Investigation on Research Ethics and Building a Benchmark

11/26/2020
by   Shun Inagaki, et al.
0

When dealing with leading edge cyber security research, especially when operating from the perspective of an attacker or a red team, it becomes necessary for one to at times consider how ethics comes into play. There are currently no cyber security-specific ethics standards, which in particular is one reason more adversarial cyber security research lags behind in Japan. In this research, using machine learning and manual methods we extracted best practices for research ethics from past top conference papers. Using this knowledge we constructed an ethics knowledge base for cyber security research. Such a knowledge base can be used to properly distinguish grey-area research so that it is not wrongly forbidden. Using a decision tree-style user interface that we created for our knowledge base, researchers may be able to efficiently identify which aspects of their research require ethical consideration. In this work, as a preliminary step we focused on only a portion of the areas of research covered by cyber security conferences, but our results are applicable to any area of research.

READ FULL TEXT
research
11/05/2020

Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation

Research ethics in Information and Communications Technology has seen a ...
research
02/25/2020

CybORG: An Autonomous Cyber Operations Research Gym

Autonomous Cyber Operations (ACO) involves the consideration of blue tea...
research
06/13/2023

The aesthetics of cyber security: How do users perceive them?

While specific aesthetic philosophies may differ across cultures, all hu...
research
08/20/2021

CybORG: A Gym for the Development of Autonomous Cyber Agents

Autonomous Cyber Operations (ACO) involves the development of blue team ...
research
04/07/2020

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Cyber security adversaries and engagements are ubiquitous and ceaseless....
research
12/16/2021

It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices

This study considers how well an autoethnographic diary study helps as a...
research
03/11/2020

Passlab: A Password Security Tool for the Blue Team

If we wish to compromise some password-protected system as an attacker (...

Please sign up or login with your details

Forgot password? Click here to reset