PA193 Seminar on secure coding principles and practices

Faculty of Informatics
Spring 2023
Extent and Intensity
0/2/1. 3 credit(s) (plus extra credits for completion). Type of Completion: z (credit).
Taught in person.
Lukasz Michal Chmielewski, PhD (lecturer)
doc. RNDr. Petr Švenda, Ph.D. (lecturer)
RNDr. Lukáš Ručka (seminar tutor)
Mgr. Marek Sýs, Ph.D. (seminar tutor)
RNDr. Antonín Dufka (assistant)
Guaranteed by
Lukasz Michal Chmielewski, PhD
Department of Computer Systems and Communications - Faculty of Informatics
Supplier department: Department of Computer Systems and Communications - Faculty of Informatics
Timetable of Seminar Groups
PA193/01: Tue 14. 2. to Tue 9. 5. Tue 10:00–11:50 A403, L. Chmielewski
PA193/02: Tue 14. 2. to Tue 9. 5. Tue 12:00–13:50 A403, L. Chmielewski
PA193/03: Tue 14. 2. to Tue 9. 5. Tue 14:00–15:50 A403, L. Chmielewski
( PV286 Secure coding principles || NOW ( PV286 Secure coding principles ) ) && SOUHLAS
Basic knowledge in applied cryptography and IT security, practical experience in programming with C/C++ language, basic knowledge in formal languages and compilers, user-level experience with Windows and Linux OS
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 36 student(s).
Current registration and enrolment status: enrolled: 24/36, only registered: 1/36, only registered with preference (fields directly associated with the programme): 1/36
fields of study / plans the course is directly associated with
there are 32 fields of study the course is directly associated with, display
Course objectives
At the end of this course the student will understand what the typical security issues related to secure coding are. The student will also be able to design applications and write programs in C/C++, Java and other languages in a more secure way.
Learning outcomes
After a course completion, the student will be able to:
- able to review source code for typical security bugs;
- able to properly check and sanitize check program input data;
- able to use standard tools for static and dynamic code analysis and interpret results;
- able to describe typical bugs from concurrent program execution and write code without it;
- able to apply systematic methods to produce code with better resiliency against bugs;
- understand basic cryptographic primitives and their proper use in source code;
  • Language level vulnerabilities, secure programming techniques and approaches, input processing, static and dynamic code checking, binary defenses and exploits, security testing, integrity of modules, concurrent issues, random number generation and usage, security primitives, security code review.
Teaching methods
Seminars in the computer lab, home assignments.
Assessment methods
Six assignments (homework) related to seminars.
Language of instruction
Follow-Up Courses
Further Comments
Study Materials
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Autumn 2013, Autumn 2014, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018, Autumn 2019, Spring 2021, Spring 2022.
  • Enrolment Statistics (recent)
  • Permalink: