{"id":"https://openalex.org/W4410986733","doi":"https://doi.org/10.1109/educon62633.2025.11016492","title":"Designing a Platform to Train Secure Programming Skills with Attack-and-Defend Exercises","display_name":"Designing a Platform to Train Secure Programming Skills with Attack-and-Defend Exercises","publication_year":2025,"publication_date":"2025-04-22","ids":{"openalex":"https://openalex.org/W4410986733","doi":"https://doi.org/10.1109/educon62633.2025.11016492"},"language":"en","primary_location":{"id":"doi:10.1109/educon62633.2025.11016492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon62633.2025.11016492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065996818","display_name":"Leo St. Amour","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Leo St. Amour","raw_affiliation_strings":["Virginia Tech,Dept. of Computer Science,Blacksburg,USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech,Dept. of Computer Science,Blacksburg,USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013168771","display_name":"Eli Tilevich","orcid":"https://orcid.org/0000-0003-2415-6926"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eli Tilevich","raw_affiliation_strings":["Virginia Tech,Dept. of Computer Science,Blacksburg,USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech,Dept. of Computer Science,Blacksburg,USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065996818"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":3.4958,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92238575,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9230999946594238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9230999946594238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9050999879837036,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7212133407592773},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5157108902931213}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7212133407592773},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5157108902931213}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/educon62633.2025.11016492","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon62633.2025.11016492","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1971845200","https://openalex.org/W2023860755","https://openalex.org/W2035208228","https://openalex.org/W2049881620","https://openalex.org/W2054810911","https://openalex.org/W2062315768","https://openalex.org/W2071398390","https://openalex.org/W2082374501","https://openalex.org/W2083348715","https://openalex.org/W2169442160","https://openalex.org/W2729115344","https://openalex.org/W2767123881","https://openalex.org/W2790274259","https://openalex.org/W2956195647","https://openalex.org/W3097083941","https://openalex.org/W3109159882","https://openalex.org/W3163436837","https://openalex.org/W3170842884","https://openalex.org/W3186320640","https://openalex.org/W3205929783","https://openalex.org/W4286544159","https://openalex.org/W4293227721","https://openalex.org/W4321787130","https://openalex.org/W4392186376","https://openalex.org/W6634871116","https://openalex.org/W6636507879","https://openalex.org/W6742069570","https://openalex.org/W6746979650","https://openalex.org/W6780976895","https://openalex.org/W7047436789"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,221],"increasingly":[1],"poor":[2],"state":[3],"of":[4,12,61,110,177,213,289,321],"software":[5,26,151,291],"security":[6,39,277,312],"poses":[7],"significant":[8],"threats":[9],"to":[10,32,123,130,147,161,192,198,229,248,261,270,272,304,316],"many":[11],"modern":[13],"society's":[14],"critical":[15],"functions.":[16],"Computing":[17],"educators":[18],"play":[19],"a":[20,88,154,172,218],"pivotal":[21],"role":[22],"in":[23,116,153,206,325],"equipping":[24],"future":[25],"engineers":[27],"with":[28,141],"the":[29,59,108,163,211,238,246,263,266,286,306,318,326],"necessary":[30],"skills":[31],"build":[33,204],"secure":[34,56,71,96,134,178,250,323],"systems.":[35],"However,":[36],"while":[37],"traditional":[38],"courses":[40],"often":[41,65],"focus":[42],"on":[43,87,94,186],"conceptual":[44],"knowledge,":[45],"practical":[46,169],"application":[47],"is":[48,160,190],"crucial":[49],"for":[50,69,284,309],"ensuring":[51],"students":[52,64,129,140,197,315],"can":[53],"develop":[54],"robust,":[55],"software.":[57],"Despite":[58],"importance":[60],"hands-on":[62,295],"experience,":[63],"lack":[66],"suitable":[67],"platforms":[68,76],"practicing":[70],"programming.":[72],"Inspired":[73],"by":[74,127,254],"drill-and-practice":[75],"that":[77,91,225,242],"effectively":[78],"train":[79],"general":[80],"programming":[81,135,251],"skills,":[82],"we":[83,106,216,259],"have":[84],"been":[85],"working":[86],"similar":[89],"platform":[90],"focuses":[92],"explicitly":[93],"teaching":[95],"coding":[97,179],"practices":[98],"through":[99],"active":[100,117,298],"learning":[101,118,194,299],"strategies.":[102],"In":[103],"this":[104],"paper,":[105],"discuss":[107],"design":[109,121,244,302],"our":[111,214],"prototype":[112],"implementation:":[113],"SecureCoder.":[114],"Rooted":[115],"principles,":[119],"SecureCoder's":[120,243,255,301],"aims":[122,303],"promote":[124],"student-centered":[125],"education":[126,268],"encouraging":[128],"actively":[131],"apply":[132],"theoretical":[133,166],"concepts.":[136],"Specifically,":[137],"SecureCoder":[138,189,228],"engages":[139],"interactive":[142],"attack-and-defend":[143,239],"exercises,":[144,188],"challenging":[145],"them":[146],"exploit":[148],"or":[149],"patch":[150],"vulnerabilities":[152],"sandboxed":[155],"environment.":[156],"Our":[157],"ultimate":[158],"objective":[159],"bridge":[162],"gap":[164],"between":[165],"knowledge":[167],"and":[168,175,183,195,203,232,273,297],"application,":[170],"fostering":[171],"deeper":[173],"understanding":[174],"retention":[176],"principles.":[180],"Through":[181],"immediate":[182],"actionable":[184],"feedback":[185],"validated":[187],"designed":[191],"reinforce":[193],"empower":[196],"iteratively":[199],"refine":[200],"their":[201,207],"solutions":[202,324],"confidence":[205],"skills.":[208],"To":[209],"study":[210,222],"potential":[212,247],"design,":[215],"conducted":[217],"pilot":[219],"study.":[220],"results":[223],"indicate":[224],"participants":[226],"found":[227],"be":[230],"relevant":[231],"engaging.":[233],"Further,":[234],"participant":[235],"perceptions":[236],"toward":[237],"exercises":[240],"suggest":[241],"has":[245],"enhance":[249],"education.":[252],"Encouraged":[253],"initial":[256],"positive":[257],"reception,":[258],"plan":[260],"open-source":[262],"project,":[264],"inviting":[265],"broader":[267],"community":[269],"contribute":[271],"benefit":[274],"from":[275],"shared":[276],"expertise.":[278],"These":[279],"collaborative":[280],"efforts":[281],"are":[282],"essential":[283],"educating":[285],"next":[287],"generation":[288],"security-aware":[290],"engineers.":[292],"By":[293],"integrating":[294],"practice":[296],"techniques,":[300],"address":[305],"urgent":[307],"need":[308],"practical,":[310],"skill-based":[311],"education,":[313],"preparing":[314],"meet":[317],"ever-evolving":[319],"challenges":[320],"engineering":[322],"real":[327],"world.":[328]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
