Please use this identifier to cite or link to this item: https://open.uns.ac.rs/handle/123456789/315
Title: Utilizing a vulnerable software package to teach software security design analysis
Authors: Luburić, Nikola 
Sladić, Goran 
Milosavljević, Branko 
Issue Date: 1-May-2019
Journal: 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2019 - Proceedings
Abstract: © 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2019 - Proceedings. All rights reserved. As the number of threats and attacks to software systems increases, more attention is given to secure software engineering practices, such as secure coding and security testing. More abstract activities, such as security design analysis, require extensive security expertise from software engineers. Unfortunately, such knowledge is scarcely available, as it is an area that is both difficult to teach and learn. We developed a framework for teaching security design analysis, which is built around the hybrid flipped classroom and case study analysis. This paper enhances our framework by utilizing freely available vulnerable software packages as case studies for security design analysis. We illustrate the enhancement by using a mature vulnerable software package to construct a laboratory exercise dedicated to the security design analysis of threats originating from injection-based attacks. We provide guidance for the usage of our enhanced framework and outline a lab that can be utilized for a university course or a corporate training program dedicated to secure software engineering.
URI: https://open.uns.ac.rs/handle/123456789/315
ISBN: 9789532330984
DOI: 10.23919/MIPRO.2019.8757149
Appears in Collections:FTN Publikacije/Publications

Show full item record

SCOPUSTM   
Citations

2
checked on Apr 29, 2023

Page view(s)

56
Last Week
6
Last month
6
checked on Mar 15, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.