skip to main content
10.1145/2528908.2528911acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
tutorial

Teaching Secure Coding Practices to STEM Students

Authors Info & Claims
Published:12 October 2013Publication History

ABSTRACT

Our experiences show that the earlier students learn secure coding concepts, even at the same time as they first learn to write code, the better they will continue using secure coding practices. In this paper, modules for teaching secure coding practices to STEM students are built and those modules are ready for most common programming courses for STEM students. Those modules will provide the essential and fundamental skills to programmers and application developers in secure programming. In addition, most of the modules will use static-analysis tools to help with detecting vulnerabilities in any given code. In addition, some survey's results are reposted here.

References

  1. Cunningham, K Robert; Zhivich, Michael. 2009. The Real Cost of Software Errors. In IEEE Computer Society, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Brittany Johnson. 2012. A study on improving static analysis tools: why are we not using them?. In Proceedings of the 2012 International Conference on Software Engineering (ICSE 2012). IEEE Press, Piscataway, NJ, USA, 1607--1609. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dotta, Mirco; Suter, Philippe; and Kuncak, Viktor. 2008. On Static Analysis for Expressive Pattern Matching, in 18th International Symposium, Venice, Italy, 2008Google ScholarGoogle Scholar
  4. Robert Seacord. 2006. Secure Coding in C and C++: Of Strings and Integers. IEEE Security and Privacy 4, 1 (January 2006), 74--76 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hossain Shahriar and Mohammad Zulkernine. 2012. Mitigating program security vulnerabilities: Approaches and challenges. ACM Comput. Surv. 44, 3, Article 11 (June 2012), 46 pages Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ben Smith and Laurie Williams. 2012. On the Effective Use of Security Test Patterns. In Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability (SERE '12). IEEE Computer Society, Washington, DC, USA, 108--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Blair Taylor and Siddharth Kaza. 2011. Security injections: modules to help students remember, understand, and apply secure coding techniques. In Proceedings of the 16th annual joint conference on Innovation and technology in computer science education (ITiCSE '11). 3--7 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Claude F. Turner, Blair Taylor, and Siddharth Kaza. 2011. Security in computer literacy: a model for design, dissemination, and assessment. In Proceedings of the 42nd ACM technical symposium on Computer science education (SIGCSE '11). 15--20 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Blair Taylor, Matt Bishop, Elizabeth Hawthorne, and Kara Nance. 2013. Teaching secure coding: the myths and the realities. In Proceeding of the 44th ACM technical symposium on Computer science education (SIGCSE '13), 281--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Brittany Johnson, Yoonki Song, Emerson Murphy-Hill, and Robert Bowdidge. 2013. Why don't software developers use static analysis tools to find bugs?. In Proceedings of the 2013 International Conference on Software Engineering (ICSE '13). IEEE Press, Piscataway, NJ, USA, 672--681. Google ScholarGoogle ScholarCross RefCross Ref
  11. Raymond P.L. Buse, Caitlin Sadowski, and Westley Weimer. 2011. Benefits and barriers of user evaluation in software engineering research. In Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications (OOPSLA '11). 643--656 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Chess, Brian, and Jacob West. Secure programming with static analysis. Pearson Education, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Teaching Secure Coding Practices to STEM Students

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        InfoSecCD '13: Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
        October 2013
        119 pages
        ISBN:9781450325479
        DOI:10.1145/2528908

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 October 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • tutorial
        • Research
        • Refereed limited

        Acceptance Rates

        InfoSecCD '13 Paper Acceptance Rate18of23submissions,78%Overall Acceptance Rate18of23submissions,78%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader