Table of Contents

eRISE Challenge

The eRISE (engineering RIsks and SEcurity Requirements) challenge is a series of empirical studies that aim to compare security engineering methods sponsored by NESSoS European Project and EIT ICT Labs. Three editions of eRISE challenge has been held eRISE 2011, eRISE 2012, and eRISE 2013. See the main page for our work on empirical validation of security risk assessment methods and other experiments.

The idea of eRISE challenge is to bring together researchers, young students and practitioners to understand if security methods are effective and what features determine their effectiveness.

With eRISE we want to be able to tell whether “it is not a method to find security recommendations..”, or at least “it helps us to represent the model but does not help in finding solution”, or hopefully “it helps to find out specific security requirement.” (quoting some of the participants of our experiments).

eRISE provides method designer with:

eRISE aims to provide the participants with the benefit of:

Research Questions

A method is effective when it assists the analyst to produce high quality security requirements with less time and less effort.

Research Approach

Since our research questions are exploratory in nature, we applied a mix-method experimental methodology combining both qualitative and quantitative data collection and analysis techniques. We evaluate methods' effectiveness based on the reports delivered by the participants, while we investigate the whys methods are effective by means of questionnaires, focus group interviews and post-it notes (RQ2).

Experimental Protocol

One of our goals is to investigate whether the methods under evaluation could be used effectively by users who have no prior knowledge of the methods. Therefore we have designed a protocol to conduct comparative empirical studies in this setting. The protocol consists of three main phases:

The eRISE Experimental Protocol involves five types of actors:

  1. Method Designer is the researcher who has proposed one of the method under evaluation. His main responsibility is to train participants in the method and to answer participants' questions during the Application phase. S/he also contributes to the assessment of the methods'effectiveness by analyzing groups' reports.
  2. Customer is an industrial partner who introduces the industrial application scenario to the participants. S/he also has to be available during the Application phase to answers all possible questions that participants may raise during analysis.
  3. Observer plays an important role during the Application phase because they supplement audio-video recording with information about the behavior of participants e.g (if the Participants work in group vs work alone) and the difficulties that they face during the application of the method. The observer also interviews the groups and leads the post-it notes sessions.
  4. Researcher takes care of the organization, sets the research questions, selects the participants, invites the method designers and the customers, and analyzes the data collected during the study.
  5. Participant is the most important role. Participants work in group and apply a method provided by one of the method designers to analyze the risk and security issues of the scenario provided by the customer.