Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
Test-Driven Assessment of Access Control in Legacy Applications
ICST '08 Proceedings of the 2008 International Conference on Software Testing, Verification, and Validation
Analyzing websites for user-visible security design flaws
Proceedings of the 4th symposium on Usable privacy and security
A tool for automated test code generation from high-level petri nets
PETRI NETS'11 Proceedings of the 32nd international conference on Applications and theory of Petri Nets
An Analysis and Survey of the Development of Mutation Testing
IEEE Transactions on Software Engineering
Testing Obligation Policy Enforcement Using Mutation Analysis
ICST '12 Proceedings of the 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation
Automated Security Test Generation with Formal Threat Models
IEEE Transactions on Dependable and Secure Computing
A model-based approach to automated testing of access control policies
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
The specification and compilation of obligation policies for program monitoring
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |
This paper presents a unique summer project for a group of undergraduate students and high school computer teachers to gain research experiences in the area of cybersecurity. The students and teachers were selected from the participants in the NSF REU and RET programs at the host institution. Through the research on security testing of a real-world online banking system, the students and teachers have not only learned about the cutting-edge security testing techniques, but also made publishable contributions to the research base. The two collaborating graduate assistants served as an immediate role model for the undergraduates and an indirect role model for high school students through the teachers. With the help from the graduate assistants, the students and teachers were able to work effectively toward achieving their research objectives. The internal competition helped the participants get a better sense of achievement and satisfaction. The research experiences also prepared the teachers with the necessary knowledge for introducing cybersecurity topics (e.g., secure programming) into future classroom activity. As such, the project described in this paper provides a model summer program for undergraduate and/or K-12 teachers to gain research experiences.