skip to main content
10.1145/3384217.3384218acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster

A curated dataset of security defects in scientific software projects

Published:21 September 2020Publication History

ABSTRACT

Scientific software is defined as software that is used to explore and analyze data to investigate unanswered research questions in the scientific community [6]. The domain of scientific software includes software needed to construct a research pipeline such as software for simulation and data analysis, large-scale dataset management, and mathematical libraries [4]. Programming languages such as Julia [1] are used to develop scientific software efficiently and achieve desired program execution time. Julia was used in Celeste1, a software used in astronomy research. Celeste was used to load 178 terabytes of astronomical image data to produce a catalog of 188 million astronomical objects in 14.6 minutes2. The Celeste-related example provides anecdotal evidence on the value of studying Julia-related projects from a cybersecurity perspective.

References

  1. [n.d.]. The Julia Language. https://docs.julialang.org/en/v1/.Google ScholarGoogle Scholar
  2. Amiangshu Bosu, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, and Derek Janni. 2014. Identifying the Characteristics of Vulnerable Code Changes: An Empirical Study (FSE 2014). Association for Computing Machinery, New York, NY, USA, 257--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Jacob Cohen. 1960. A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement 20, 1 (1960), 37--46. arXiv:http://dx.doi.org/10.1177/001316446002000104 Google ScholarGoogle ScholarCross RefCross Ref
  4. George Thiruvathukal Jeffrey. Carver, Neil Hong. 2016. Software Engineering for Science (1st ed.). CRC Press, NY, NY, USA.Google ScholarGoogle Scholar
  5. Richard Landis and Gary Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (1977), 159--174. http://www.jstor.org/stable/2529310Google ScholarGoogle ScholarCross RefCross Ref
  6. E. S. Mesh and J. S. Hawker. 2013. Scientific software process improvement decisions: A proposed research strategy. In 2013 5th International Workshop on Software Engineering for Computational Science and Engineering (SE-CSE). 32--39. Google ScholarGoogle ScholarCross RefCross Ref
  7. Nuthan Munaiah, Steven Kroh, Craig Cabrey, and Meiyappan Nagappan. 2017. Curating GitHub for engineered software projects. Empirical Software Engineering (2017), 1--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Akond Rahman, Amritanshu Agrawal, Rahul Krishna, and Alexander Sobran. 2018. Characterizing the Influence of Continuous Integration: Empirical Results from 250+ Open Source and Proprietary Projects (SWAN 2018). ACM, New York, NY, USA, 8--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Johnny Saldaña. 2015. The coding manual for qualitative researchers. Sage.Google ScholarGoogle Scholar

Index Terms

  1. A curated dataset of security defects in scientific software projects

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      HotSoS '20: Proceedings of the 7th Symposium on Hot Topics in the Science of Security
      September 2020
      189 pages
      ISBN:9781450375610
      DOI:10.1145/3384217

      Copyright © 2020 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 September 2020

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate34of60submissions,57%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader