The goal of this activity is to practice with extending your knowledge about
engineering secure software.
You should communicate with your colleagues, e.g., through Piazza, to select a
partner. Then you should select a problem that you may work on. The research
activity must be on either one of the course topics as specified in the syllabus or on a
topic that I agree with you on. You may visit the following link to learn how to select
a research problem: https://libguides.usc.edu/writingguide/research problem (Links to
an external site.). Examples of research activities include:
1. Literature review
2. Tool evaluation
3. Algorithms and tools for a given problem
4. Questionnaire on a given problem
5. Interviewing experts on a given problem
The following are two examples of research problems related to the course:
- Evaluation of threat modeling tools.
- A case for limitations of secure coding standards.
What you need submit now
First, each pair of students prepares and submits a proposal of one page--IEEE
conference style. We will review the proposals and give feedback in Webex meeting
to each team.
Fig: 1