2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET) 2021
DOI: 10.1109/icse-seet52601.2021.00034
|View full text |Cite
|
Sign up to set email alerts
|

Is Secure Coding Education in the Industry Needed? An Investigation Through a Large Scale Survey

Abstract: The Department of Homeland Security in the United States estimates that 90% of software vulnerabilities can be traced back to defects in design and software coding. The financial impact of these vulnerabilities has been shown to exceed 380 million USD in industrial control systems alone. Since software developers write software, they also introduce these vulnerabilities into the source code. However, secure coding guidelines exist to prevent software developers from writing vulnerable code. This study focuses … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Two of these games additionally use points [44][45][46]. Points are awarded in seven other games, but never without using an additional game element [27,32,35,37,39,41,50]. Similarly, the element of challenge is mostly used in combination with other elements [27,28,31,35,[37][38][39][40]49].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Two of these games additionally use points [44][45][46]. Points are awarded in seven other games, but never without using an additional game element [27,32,35,37,39,41,50]. Similarly, the element of challenge is mostly used in combination with other elements [27,28,31,35,[37][38][39][40]49].…”
Section: Methodsmentioning
confidence: 99%
“…The work aims to provide feedback based on the emotional state. The other games in this area have the purpose of motivating or engaging students [32,33,41,43,45,48], or increasing the learning effect [29,30,33,35,[37][38][39][40][46][47][48].…”
Section: Serious Game Objectivementioning
confidence: 99%
“…In CLASP threat modeling and risk analysis [209] is performed during requirement and design phase. In the design and implementation phase, it suggests secure design guidelines and secure coding standards [210], [211], [212], [213]. Inspections, static code analysis, and security testing [214] are performed in the assurance phase [215].…”
Section: Approaches To Software Quality and Securitymentioning
confidence: 99%
“…Identify potential security vulnerabilities and design the system architecture and components to minimize those risks. However, in secure coding practices, developers need to adhere to validate and sanitize user input, using parameterized queries or prepared statements to prevent injection attacks, implementing proper access controls and authentication mechanisms, and securely handling sensitive data [187], [188]. Apply security-focused coding guidelines and standards.…”
Section: Essential Guidelines For Building Secure Softwarementioning
confidence: 99%