Talk:IEEE Symposium on Security and Privacy/GA1

Latest comment: 3 months ago by CursedWithTheAbilityToDoTheMath in topic GA Review

GA Review

edit

The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.


GA toolbox
Reviewing

Article (edit | visual edit | history) · Article talk (edit | history) · Watch

Nominator: Sohom Datta (talk · contribs) 19:21, 12 May 2024 (UTC)Reply

Reviewer: CursedWithTheAbilityToDoTheMath (talk · contribs) 07:15, 22 August 2024 (UTC)Reply


Rate Attribute Review Comment
1. Well-written:
  1a. the prose is clear, concise, and understandable to an appropriately broad audience; spelling and grammar are correct. "The conference, initially conceived by researchers Stan Ames and George Davida in 1980 as a small workshop for discussing computer security and privacy, gradually evolved into a larger gathering within the field."

I feel like this sentence could be split into two as it feels a bit long.

There are some terms and sentences that I feel require a bit more explanation to be understood by a broad audience. I highlighted these sections in 3a. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply

  1b. it complies with the Manual of Style guidelines for lead sections, layout, words to watch, fiction, and list incorporation. The lede seems quite short. I feel like it could be expanded to talk more about what happens at the conference. Some of the information from the rest of the article could be incorporated into the lede as well. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply
2. Verifiable with no original research, as shown by a source spot-check:
  2a. it contains a list of all references (sources of information), presented in accordance with the layout style guideline. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply
  2b. reliable sources are cited inline. All content that could reasonably be challenged, except for plot summaries and that which summarizes cited content elsewhere in the article, must be cited no later than the end of the paragraph (or line if the content is not in prose). "In 2021, researchers from the University of Minnesota submitted a paper titled "On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits" to the 42nd iteration of a conference."

The source given doesn't say that the paper was released in 2021 or that it was submitted to the 42nd iteration of a conference.

"They aimed to highlight vulnerabilities in the review process of Linux kernel patches, and the paper was accepted for presentation in 2021."

The source provided doesn't talk about what the paper aimed to do

" Despite undergoing review by the conference, this breach of ethical responsibilities was not detected during the paper's review process. This sparked significant criticism from the Linux community and broader cybersecurity circles."

The source provided did not back up this claim.

I was able to access and verify all other sources. CursedWithTheAbilityToDoTheMath (talk) 20:18, 22 August 2024 (UTC)Reply

  2c. it contains no original research. per above. CursedWithTheAbilityToDoTheMath (talk) 20:18, 22 August 2024 (UTC)Reply
  2d. it contains no copyright violations or plagiarism. CursedWithTheAbilityToDoTheMath (talk) 20:18, 22 August 2024 (UTC)Reply
3. Broad in its coverage:
  3a. it addresses the main aspects of the topic. "The conference uses a single-track model for its conference proceedings, deviating from the multi-track format common in many similar conferences focused on security and privacy"

Would it be possible to expand a bit one what a single track model is? The next sentence does expand on the topic a bit but I still don't understand what single vs multi track is.

"IEEE Symposium on Security and Privacy considers papers from a wide range of topics related to computer security and privacy."

Could you expand on what topics are discussed?

"They aimed to highlight vulnerabilities in the review process of Linux kernel patches, and the paper was accepted for presentation in 2021. However, their methods involved writing patches for existing trivial bugs in the Linux kernel in ways such that they intentionally introduced security bugs into the kernel."

Could you explain a bit more about what the aims of this study were and how they introduced security bugs? Also the average reader most likely doesn't know what the linux kernel is and I believe this should be expanded on. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply

"In 2022, a study conducted by Ananta Soneji et al. showed that review processes of top security conferences, including the IEEE Symposium on Security and Privacy were exploitable. They identified a lack of objective criteria for paper evaluation and noted a degree of randomness among reviews provided by conference reviewers as the major weaknesses of the peer review process used by the conferences."

The paper mentioned went into a lot more detail on how the review process was exploitable, I feel as though you could also go into more detail about what exactly made the process easy to exploit. CursedWithTheAbilityToDoTheMath (talk) 20:18, 22 August 2024 (UTC)Reply

  3b. it stays focused on the topic without going into unnecessary detail (see summary style). CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply
  4. Neutral: it represents viewpoints fairly and without editorial bias, giving due weight to each. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply
  5. Stable: it does not change significantly from day to day because of an ongoing edit war or content dispute. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply
6. Illustrated, if possible, by media such as images, video, or audio:
  6a. media are tagged with their copyright statuses, and valid non-free use rationales are provided for non-free content. Couldn't find any free images online so not having a photo is appropriate here. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply
  6b. media are relevant to the topic, and have suitable captions. Per above. CursedWithTheAbilityToDoTheMath (talk) 07:15, 22 August 2024 (UTC)Reply
  7. Overall assessment. I found several parts of the article that were not backed by sources. The article also needs to be expanded a bit so that the average reader can understand all of the terms used. Several of the sources provided go into more detail that I feel could be incorporated into the article. I did find a few grammar issues so the article could probably benefit from being put through some type of grammar checker. Overall I think the article has a strong foundation it just needs to be built upon. I originally had some sections marked as on hold but because I found quite a few issues I feel as though these issues may need more work hence why I changed them to fail. Good work to those who wrote the article as it did a good job of giving a balanced overview of the topic without bias. CursedWithTheAbilityToDoTheMath (talk) 20:18, 22 August 2024 (UTC)Reply
The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.