SlideShare ist ein Scribd-Unternehmen logo
1 von 42
An Application-Oriented Approach for Computer Security Education Xiao Qin Department of Computer Science and Software Engineering Auburn University Email: xqin@auburn.edu URL: http://www.eng.auburn.edu/~xqin
Goal and Objectives Goal:  New approaches for computer security education   Objective 1:   To prepare students to design, implement, and test secure software Objective 2:   A holistic platform for constructing computer security course projects Student-centered learning Professor-centered platform
From CSSE Students to Software Engineers ,[object Object],[object Object],[object Object],[object Object]
Challenges  Student -Centered Learning Teamwork Secure Software Design Programming What projects can help students to learn about teamwork? Must we teach students how to design secure software? How to provide  engaging computer security projects ? How to teach multiple programming languages?
Challenges  Professor -Centered Platform Flexibility Preparation Grading Teaching What projects can be tailored to students to learn about teamwork? What is a good way to grade computer security projects? How to quickly prepare  engaging computer security projects ? How to teach computer security projects?
Teaching Philosophy ,[object Object],[object Object],[object Object]
Motivation ,[object Object],[object Object],[object Object],Practice Principles   Real-World Systems and Apps ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],College Industry small-scale, fragmented, and  isolated course projects
Our Solution:   Application-Oriented Approach  Security Sensitive Applications Security Module 1 User Interface OS (Windows, Linux, etc.) Non-Security Modules Security Module n Security Modules
Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Unified Programming Environment Security Sensitive Applications Security Module 1 User Interface OS (Windows, Linux, etc.) Non-Security Modules Security Module n Virtual Machine (e.g.  vmware, virtualBox )
Flexibility ,[object Object],[object Object],[object Object],[object Object],Objective 1:   To prepare students to design, implement, and test secure software Objective 2:   A holistic platform for constructing computer security course projects Student-centered learning Professor-centered platform
Flexibility How Modules Are Packaged Beginner Easy Intermediate Moderate Advanced Hard Explorative Light Editing Basic Understand Of  Concepts Normal Implementation Depth Understanding Of Concept Advanced Implementation
Types of Course Projects ,[object Object],[object Object],[object Object],[object Object],[object Object],Beginner Intermediate Advanced
Choose the First Application ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Banking Application ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation Projects Students’ Tasks Existing Components Access Control List Integrity  Checking Data Encryption Module ,[object Object],[object Object],[object Object],[object Object],[object Object],IPSec In Attack Lab Banking Application Buffer overflow
Workflow A professor’s perspective Teach Concept Generate Project Description Design Survey Questions Choose Apps & Difficulty Work On Project Evaluation/Feedback Design Docs & Partial Code System Setup
Design Document Example: Data Flow – High Level
Put It All Together  An example A Banking System Access Control User Interface OS (Windows, Linux, etc.) Non-Security Modules Encryption IPSec Virtual Machine (e.g.  vmware, virtualBox )
Class Diagram  A  secure teller terminal system Intermediate
Class Diagram  A  secure teller terminal system Advanced No security modules in the design document (e.g., class diagram)
An Encrypted Staff File Beginner Beginner Easy Explorative Light Editing
An Unencrypted Staff File Beginner Beginner Easy Explorative Light Editing
Encryption Modules ,[object Object],[object Object],[object Object]
Access Control ,[object Object],[object Object],[object Object]
Access Control ,[object Object],[object Object],[object Object]
Choose a Course to Test Our Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],Introduction to Computer Security   Security Courses Other Courses Advanced Computer Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],e.g., Software Construction
Comp 2710 Software Construction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preliminary Studies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evaluation Results (1) (1) ≤ 5 hours (2) 6-10 hours (3) 11-20 hours  (4) 21-30 hours (5) > 30 hours  Survey:  Approximately, how many hours did you spend on the project?   Design 81%  <10h Implementation 46%  >21h Entire Project 40%  >30h
Evaluation Results (2) (1) Strongly disagree  (2) Disagree  (3) Neutral  (4) Agree (5) Strongly agree Survey:  The project instructions were clear.   Teller terminal system 69%: agree or strongly agree Cryptographic system   58%: agree or strongly agree
Evaluation Results (3) (1) Very easy  (2) Somewhat easy  (3) Average  (4) Somewhat difficult  (5) Very difficult Survey:  What was the level of difficulty of this project? Teller terminal system 61%: somewhat difficult or  very difficult Cryptographic system   53%: somewhat difficult or  very difficult
Evaluation Results (4) Survey:  What was the level of interest in this project? Teller terminal system 58%: Average, High, or very high Cryptographic system   85%: Average, High, or very high 1.  (1) Very low  (2) Low (3) Average  (4) High  (5) Very high
Evaluation Results (5) Survey:  What was the most time consuming part of in the design portion of the project?  Teller terminal system 44%: Use cases Cryptographic system   58%: Testing (1) Use Cases  (2) Class Diagram  (3) System Sequence Diagram  (4)  Testing
Evaluation Results (6) (1) Strongly disagree  (2) Disagree  (3) Neutral  (4) Agree (5) Strongly agree Survey:  As a result of the lab, I am more interested in computer security.  Teller terminal system 17%: strongly disagree or disagree Cryptographic system   20%: strongly disagree or disagree
Evaluation Results (7) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Survey:  Overall, I have attained the learning objectives of the project. Teller terminal system Cryptographic system
Evaluation Results (7 cont.) (1) Strongly disagree  (2) Disagree  (3) Neutral  (4) Agree (5) Strongly agree Survey:  Overall, I have attained the learning objectives of the project. Teller terminal system 52%: strongly agree or agree Cryptographic system   65%: strongly agree or agree
About the QoSec Project ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plan and Collaborations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Xiao Qin: xqin@auburn.edu
 
Demo & Examples
Questions? ,[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

ProspectusPresentationPrinterFriendly
ProspectusPresentationPrinterFriendlyProspectusPresentationPrinterFriendly
ProspectusPresentationPrinterFriendly
martijnetje
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Interactive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang GongInteractive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang Gong
Liang Gong
 

Was ist angesagt? (20)

Cross-project defect prediction
Cross-project defect predictionCross-project defect prediction
Cross-project defect prediction
 
ProspectusPresentationPrinterFriendly
ProspectusPresentationPrinterFriendlyProspectusPresentationPrinterFriendly
ProspectusPresentationPrinterFriendly
 
An Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source ProjectsAn Empirical Study on the Adequacy of Testing in Open Source Projects
An Empirical Study on the Adequacy of Testing in Open Source Projects
 
Data collection for software defect prediction
Data collection for software defect predictionData collection for software defect prediction
Data collection for software defect prediction
 
Requirements driven Model-based Testing
Requirements driven Model-based TestingRequirements driven Model-based Testing
Requirements driven Model-based Testing
 
Pertanyaan dan jawaban (graham et.al 2011)
Pertanyaan dan jawaban (graham et.al 2011)Pertanyaan dan jawaban (graham et.al 2011)
Pertanyaan dan jawaban (graham et.al 2011)
 
Adaptation of the technology of the static code analyzer for developing paral...
Adaptation of the technology of the static code analyzer for developing paral...Adaptation of the technology of the static code analyzer for developing paral...
Adaptation of the technology of the static code analyzer for developing paral...
 
ICGSE2020: On the Detection of Community Smells Using Genetic Programming-bas...
ICGSE2020: On the Detection of Community Smells Using Genetic Programming-bas...ICGSE2020: On the Detection of Community Smells Using Genetic Programming-bas...
ICGSE2020: On the Detection of Community Smells Using Genetic Programming-bas...
 
Test Automation Maturity: A Self-Assessment Tool
Test Automation Maturity: A Self-Assessment ToolTest Automation Maturity: A Self-Assessment Tool
Test Automation Maturity: A Self-Assessment Tool
 
Defect effort prediction models in software
Defect effort prediction models in softwareDefect effort prediction models in software
Defect effort prediction models in software
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Interactive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang GongInteractive fault localization leveraging simple user feedback - by Liang Gong
Interactive fault localization leveraging simple user feedback - by Liang Gong
 
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
 
M018147883
M018147883M018147883
M018147883
 
ICSME 2016: Search-Based Peer Reviewers Recommendation in Modern Code Review
ICSME 2016: Search-Based Peer Reviewers Recommendation in Modern Code ReviewICSME 2016: Search-Based Peer Reviewers Recommendation in Modern Code Review
ICSME 2016: Search-Based Peer Reviewers Recommendation in Modern Code Review
 
Automated Traceability for Software Engineering Tasks
Automated Traceability for Software Engineering TasksAutomated Traceability for Software Engineering Tasks
Automated Traceability for Software Engineering Tasks
 
Science of Security Industry Day - October 2015
Science of Security Industry Day - October 2015Science of Security Industry Day - October 2015
Science of Security Industry Day - October 2015
 
Promise 2011: "Empirical validation of human factors on predicting issue reso...
Promise 2011: "Empirical validation of human factors on predicting issue reso...Promise 2011: "Empirical validation of human factors on predicting issue reso...
Promise 2011: "Empirical validation of human factors on predicting issue reso...
 
Survey on Software Defect Prediction
Survey on Software Defect PredictionSurvey on Software Defect Prediction
Survey on Software Defect Prediction
 
New Testing Standards Are on the Horizon: What Will Be Their Impact?
New Testing Standards Are on the Horizon: What Will Be Their Impact?New Testing Standards Are on the Horizon: What Will Be Their Impact?
New Testing Standards Are on the Horizon: What Will Be Their Impact?
 

Ähnlich wie An Application-Oriented Approach for Computer Security Education

Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
Cu Nguyen
 
Mona Nasr-SAD-Lecture 1.pptx
Mona Nasr-SAD-Lecture 1.pptxMona Nasr-SAD-Lecture 1.pptx
Mona Nasr-SAD-Lecture 1.pptx
OmarElKordy2
 
Slide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptxSlide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptx
UTKARSHBHARDWAJ71
 
InFS6830 Secure Programming Questions Page 7 of 7Essay.docx
InFS6830 Secure Programming Questions Page 7 of 7Essay.docxInFS6830 Secure Programming Questions Page 7 of 7Essay.docx
InFS6830 Secure Programming Questions Page 7 of 7Essay.docx
jaggernaoma
 

Ähnlich wie An Application-Oriented Approach for Computer Security Education (20)

Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
Software Architecture - Allocation taxonomies: building, deployment and distr...
Software Architecture - Allocation taxonomies: building, deployment and distr...Software Architecture - Allocation taxonomies: building, deployment and distr...
Software Architecture - Allocation taxonomies: building, deployment and distr...
 
An integrated security testing framework and tool
An integrated security testing framework  and toolAn integrated security testing framework  and tool
An integrated security testing framework and tool
 
01.intro
01.intro01.intro
01.intro
 
Online Exam Management System(OEMS)
Online Exam Management System(OEMS)Online Exam Management System(OEMS)
Online Exam Management System(OEMS)
 
SE UNIT-1 Revised.pdf
SE UNIT-1 Revised.pdfSE UNIT-1 Revised.pdf
SE UNIT-1 Revised.pdf
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Chapter 2 modeling the process and life-cycle
Chapter 2  modeling the process and life-cycleChapter 2  modeling the process and life-cycle
Chapter 2 modeling the process and life-cycle
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Mona Nasr-SAD-Lecture 1.pptx
Mona Nasr-SAD-Lecture 1.pptxMona Nasr-SAD-Lecture 1.pptx
Mona Nasr-SAD-Lecture 1.pptx
 
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
 
Slide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptxSlide set 1 (Traditional Software Development) (1).pptx
Slide set 1 (Traditional Software Development) (1).pptx
 
TUD CS4105 | 2015 | Lecture 1
TUD CS4105 | 2015 | Lecture 1TUD CS4105 | 2015 | Lecture 1
TUD CS4105 | 2015 | Lecture 1
 
Software system design sample
Software system design sampleSoftware system design sample
Software system design sample
 
InFS6830 Secure Programming Questions Page 7 of 7Essay.docx
InFS6830 Secure Programming Questions Page 7 of 7Essay.docxInFS6830 Secure Programming Questions Page 7 of 7Essay.docx
InFS6830 Secure Programming Questions Page 7 of 7Essay.docx
 
Software tetsing paper related to industry
Software tetsing paper related to industrySoftware tetsing paper related to industry
Software tetsing paper related to industry
 
7th sem
7th sem7th sem
7th sem
 
7th sem
7th sem7th sem
7th sem
 
The process
The processThe process
The process
 
Software engineering the process
Software engineering the processSoftware engineering the process
Software engineering the process
 

Mehr von Xiao Qin

P#1 stream of praise
P#1 stream of praiseP#1 stream of praise
P#1 stream of praise
Xiao Qin
 

Mehr von Xiao Qin (20)

How to apply for internship positions?
How to apply for internship positions?How to apply for internship positions?
How to apply for internship positions?
 
How to write research papers? Version 5.0
How to write research papers? Version 5.0How to write research papers? Version 5.0
How to write research papers? Version 5.0
 
Making a competitive nsf career proposal: Part 2 Worksheet
Making a competitive nsf career proposal: Part 2 WorksheetMaking a competitive nsf career proposal: Part 2 Worksheet
Making a competitive nsf career proposal: Part 2 Worksheet
 
Making a competitive nsf career proposal: Part 1 Tips
Making a competitive nsf career proposal: Part 1 TipsMaking a competitive nsf career proposal: Part 1 Tips
Making a competitive nsf career proposal: Part 1 Tips
 
Auburn csse faculty orientation
Auburn csse faculty orientationAuburn csse faculty orientation
Auburn csse faculty orientation
 
Auburn CSSE graduate student orientation
Auburn CSSE graduate student orientationAuburn CSSE graduate student orientation
Auburn CSSE graduate student orientation
 
CSSE Graduate Programs Committee: Progress Report
CSSE Graduate Programs Committee: Progress ReportCSSE Graduate Programs Committee: Progress Report
CSSE Graduate Programs Committee: Progress Report
 
Project 2 How to modify os161: A Manual
Project 2 How to modify os161: A ManualProject 2 How to modify os161: A Manual
Project 2 How to modify os161: A Manual
 
Project 2 how to modify OS/161
Project 2 how to modify OS/161Project 2 how to modify OS/161
Project 2 how to modify OS/161
 
Project 2 how to install and compile os161
Project 2 how to install and compile os161Project 2 how to install and compile os161
Project 2 how to install and compile os161
 
Project 2 - how to compile os161?
Project 2 - how to compile os161?Project 2 - how to compile os161?
Project 2 - how to compile os161?
 
Understanding what our customer wants-slideshare
Understanding what our customer wants-slideshareUnderstanding what our customer wants-slideshare
Understanding what our customer wants-slideshare
 
OS/161 Overview
OS/161 OverviewOS/161 Overview
OS/161 Overview
 
Surviving a group project
Surviving a group projectSurviving a group project
Surviving a group project
 
P#1 stream of praise
P#1 stream of praiseP#1 stream of praise
P#1 stream of praise
 
Data center specific thermal and energy saving techniques
Data center specific thermal and energy saving techniquesData center specific thermal and energy saving techniques
Data center specific thermal and energy saving techniques
 
How to do research?
How to do research?How to do research?
How to do research?
 
COMP2710 Software Construction: header files
COMP2710 Software Construction: header filesCOMP2710 Software Construction: header files
COMP2710 Software Construction: header files
 
COMP2710: Software Construction - Linked list exercises
COMP2710: Software Construction - Linked list exercisesCOMP2710: Software Construction - Linked list exercises
COMP2710: Software Construction - Linked list exercises
 
HDFS-HC2: Analysis of Data Placement Strategy based on Computing Power of Nod...
HDFS-HC2: Analysis of Data Placement Strategy based on Computing Power of Nod...HDFS-HC2: Analysis of Data Placement Strategy based on Computing Power of Nod...
HDFS-HC2: Analysis of Data Placement Strategy based on Computing Power of Nod...
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

An Application-Oriented Approach for Computer Security Education

  • 1. An Application-Oriented Approach for Computer Security Education Xiao Qin Department of Computer Science and Software Engineering Auburn University Email: xqin@auburn.edu URL: http://www.eng.auburn.edu/~xqin
  • 2. Goal and Objectives Goal: New approaches for computer security education Objective 1: To prepare students to design, implement, and test secure software Objective 2: A holistic platform for constructing computer security course projects Student-centered learning Professor-centered platform
  • 3.
  • 4. Challenges Student -Centered Learning Teamwork Secure Software Design Programming What projects can help students to learn about teamwork? Must we teach students how to design secure software? How to provide engaging computer security projects ? How to teach multiple programming languages?
  • 5. Challenges Professor -Centered Platform Flexibility Preparation Grading Teaching What projects can be tailored to students to learn about teamwork? What is a good way to grade computer security projects? How to quickly prepare engaging computer security projects ? How to teach computer security projects?
  • 6.
  • 7.
  • 8. Our Solution: Application-Oriented Approach Security Sensitive Applications Security Module 1 User Interface OS (Windows, Linux, etc.) Non-Security Modules Security Module n Security Modules
  • 9.
  • 10. A Unified Programming Environment Security Sensitive Applications Security Module 1 User Interface OS (Windows, Linux, etc.) Non-Security Modules Security Module n Virtual Machine (e.g. vmware, virtualBox )
  • 11.
  • 12. Flexibility How Modules Are Packaged Beginner Easy Intermediate Moderate Advanced Hard Explorative Light Editing Basic Understand Of Concepts Normal Implementation Depth Understanding Of Concept Advanced Implementation
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Workflow A professor’s perspective Teach Concept Generate Project Description Design Survey Questions Choose Apps & Difficulty Work On Project Evaluation/Feedback Design Docs & Partial Code System Setup
  • 18. Design Document Example: Data Flow – High Level
  • 19. Put It All Together An example A Banking System Access Control User Interface OS (Windows, Linux, etc.) Non-Security Modules Encryption IPSec Virtual Machine (e.g. vmware, virtualBox )
  • 20. Class Diagram A secure teller terminal system Intermediate
  • 21. Class Diagram A secure teller terminal system Advanced No security modules in the design document (e.g., class diagram)
  • 22. An Encrypted Staff File Beginner Beginner Easy Explorative Light Editing
  • 23. An Unencrypted Staff File Beginner Beginner Easy Explorative Light Editing
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. Evaluation Results (1) (1) ≤ 5 hours (2) 6-10 hours (3) 11-20 hours (4) 21-30 hours (5) > 30 hours Survey: Approximately, how many hours did you spend on the project? Design 81% <10h Implementation 46% >21h Entire Project 40% >30h
  • 31. Evaluation Results (2) (1) Strongly disagree (2) Disagree (3) Neutral (4) Agree (5) Strongly agree Survey: The project instructions were clear. Teller terminal system 69%: agree or strongly agree Cryptographic system 58%: agree or strongly agree
  • 32. Evaluation Results (3) (1) Very easy (2) Somewhat easy (3) Average (4) Somewhat difficult (5) Very difficult Survey: What was the level of difficulty of this project? Teller terminal system 61%: somewhat difficult or very difficult Cryptographic system 53%: somewhat difficult or very difficult
  • 33. Evaluation Results (4) Survey: What was the level of interest in this project? Teller terminal system 58%: Average, High, or very high Cryptographic system 85%: Average, High, or very high 1.  (1) Very low (2) Low (3) Average (4) High (5) Very high
  • 34. Evaluation Results (5) Survey: What was the most time consuming part of in the design portion of the project? Teller terminal system 44%: Use cases Cryptographic system 58%: Testing (1) Use Cases (2) Class Diagram (3) System Sequence Diagram (4) Testing
  • 35. Evaluation Results (6) (1) Strongly disagree (2) Disagree (3) Neutral (4) Agree (5) Strongly agree Survey: As a result of the lab, I am more interested in computer security. Teller terminal system 17%: strongly disagree or disagree Cryptographic system 20%: strongly disagree or disagree
  • 36.
  • 37. Evaluation Results (7 cont.) (1) Strongly disagree (2) Disagree (3) Neutral (4) Agree (5) Strongly agree Survey: Overall, I have attained the learning objectives of the project. Teller terminal system 52%: strongly agree or agree Cryptographic system 65%: strongly agree or agree
  • 38.
  • 39.
  • 40.  
  • 42.

Hinweis der Redaktion

  1. Research Assistants: Alfred Nelson, Andrew Pitchford, and John Barton
  2.  1: Provide engaging computer security laboratory and experiences. The project will facilitate novel computer security laboratory exercises that are holistically and seamlessly integrated into the QoSec middleware framework, which aim at preparing undergraduate students to implement real-world secure software applications. Using QoSec, students can effectively and successfully carry out computer security laboratory experiments that enable students to build relevant security modules, which in turn can be put together in QoSec to develop secure applications. To shorten the learning curve introduced by professional middleware, QoSec - to be used in engaging computer security laboratories - has an easy interface to reduce complexity of implementing large-scale secure computer and information systems. Students are expected to gain their practical experience in developing secure computing and information systems by conducting course projects integrated within QoSec.  2: Share the QoSec framework and its instructional materials. To allow other computer security educators to build on, connect to, and enhance the extensible QoSec framework, we will share QoSec and its accompanying instructional materials within the computer security education community. Other computer security educators have flexibility to design new and upgraded course projects as plugin modules of the QoSec framework, making it possible for their students to readily and seamlessly integrate the new and upgraded course projects into QoSec. This goal will be accomplished by the wide dissemination of QoSec and its learning materials to a growing network of computer security instructors through presentations at regional and national conferences.
  3. Share my experience: 1 project. 10-20 hours to prepare a project; 20-50 hours to implement a project. Can we save professors time spent in preparing labs?
  4. See also teaching philosophy from Wenliang Du’s SEED project.
  5. Recent studies (see, for example, [1] and [2]) show that students can effectively gain their knowledge and experience in building secure computer systems by conducting course projects. [1] W.-L Du and R.-H Wang, “SEED: A Suite of Instructional Laboratories for Computer Security Education,” The ACM Journal on Educational Resources in Computing (JERIC) , vol. 8, no. 1, March 2008. [2] S.J. Lincke, “Network Security Auditing as a Community-Based Learning Project,” Proc. 38th SIGCSE Tech. Symp. Computer Science Education , pp. 476-480, March 2007. Problem: existing computer security laboratory exercises are comprised of small-scale, fragmented, and isolated course projects.
  6. Conventional Computer Security curriculums Exercises which engage the student in real world scenarios Developing practice laboratory modules Network security design principles
  7. Next: let’s consider programming environment.
  8. Conventional Computer Security curriculums Exercises which engage the student in real world scenarios Developing practice laboratory modules Network security design principles
  9. 3 research assistants Approach 1: each RA design and implement a security sensitive application Approach 2: 3 RAs collaborate on a single application. We took approach 2.
  10. 3 research assistants Approach 1: each RA design and implement a security sensitive application Approach 2: 3 RAs collaborate on a single application. We took approach 2.
  11. Integrate modules Students – integrate the security modules. Learn to manage existing system. Experience reading other’s code.
  12. Conventional Computer Security curriculums Exercises which engage the student in real world scenarios Developing practice laboratory modules Network security design principles Another example: access control Need a better way of teaching Access Control. Usually, a very simple project, 3-4 classes. Built from scratch, very shallow. Our solution: implement it within our Banking project.
  13. No security modules in the design document
  14. Recap Learn general principles of software security. Simple yet sophisticated. Learn to integrate module into existing system.
  15. How to choose a course to test our approach? Comp 4370 – Introduction to Computer and Network Security Introductory-level course Students have programming experiences Small-scale projects for advanced students Comp 7370 – Advanced Computer and Network Security Research projects e.g.,memory attacks. Performance evaluation Comp 2710 – Software Construction No design experience Weak programming skill (Note: Engaging weak programmers in problem solving ) Quickly teach/learn basic security concepts Motivate us to improve students’ design skill and design tools 57 Students 48 participants
  16. 57 Students 48 participants
  17. 57 Students 48 participants, project 1 53 project 2
  18. Interface, simple database, access control
  19. Interface, simple database, access control
  20. Interface, simple database, access control
  21. Interface, simple database, access control Observation: Easier -&gt; more interests Implication: Help students to better design and implement applications
  22. Interface, simple database, access control Observation: help students with the time-consuming parts Implication: Help students to efficiently design applications
  23. Interface, simple database, access control
  24. Interface, simple database, access control
  25. Interface, simple database, access control