Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sophie Engle is active.

Publication


Featured researches published by Sophie Engle.


Insider Threats in Cyber Security | 2010

A Risk Management Approach to the 'Insider Threat'

Matt Bishop; Sophie Engle; Deborah A. Frincke; Carrie Gates; Frank L. Greitzer; Sean Peisert; Sean Whalen

Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an “insider;” indeed, manydefine it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policyin a form that can be implemented on a computer system or network, createsgaps in enforcement. This paper defines “insider” precisely, in termsof thesegaps, andexploresan access-based modelfor analyzing threats that include those usually termed “insider threats.” This model enables an organization to order its resources based on thebusinessvalue for that resource andof the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which usersareatthe greatestriskofacting inappropriately. We concludebyexamining how to merge this model with one of forensic logging and auditing.


IEEE Transactions on Dependable and Secure Computing | 2012

A Taxonomy of Buffer Overflow Characteristics

Matt Bishop; Sophie Engle; Damien Howard; Sean Whalen

Significant work on vulnerabilities focuses on buffer overflows, in which data exceeding the bounds of an array is loaded into the array. The loading continues past the array boundary, causing variables and state information located adjacent to the array to change. As the process is not programmed to check for these additional changes, the process acts incorrectly. The incorrect action often places the system in a nonsecure state. This work develops a taxonomy of buffer overflow vulnerabilities based upon characteristics, or preconditions that must hold for an exploitable buffer overflow to exist. We analyze several software and hardware countermeasures to validate the approach. We then discuss alternate approaches to ameliorating this vulnerability.


ieee international conference on high performance computing data and analytics | 2012

Network-theoretic classification of parallel computation patterns

Sean Whalen; Sophie Engle; Sean Peisert; Matt Bishop

Parallel computation in a high-performance computing environment can be characterized by the distributed memory access patterns of the underlying algorithm. During execution, networks of compute nodes exchange messages that indirectly exhibit these access patterns. Identifying the algorithm underlying these observable messages is the problem of latent class analysis over information flows in a computational network. Towards this end, our work applies methods from graph and network theory to classify parallel computations solely from network communication patterns. Pattern classification has applications to several areas including anomaly detection, performance analysis, and automated algorithm replacement. We discuss the difficulties encountered by previous efforts, introduce two new approximate matching techniques, and compare these approaches using massive datasets collected at Lawrence Berkeley National Laboratory.


intelligence and security informatics | 2013

Reflecting on visualization for cyber security

Carrie Gates; Sophie Engle

In this short position paper, we explore three questions regarding cyber security visualization: (1) why cyber security visualization has not been more effective in the past, (2) how visualization can be utilized in cyber security, and (3) how to evaluate cyber security visualization.


BMC Bioinformatics | 2017

Unboxing cluster heatmaps

Sophie Engle; Sean Whalen; Alark Joshi; Katherine S. Pollard

BackgroundCluster heatmaps are commonly used in biology and related fields to reveal hierarchical clusters in data matrices. This visualization technique has high data density and reveal clusters better than unordered heatmaps alone. However, cluster heatmaps have known issues making them both time consuming to use and prone to error. We hypothesize that visualization techniques without the rigid grid constraint of cluster heatmaps will perform better at clustering-related tasks.ResultsWe developed an approach to “unbox” the heatmap values and embed them directly in the hierarchical clustering results, allowing us to use standard hierarchical visualization techniques as alternatives to cluster heatmaps. We then tested our hypothesis by conducting a survey of 45 practitioners to determine how cluster heatmaps are used, prototyping alternatives to cluster heatmaps using pair analytics with a computational biologist, and evaluating those alternatives with hour-long interviews of 5 practitioners and an Amazon Mechanical Turk user study with approximately 200 participants. We found statistically significant performance differences for most clustering-related tasks, and in the number of perceived visual clusters. Visit git.io/vw0t3 for our results.ConclusionsThe optimal technique varied by task. However, gapmaps were preferred by the interviewed practitioners and outperformed or performed as well as cluster heatmaps for clustering-related tasks. Gapmaps are similar to cluster heatmaps, but relax the heatmap grid constraints by introducing gaps between rows and/or columns that are not closely clustered. Based on these results, we recommend users adopt gapmaps as an alternative to cluster heatmaps.


human factors in computing systems | 2018

Using Animation to Alleviate Overdraw in Multiclass Scatterplot Matrices

Helen Chen; Sophie Engle; Alark Joshi; Eric D. Ragan; Beste F. Yuksel; Lane Harrison

The scatterplot matrix (SPLOM) is a commonly used technique for visualizing multiclass multivariate data. However, multiclass SPLOMs have issues with overdraw (overlapping points), and most existing techniques for alleviating overdraw focus on individual scatterplots with a single class. This paper explores whether animation using flickering points is an effective way to alleviate overdraw in these multiclass SPLOMs. In a user study with 69 participants, we found that users not only performed better at identifying dense regions using animated SPLOMs, but also found them easier to interpret and preferred them to static SPLOMs. These results open up new directions for future work on alleviating overdraw for multiclass SPLOMs, and provide insights for applying animation to alleviate overdraw in other settings.


visual information communication and interaction  | 2016

Do Defaults Matter?: Evaluating the Effect of Defaults on User Preference for Multi-Class Scatterplots

Casey Haber; Lyndon Ong Yiu; Alark Joshi; Sophie Engle

With the increasing availability and popularity of visualization tools, it is easier than ever to create visual representations of data. The available tools and libraries work for a range of users from non-programmers to those with significant programming experience. A major challenge, however, is that a majority of users frequently stick with the default settings when using software. In this paper, we evaluate the effect of using defaults when visualizing the same data in four widely-used visualization tools: Tableau Desktop, Microsoft Excel, the ggplot2 R library, and the matplotlib Python library. We used the default settings in these tools to create multi-class scatterplots for several synthetic datasets generated using the scikit-learn package in Python. We conducted a within-subjects pilot study with 39 users and a follow-up study with 202 users to explore whether users have strong preferences for different default settings. We found that computer science students prefer ggplot2, females preferred Tableau, young users or those with some college preferred Excel, and users in most other categories preferred matplotlib.


Archive | 2001

An Introduction to Arp Spoofing

Sean Whalen; Sophie Engle; Dominic Romeo


new security paradigms workshop | 2009

We have met the enemy and he is us

Matt Bishop; Sophie Engle; Sean Peisert; Sean Whalen; Carrie Gates


hawaii international conference on system sciences | 2009

Case Studies of an Insider Framework

Matt Bishop; Sophie Engle; Sean Peisert; Sean Whalen; Carrie Gates

Collaboration


Dive into the Sophie Engle's collaboration.

Top Co-Authors

Avatar

Matt Bishop

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sean Peisert

Lawrence Berkeley National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Alark Joshi

University of San Francisco

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Damien Howard

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Borislava I. Simidchieva

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Deborah A. Frincke

Pacific Northwest National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Frank L. Greitzer

Battelle Memorial Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge