Tutorial: Text Analytics for Security

被引:1
作者
Xie, Tao [1 ]
Enck, William [2 ]
机构
[1] Univ Illinois, Dept Comp Sci, 1304 W Springfield Ave, Urbana, IL 61801 USA
[2] North Carolina State Univ, Dept Comp Sci, Raleigh, NC USA
来源
SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY | 2016年
关键词
Security; human expectations; text analytics;
D O I
10.1145/2898375.2898397
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computing systems that make security decisions often fail to take into account human expectations. This failure occurs because human expectations are typically drawn from in textual sources (e.g., mobile application description and requirements documents) and are hard to extract and codify. Recently, researchers in security and software engineering have begun using text analytics to create initial models of human expectation. In this tutorial, we provide an introduction to popular techniques and tools of natural language processing (NLP) and text mining, and share our experiences in applying text analytics to security problems. We also highlight the current challenges of applying these techniques and tools for addressing security problems. We conclude the tutorial with discussion of future research directions.
引用
收藏
页码:124 / 125
页数:2
相关论文
共 11 条
  • [1] Ambriola V., 1997, P IEEE INT C AUT SOF
  • [2] [Anonymous], P INT C ASP OR SOFTW
  • [3] Enck W., 2014, P 2014 ACM SIGSAC C
  • [4] Garfinkel Simson, 2003, Practical UNIX and internet Security
  • [5] Pandita R., 2012, P INT C SOFTW ENG IC
  • [6] Pandita R., 2013, P USENIX SEC S USENI
  • [7] Slankas J., 2014, P ANN COMP SEC APPL
  • [8] Tan L., 2007, P ACM S OP SYST PRIN
  • [9] Xiao Xusheng., 2012, Proceedings of the ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE), p12:1
  • [10] Xic T., BIBLIO TEXT ANAL SOF