Informace o publikaci

Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report

Autoři

MALINKA Kamil FIRC Anton LOUTOCKÝ Pavel VOSTOUPAL Jakub KRIŠTOFÍK Andrej KASL František

Rok publikování 2024
Druh Článek ve sborníku
Konference Proceedings of the 2024 Inno- vation and Technology in Computer Science Education V. 1 (ITiCSE 2024)
Fakulta / Pracoviště MU

Právnická fakulta

Citace
www https://arxiv.org/abs/2404.12043
Doi http://dx.doi.org/10.1145/3649217.3653633
Klíčová slova University Education; Bug Bounty; Cybersecurity Specialization; Secure coding; Course Assignment; Experience Report
Popis To keep up with the growing number of cyber-attacks and associ- ated threats, there is an ever-increasing demand for cybersecurity professionals and new methods and technologies. Training new cybersecurity professionals is a challenging task due to the broad scope of the area. One particular field where there is a shortage of experts is Ethical Hacking. Due to its complexity, it often faces educational constraints. Recognizing these challenges, we propose a solution: integrating a real-world bug bounty programme into the cybersecurity curriculum. This innovative approach aims to fill the practical cybersecurity education gap and brings additional positive benefits. To evaluate our idea, we include the proposed solution to a se- cure coding course for IT-oriented faculty. We let students choose to participate in a bug bounty programme as an option for the semester assignment in a secure coding course. We then collected responses from the students to evaluate the outcomes (improved skills, reported vulnerabilities, a better relationship with security, etc.). Evaluation of the assignment showed that students enjoyed solving such real-world problems, could find real vulnerabilities, and that it helped raise their skills and cybersecurity awareness. Participation in real bug bounty programmes also positively af- fects the security level of the tested products. We also discuss the potential risks of this approach and how to mitigate them.

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.

Další info