D 2024

Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report

MALINKA, Kamil; Anton FIRC; Pavel LOUTOCKÝ; Jakub VOSTOUPAL; Andrej KRIŠTOFÍK et al.

Základní údaje

Originální název

Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report

Vydání

New York, Proceedings of the 2024 Inno- vation and Technology in Computer Science Education V. 1 (ITiCSE 2024), od s. 227-233, 7 s. 2024

Nakladatel

Association for Computing Machinery

Další údaje

Jazyk

angličtina

Typ výsledku

Stať ve sborníku

Obor

50501 Law

Stát vydavatele

Spojené státy

Utajení

není předmětem státního či obchodního tajemství

Forma vydání

elektronická verze "online"

Označené pro přenos do RIV

Ano

Kód RIV

RIV/00216224:14220/24:00135947

Organizační jednotka

Právnická fakulta

ISBN

979-8-4007-0600-4

ISSN

EID Scopus

Klíčová slova anglicky

University Education; Bug Bounty; Cybersecurity Specialization; Secure coding; Course Assignment; Experience Report

Štítky

Příznaky

Mezinárodní význam, Recenzováno
Změněno: 11. 3. 2025 12:47, Mgr. Petra Georgala

Anotace

V originále

To keep up with the growing number of cyber-attacks and associ- ated threats, there is an ever-increasing demand for cybersecurity professionals and new methods and technologies. Training new cybersecurity professionals is a challenging task due to the broad scope of the area. One particular field where there is a shortage of experts is Ethical Hacking. Due to its complexity, it often faces educational constraints. Recognizing these challenges, we propose a solution: integrating a real-world bug bounty programme into the cybersecurity curriculum. This innovative approach aims to fill the practical cybersecurity education gap and brings additional positive benefits. To evaluate our idea, we include the proposed solution to a se- cure coding course for IT-oriented faculty. We let students choose to participate in a bug bounty programme as an option for the semester assignment in a secure coding course. We then collected responses from the students to evaluate the outcomes (improved skills, reported vulnerabilities, a better relationship with security, etc.). Evaluation of the assignment showed that students enjoyed solving such real-world problems, could find real vulnerabilities, and that it helped raise their skills and cybersecurity awareness. Participation in real bug bounty programmes also positively af- fects the security level of the tested products. We also discuss the potential risks of this approach and how to mitigate them.