H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark...
-
Upload
preston-thornton -
Category
Documents
-
view
213 -
download
0
Transcript of H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark...
![Page 1: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/1.jpg)
h23.1 15-Mar-01 Clark Thomborson
Software SecurityCompSci 725
Handout 23: Report Writing #1
Clark Thomborson
University of Auckland
![Page 2: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/2.jpg)
h23.2 15-Mar-01 Clark Thomborson
Woodford’s 25 Steps(reduced to 18)
1. Decide on a topic
2. Write the title & synopsis
3. Review requirements
4. Decide on the basic form of the article
5. … (see handout)
![Page 3: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/3.jpg)
h23.3 15-Mar-01 Clark Thomborson
2. Topic, Title, Synopsis• A topic is a “subject that people think, write or talk about.”
[Thorndike-Barnhard Dictionary, 1952].– Woodford thinks a scientific topic should be in question-answer format:
“What question [have you] asked, and what are [your] conclusions?”
• Have you chosen a topic for your term paper?• A title should be “… an effective guide for scientists rapidly
scanning lists of titles for information relevant to their interests.” (Woodford’s Step 22, p. 104)
• A synopsis is an explanation of your “projected paper in definite and concise terms, as though to a friend who asks [you] at some chilly street corner what [you] have been up to recently.” (Woodford’s Step 5, p. 15)
• Writing a draft title and synopsis at an early stage will “… clarify [your] aims and intentions.”
![Page 4: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/4.jpg)
h23.4 15-Mar-01 Clark Thomborson
Abstracts vs. Synopses
• An abstract “… must stand alone and be intelligible without reference to the text.” (Woodford’s Step 22, p. 105.)
• Your final title and abstract must be written “… from the reader’s point of view.”– What is the audience for your draft title and synopsis?
• Your synopsis is a first draft of your final abstract. • By Tuesday 24 April (the first class after term break) you must
send me email containing– your draft title, and– your synopsis.– This email should be text-only (no attachments, please).
![Page 5: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/5.jpg)
h23.5 15-Mar-01 Clark Thomborson
Sample Titles & Abstracts• The next three slides contain titles & abstracts from
term papers written by students in last year’s offering of COMPSCI 725.– What question did they ask, and what are their conclusions?
• Is it likely that– Each title is “… a fitting and worthy representative of the
[term paper’s] contents”?– Each abstract “within the space allowed, … convey[s] the
purpose, general experimental design, conclusions, and if possible, significance” of the student’s term paper?
• You should generalise what Woodford means by “experimental design.” You should use library research, rather than scientific experimentation, to discover “the answer” to your topic question.
![Page 6: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/6.jpg)
h23.6 15-Mar-01 Clark Thomborson
Software-Based Interlocks forSoftware Tamper-Detection
By Andrew Paxie
Software-based interlocks may be used to improve the tamper-detection of software. Interlocks ensure that undesirable conditions are avoided or that events are correctly sequenced. Three example interlocks – batons, Aucsmith’s integrity verification protocol, and Kerberos authentication – illustrate the concept in relation to software tamper-detection.
Slide Date: 18 October 2000Question? Conclusions?
![Page 7: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/7.jpg)
h23.7 15-Mar-01 Clark Thomborson
The Linux 2.4.0 Capability Security System
The UNIX operating system "setuid" security feature is inadequate for modern demands. I provide some
background to this claim, then present the results of my investigation into a solution implemented in the
latest development version (2.4.0-test9) of the Linux operating system. I finish with some some ideas for
future work.
Colin Coghill, October 2000
Question? Conclusions?
![Page 8: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/8.jpg)
h23.8 15-Mar-01 Clark Thomborson
Methods of Access to an Internal Web ServerYe Chen
I introduce two methods of secure remote access to an Internal Web server behind a firewall. One is to use a common HTTP proxy server supporting proxy authentication and SSL tunneling. Another one is absent method which rewrites URLs of the internal Web server. I compare architecture, authentication, confidentiality, convenience and performance of these two methods.
Question? Conclusions?
![Page 9: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/9.jpg)
h23.9 15-Mar-01 Clark Thomborson
More Examples, and Practice!
• See http://www.cs.auckland.ac.nz/compsci725fc/resources/ for other titles and abstracts from last year.
• Assignment 1 (ungraded, due Friday):– Write an abstract for Girard & Lanet, “… Open
Cards” (the subject of Wednesday’s presentation).– Write a new title for this article.
![Page 10: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/10.jpg)
h23.10 15-Mar-01 Clark Thomborson
Review of Steps 1 to 4
1. Decide on a topic (= Woodford’s Step 2)2. Write the title & synopsis:
• Woodford’s Step 5, just discussed
3. Review requirements• This is a combination of Woodford’s Step 6 and 7• See Handout 12:
http://www.cs.auckland.ac.nz/compsci725fc/lectures/handout12.pps
4. Decide on the basic form of your paper• This is Woodford’s Step 8.• Read Eisenberg pp. 39-40, 46-51.
![Page 11: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/11.jpg)
h23.11 15-Mar-01 Clark Thomborson
Logical Communiation[Eisenberg, 1989]
• “Communication that is logical is reasoned in the– proposition [the subject to be discussed, or statement to be
upheld],– order [placement contributing to the force and beauty of
expression, or to the clear illustration of the subject],– interconnection [mutual union],– development [unfolding, advancing], and– disposition [order, method, distribution, arrangement]of its elements.”
• “It is the first, most urgent job of the writer to make the logic apparent.”
![Page 12: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/12.jpg)
h23.12 15-Mar-01 Clark Thomborson
The “Murder Mystery”• In a well-written murder mystery novel, the reader is in
suspense until the last page.• “In suspense” means held in doubt and expectation.• Don’t write a technical report that keeps your reader in
suspense until the last page.• Few readers will be patient enough to read a mysterious
report.• When you write as a technical professional, your reader
“needs first and foremost to understand the structure or path of your argument.”
![Page 13: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/13.jpg)
h23.13 15-Mar-01 Clark Thomborson
Comparison and Contrast Format• The topic sentence of a “comparison and contrast” paper,
section or paragraph should set forth alternatives for doing something (e.g. growing crystals).
• Each section of a comparison and contrast paper should discuss the similarities (comparisons) and differences (contrasts) in the alternative methods.
• The first and last sections should give an overview.• The middle sections should each discuss different points of
comparison or contrast.• For example, the section on “Preparing a Saturated
Solution” contrasts the two methods. Another section, on “Preparing a Seed Crystal” discusses a similarity.
![Page 14: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/14.jpg)
h23.14 15-Mar-01 Clark Thomborson
Problem – Solution Format• First, state the “problem” – what is the question being
answered by your paper?• Next, outline a “solution” – how the problem can be
solved.• Give details of your solution.• Give applications or examples.• End your paper with a critical & appreciative analysis.
Is the problem adequately “solved” in all contexts? What “similar questions” might be answered by “similar answers”?
![Page 15: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/15.jpg)
h23.15 15-Mar-01 Clark Thomborson
Main Idea – Significance Format
• First, explain “what” – your central idea.
• Next, explain “so what” – why should anyone care about your idea?
• Now that you have the readers’ interest, you can discuss the details. Define your terms carefully, and explain their relationships in a way that illuminates your idea.
![Page 16: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/16.jpg)
h23.16 15-Mar-01 Clark Thomborson
Mix and Match!
• Don’t be afraid to combine patterns.
• Problem-solution + compare-contrast =a paper that discusses two (or more) solutions to a problem, and advises the reader on which solution to adopt.
• Main idea-significance + problem-solution =a paper that solves a significant problem.
![Page 17: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/17.jpg)
h23.17 15-Mar-01 Clark Thomborson
Woodford’s Form
1. Introduction
2. Materials and Methods
3. Results
4. Discussion
This is suitable for any experimental study.
Question: Which of Eisenberg’s formats is the “best match” to Woodward’s form?
![Page 18: H23.1 15-Mar-01 Clark Thomborson Software Security CompSci 725 Handout 23: Report Writing #1 Clark Thomborson University of Auckland.](https://reader036.fdocuments.in/reader036/viewer/2022082816/56649cc45503460f9498ceec/html5/thumbnails/18.jpg)
h23.18 15-Mar-01 Clark Thomborson
ScheduleDate Presenter Topic3-Apr-01 H Hassan (8) Margrave, "GSM Security…"3-Apr-01 Thomborson Selection of topic for your term paper;
Writing a title, synopsis and abstract4-Apr-01 Z Liu (9) Girard & Lanet, "… Open Cards"4-Apr-01 Thomborson Choices of form for your term paper; excerpts
due from (14)-(15)6-Apr-01 G Rugg(10) Sobe, "Spatial-Domain Image Watermarking"6-Apr-01 Thomborson Discussion of titles, synopses and abstracts;
Assignment 1 due24-Apr-01 Jay Garden Guest speaker from the GCSB; draft titles &
synopses due from all students25-Apr-01 X Deng (11) Hohl, "Time-Limited Blackbox Security"25-Apr-01 W Zhang (12) Krsul & Spafford, "Authorship Analysis"