2017
DOI: 10.1177/0735633117708816
|View full text |Cite
|
Sign up to set email alerts
|

Embedding Secure Coding Instruction Into the IDE: Complementing Early and Intermediate CS Courses With ESIDE

Abstract: Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are examining an approach that complements traditional classroom instruction by turning the student's integrated development environment into an educational resource for secure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…[4][5][6]11 Shorter feedback loops also result in better learning performance. 12,13 As a result a shift left movement is ongoing to try to identify possible security problems as early as possible in the SDLC, as shown in Figure 2. New project management techniques such as Agile and DevOps encourage fast incremental releases where the developer is also responsible for meeting nonfunctional requirements such as security.…”
Section: Early In the Sdlcmentioning
confidence: 99%
See 3 more Smart Citations
“…[4][5][6]11 Shorter feedback loops also result in better learning performance. 12,13 As a result a shift left movement is ongoing to try to identify possible security problems as early as possible in the SDLC, as shown in Figure 2. New project management techniques such as Agile and DevOps encourage fast incremental releases where the developer is also responsible for meeting nonfunctional requirements such as security.…”
Section: Early In the Sdlcmentioning
confidence: 99%
“…Traditional error-level markings are usually immediately addressed by the developer, while warning-level markings are more frequently ignored. 13 This is the case because error-level warnings in an IDE typically indicate a problem in the code that will result in a compilation failure. Currently error markings by our tool still allow successful compilation of a project, but several clients have requested the markings to result in compilation failures, equivalent to errors marked by the IDE itself.…”
Section: Explaining Rulesmentioning
confidence: 99%
See 2 more Smart Citations
“…The Open Web Application Security Project [2] identified the top ten most critical application security vulnerabilities: injection flaws, broken authentication, sensitive data exposure, XML external entities, broken access control, security misconfiguration, cross-site scripting, insecure deserialization, and insufficient logging and monitoring. The most effective way to address software application vulnerabilities is through secure coding practices during the life cycle of a software application [3]. By being aware of the application security vulnerabilities, software developers can design defenses against the vulnerabilities along with software functionality.…”
Section: Introductionmentioning
confidence: 99%