: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Paper1 Paper2 Paper3 Paper4 Paper1 Paper2 Paper3 Paper421 23 9 1122 24 10 1217 18 19 2013 14 15 161 3 25 272 4 26 28

255 6 7 821 22 23 2425 26 27 289 10 11 1213 14 15 161 2 3 45 7 17 196 8 18 20

30

22 23 24

25 26 27 28

14 15 16

17 18 19 20

26

27

28

29

1

5

9

13

21

Presentations Summaries

22

23

24

2 3 4

6 7 8

10 11 12

Page 31: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Literature survey

• The aim of a literature review (sometimes called a literature survey) is to demonstrate to the reader that you have read and understood the main published work concerning a particular topic, and can summarise it, and objectively and critically review it.

Page 32: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

Literature survey• Due Wednesday April 26th 2017 at 5pm (but

remember exam preparation) • Can be about topic of your MSc Information Security

dissertation • Cannot be copied into your dissertation, but will be

a useful foundation • If dissertation is done by a pair, so can your survey • 20 pages (individual) or 35 pages (pair)

• Otherwise can be on topic of one paper presented in course

Page 33: COMPGA11: Research in Information Security · research papers in information security” ... • Ethics (Sasse and Courtois) Assessment • Two information security paper reviews

More on assessment and feedback for this course

• Submit slides and paper summaries by 10am on the day that the paper is to be presented

• Marks and feedback will be sent to student within 2 weeks of the submission

• The student work and corresponding feedback will be made available to all class members on Moodle (but not the marks)

• Literature review will be submitted after the end of the course and feedback will be within 4 weeks of submission