skip to main content
10.1145/3384217.3384218acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster

A curated dataset of security defects in scientific software projects

Published: 21 September 2020 Publication History

Abstract

Scientific software is defined as software that is used to explore and analyze data to investigate unanswered research questions in the scientific community [6]. The domain of scientific software includes software needed to construct a research pipeline such as software for simulation and data analysis, large-scale dataset management, and mathematical libraries [4]. Programming languages such as Julia [1] are used to develop scientific software efficiently and achieve desired program execution time. Julia was used in Celeste1, a software used in astronomy research. Celeste was used to load 178 terabytes of astronomical image data to produce a catalog of 188 million astronomical objects in 14.6 minutes2. The Celeste-related example provides anecdotal evidence on the value of studying Julia-related projects from a cybersecurity perspective.

References

[1]
[n.d.]. The Julia Language. https://docs.julialang.org/en/v1/.
[2]
Amiangshu Bosu, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, and Derek Janni. 2014. Identifying the Characteristics of Vulnerable Code Changes: An Empirical Study (FSE 2014). Association for Computing Machinery, New York, NY, USA, 257--268.
[3]
Jacob Cohen. 1960. A Coefficient of Agreement for Nominal Scales. Educational and Psychological Measurement 20, 1 (1960), 37--46. arXiv:http://dx.doi.org/10.1177/001316446002000104
[4]
George Thiruvathukal Jeffrey. Carver, Neil Hong. 2016. Software Engineering for Science (1st ed.). CRC Press, NY, NY, USA.
[5]
Richard Landis and Gary Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Biometrics 33, 1 (1977), 159--174. http://www.jstor.org/stable/2529310
[6]
E. S. Mesh and J. S. Hawker. 2013. Scientific software process improvement decisions: A proposed research strategy. In 2013 5th International Workshop on Software Engineering for Computational Science and Engineering (SE-CSE). 32--39.
[7]
Nuthan Munaiah, Steven Kroh, Craig Cabrey, and Meiyappan Nagappan. 2017. Curating GitHub for engineered software projects. Empirical Software Engineering (2017), 1--35.
[8]
Akond Rahman, Amritanshu Agrawal, Rahul Krishna, and Alexander Sobran. 2018. Characterizing the Influence of Continuous Integration: Empirical Results from 250+ Open Source and Proprietary Projects (SWAN 2018). ACM, New York, NY, USA, 8--14.
[9]
Johnny Saldaña. 2015. The coding manual for qualitative researchers. Sage.

Cited By

View all
  • (2025)Come for syntax, stay for speed, write secure code: an empirical study of security weaknesses in Julia programsEmpirical Software Engineering10.1007/s10664-024-10606-w30:2Online publication date: 1-Mar-2025
  • (2023)Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programsEmpirical Software Engineering10.1007/s10664-023-10328-528:4Online publication date: 14-Jun-2023

Index Terms

  1. A curated dataset of security defects in scientific software projects

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    HotSoS '20: Proceedings of the 7th Symposium on Hot Topics in the Science of Security
    September 2020
    189 pages
    ISBN:9781450375610
    DOI:10.1145/3384217
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 September 2020

    Check for updates

    Author Tags

    1. Julia
    2. dataset
    3. defects
    4. scientific software
    5. security

    Qualifiers

    • Poster

    Conference

    HotSoS '20
    HotSoS '20: Hot Topics in the Science of Security
    September 21 - 23, 2020
    Kansas, Lawrence

    Acceptance Rates

    Overall Acceptance Rate 34 of 60 submissions, 57%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Come for syntax, stay for speed, write secure code: an empirical study of security weaknesses in Julia programsEmpirical Software Engineering10.1007/s10664-024-10606-w30:2Online publication date: 1-Mar-2025
    • (2023)Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programsEmpirical Software Engineering10.1007/s10664-023-10328-528:4Online publication date: 14-Jun-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media