SlideShare a Scribd company logo
Exercise Perceptions: Experience Report
From A Secure Software Development
Course
Dibyendu Brinto Bose
1
Akond Rahman Hossain Shahriar
Sep 10, 2021
Introduction
2
U.S. White House Executive Order
Workforce Development
Introduction
3
Bounty payout is highest for
software
Top vulnerabilities from
2020 are software-related
Introduction
4
CEROC
CS @ TnTech
Secure Software Development
5
Exercises
Lectures Semester-long Projects
Secure Software Development: Exercises
6
Exercises
• Eight exercises
• Exercises assigned after lectures
• 14 week semester
• 12 student course
Exercise List
7
Git Hooks for Automated Security Static Analysis
Logging Location
Privacy Violations in Android Projects
Validation of Security Requirements
Exercise List
8
Security Weaknesses
Security Static Analysis for Adversarial
Machine Learning
Taint Analysis
White-box Fuzzing
Methodology
9
Answer to RQ1
Answer to RQ2
Answer to RQ3
Survey
Gradebook
Analysis
Findings: Motivation
10
Academic Requirements (2 out of 12)
Gain Research Background (3 out of 12)
Career Development (7 out of 12)
Findings
11
0
2
4
6
8
10
12
Exercise Project Lecture
Respondent
Count
Material Best-suited for Enrollment
Motivation
Findings: Positive Perceptions
12
Program Comprehension
Practicality
Lecture Reinforcement
Findings: Positive Perceptions (Contd.)
13
Skillset Development
Sense of Accomplishment
Self Evaluation
Findings: Positive Perceptions (Contd.)
14
Exercise Positive Perception
Git Hook Skillset Development, Practicality
Logging Skillset Development, Lecture Reinforcement, Program
Comprehension, Practicality
Privacy Violation Skillset Development, Practicality
Security Requirements Skillset Development, Practicality
Security Smells Skillset Development, Lecture Reinforcement, Practicality,
Sense of Accomplishment
Adversarial Machine Learning Practicality
Taint Analysis Skillset Development, Program Comprehension, Practicality,
Self Evaluation
Fuzzing Skillset Development, Lecture Reinforcement, Practicality,
Sense of Accomplishment , Self Evaluation
Findings: Negative Perceptions
15
Limiting Documentation
Lack of Background
Artifact Management
Findings: Negative Perceptions (Contd.)
16
Exercise Negative Perception
Git Hook None
Logging Lack of Background, Artifact Management
Privacy Violation Limiting Documentation
Security Requirements None
Security Smells Lack of Background, Artifact Management
Adversarial Machine
Learning
Artifact Management
Taint Analysis Lack of Background, Artifact Management
Fuzzing Artifact Management
Implications
17
• Students prefer real-world exercises
• Good and bad of exercise diversity
• Curious case of taint analysis: background on
program analysis and recursion
- A list of positive perceptions related to exercises in the
’Secure Software Development’ course.
- A list of negative perceptions related to exercises in the
’Secure Software Development’ course.
- A list of students’ motivations to enroll in the ’Secure
Software Development’ course.
- A publicly available repository of materials to conduct
necessary exercises.
Our Contribution
18
- https://github.com/paser-group/continuous-secsoft/
- https://hub.docker.com/repository/docker/akondrahman/sec
-soft-edu-materials
Our Contribution (Contd.)
19
- Rater bias
- Small sample of 12 students
- Generalizability
Limitations
20
Summary
21
arahman@tntech.edu
akondrahman.github.io
@akondrahman
Findings: Motivation
8
Academic Requirements (2 out of 12)
Gain Research Background (3 out of 12)
Career Development (7 out of 12)
Findings: Positive Perceptions
10
Program Comprehension
Practicality
Lecture Reinforcement
Introduction
2
U.S. White House Executive Order State of Tennessee
CEROC
Workforce Development

More Related Content

PPTX
How Do Students Feel About Automated Security Static Analysis Exercises?
PPTX
Promise 2011: "Empirical validation of human factors on predicting issue reso...
PPTX
Ease2017 - Operationalizing the Experience Factory for Effort Estimation in A...
PPTX
Learning to learn
PPTX
Task v Process CEISEE May 2016
PDF
Customized software testing and Regression testing
PDF
DevOps for Humans
PPTX
Adoption of Software Testing in Open Source Projects - A Preliminary Study on...
How Do Students Feel About Automated Security Static Analysis Exercises?
Promise 2011: "Empirical validation of human factors on predicting issue reso...
Ease2017 - Operationalizing the Experience Factory for Effort Estimation in A...
Learning to learn
Task v Process CEISEE May 2016
Customized software testing and Regression testing
DevOps for Humans
Adoption of Software Testing in Open Source Projects - A Preliminary Study on...

Similar to Exercise Perceptions: Experience Report From A Secure Software Development Course (20)

PPT
Whittaker How To Break Software Security - SoftTest Ireland
PDF
Injecting simplicity not SQL RSA Europe 2010
PDF
Application Assessment Techniques
PDF
Software Mining and Software Datasets
PPT
Software Security in the Real World
PDF
Beyond security testing
PPTX
Metrics for Security Effort Prioritization
PDF
Salesforce New Jersey User Group - Security Awareness
PPTX
Agile and Secure SDLC
PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
PDF
Human Factors in Security: Toward Security-Conscious Development
PPT
Testingfor Sw Security
PPTX
Secure App Aspirations: Why it is very difficult in the real world
PPTX
Security Culture from Concept to Maintenance: Secure Software Development Lif...
PPT
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
PPTX
Enumerating software security design flaws throughout the ssdlc cosac - 201...
PPTX
Enumerating software security design flaws throughout the SSDLC
PPSX
Introduction to threat_modeling
PPTX
Built-in Security Mindfulness for Software Developers
PPT
Software Security Engineering
Whittaker How To Break Software Security - SoftTest Ireland
Injecting simplicity not SQL RSA Europe 2010
Application Assessment Techniques
Software Mining and Software Datasets
Software Security in the Real World
Beyond security testing
Metrics for Security Effort Prioritization
Salesforce New Jersey User Group - Security Awareness
Agile and Secure SDLC
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Human Factors in Security: Toward Security-Conscious Development
Testingfor Sw Security
Secure App Aspirations: Why it is very difficult in the real world
Security Culture from Concept to Maintenance: Secure Software Development Lif...
4_25655_SE731_2020_1__2_1_Lecture 1 - Course Outline and Secure SDLC.ppt
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the SSDLC
Introduction to threat_modeling
Built-in Security Mindfulness for Software Developers
Software Security Engineering
Ad

More from Akond Rahman (12)

PPTX
Under-reported Security Defects in Kubernetes Manifests
PPTX
Shhh!: Secret Management Practices for Infrastructure as Code
PPTX
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientifi...
PPTX
Source Code Properties of Defective Infrastructure as Code Scripts
PPTX
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
PPTX
What Questions Do Programmers Ask About Configuration as Code?
PPTX
Comprehension Effort and Programming Activities: Related? Or Not Related?
PPTX
Characterizing Defective Configuration Scripts Used for Continuous Deployment
PDF
Predicting Android Application Security and Privacy Risk With Static Code Met...
PDF
Which Factors Influence Practitioners' Usage of Build Automation Tools?
PPTX
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
PPTX
Synthesizing Continuous Deployment Practices in Software Development
Under-reported Security Defects in Kubernetes Manifests
Shhh!: Secret Management Practices for Infrastructure as Code
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientifi...
Source Code Properties of Defective Infrastructure as Code Scripts
Characteristics of Defective Infrastructure as Code Scripts in Continuous Dep...
What Questions Do Programmers Ask About Configuration as Code?
Comprehension Effort and Programming Activities: Related? Or Not Related?
Characterizing Defective Configuration Scripts Used for Continuous Deployment
Predicting Android Application Security and Privacy Risk With Static Code Met...
Which Factors Influence Practitioners' Usage of Build Automation Tools?
Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Prac...
Synthesizing Continuous Deployment Practices in Software Development
Ad

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
01-Introduction-to-Information-Management.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Computing-Curriculum for Schools in Ghana
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Structure & Organelles in detailed.
01-Introduction-to-Information-Management.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
O5-L3 Freight Transport Ops (International) V1.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
Microbial disease of the cardiovascular and lymphatic systems
Computing-Curriculum for Schools in Ghana
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Exercise Perceptions: Experience Report From A Secure Software Development Course