{"id":"https://openalex.org/W4407950209","doi":"https://doi.org/10.1109/fie61694.2024.10893584","title":"Utilizing Real-World Software Vulnerabilities to Enhance Secure Programming Education","display_name":"Utilizing Real-World Software Vulnerabilities to Enhance Secure Programming Education","publication_year":2024,"publication_date":"2024-10-13","ids":{"openalex":"https://openalex.org/W4407950209","doi":"https://doi.org/10.1109/fie61694.2024.10893584"},"language":"en","primary_location":{"id":"doi:10.1109/fie61694.2024.10893584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fie61694.2024.10893584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Frontiers in Education Conference (FIE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053604069","display_name":"Denise Daniels","orcid":null},"institutions":[{"id":"https://openalex.org/I11786554","display_name":"Virginia State University","ror":"https://ror.org/04esvpn06","country_code":"US","type":"education","lineage":["https://openalex.org/I11786554"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Denise Daniels","raw_affiliation_strings":["Virginia State University,Petersburg,Virginia,U.S.A"],"affiliations":[{"raw_affiliation_string":"Virginia State University,Petersburg,Virginia,U.S.A","institution_ids":["https://openalex.org/I11786554"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082343936","display_name":"Joon Suk Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I11786554","display_name":"Virginia State University","ror":"https://ror.org/04esvpn06","country_code":"US","type":"education","lineage":["https://openalex.org/I11786554"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joon Suk Lee","raw_affiliation_strings":["Virginia State University,Petersburg,Virginia,U.S.A"],"affiliations":[{"raw_affiliation_string":"Virginia State University,Petersburg,Virginia,U.S.A","institution_ids":["https://openalex.org/I11786554"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114375874","display_name":"Hui Chen","orcid":"https://orcid.org/0000-0002-9840-4876"},"institutions":[{"id":"https://openalex.org/I83041322","display_name":"Brooklyn College","ror":"https://ror.org/019k4jq75","country_code":"US","type":"education","lineage":["https://openalex.org/I83041322"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hui Chen","raw_affiliation_strings":["CUNY Brooklyn College,Brooklyn,New York,U.S.A"],"affiliations":[{"raw_affiliation_string":"CUNY Brooklyn College,Brooklyn,New York,U.S.A","institution_ids":["https://openalex.org/I83041322"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073349866","display_name":"Kostadin Damevski","orcid":"https://orcid.org/0000-0001-7799-2026"},"institutions":[{"id":"https://openalex.org/I184840846","display_name":"Virginia Commonwealth University","ror":"https://ror.org/02nkdxk79","country_code":"US","type":"education","lineage":["https://openalex.org/I184840846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kostadin Damevski","raw_affiliation_strings":["Virginia Commonwealth University,Richmond,Virginia,U.S.A"],"affiliations":[{"raw_affiliation_string":"Virginia Commonwealth University,Richmond,Virginia,U.S.A","institution_ids":["https://openalex.org/I184840846"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053604069"],"corresponding_institution_ids":["https://openalex.org/I11786554"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29533566,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9751999974250793,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9664999842643738,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7557704448699951},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.661899209022522},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5438060164451599},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.514342188835144},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4908007085323334},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.43012702465057373},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.43002089858055115},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3717828094959259},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2554475963115692},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.21055763959884644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7557704448699951},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.661899209022522},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5438060164451599},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.514342188835144},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4908007085323334},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.43012702465057373},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.43002089858055115},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3717828094959259},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2554475963115692},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.21055763959884644},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fie61694.2024.10893584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fie61694.2024.10893584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Frontiers in Education Conference (FIE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2774827202","display_name":null,"funder_award_id":"2235224,2235976","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W16117263","https://openalex.org/W1983593788","https://openalex.org/W2009035006","https://openalex.org/W2038019028","https://openalex.org/W2051211166","https://openalex.org/W2071398390","https://openalex.org/W2086515904","https://openalex.org/W2107426351","https://openalex.org/W2112720435","https://openalex.org/W2118350594","https://openalex.org/W2122025961","https://openalex.org/W2124879697","https://openalex.org/W2138817054","https://openalex.org/W2145356869","https://openalex.org/W2415122762","https://openalex.org/W2482994346","https://openalex.org/W2616894455","https://openalex.org/W2767114065","https://openalex.org/W2792091033","https://openalex.org/W2930152117","https://openalex.org/W2990318625","https://openalex.org/W3007294856","https://openalex.org/W3047686302","https://openalex.org/W3128021912","https://openalex.org/W3134187657","https://openalex.org/W3153492392","https://openalex.org/W3181014741","https://openalex.org/W4200090870","https://openalex.org/W4232488826","https://openalex.org/W4288083638","https://openalex.org/W4293227721","https://openalex.org/W4298052160","https://openalex.org/W6787721999"],"related_works":["https://openalex.org/W1978034799","https://openalex.org/W2007984522","https://openalex.org/W4384518368","https://openalex.org/W2141388993","https://openalex.org/W2155353733","https://openalex.org/W2504659933","https://openalex.org/W2039943835","https://openalex.org/W2293245356","https://openalex.org/W2560421591","https://openalex.org/W1566131087"],"abstract_inverted_index":{"This":[0],"research":[1],"paper":[2],"describes":[3],"a":[4,31,56,115,149],"study":[5,150,160],"of":[6,50,62,121,138,140],"using":[7],"real-world":[8,167],"vulnerabilities":[9,73,87,106,168],"to":[10,26,34,53,70,97],"motivate":[11],"computer":[12],"science":[13],"students":[14,54,69,98,164],"to-wards":[15],"learning":[16,78,146],"secure":[17,37,81],"programming.":[18,82],"Given":[19],"the":[20,48,60,89,122,132,136,172,177,187],"rise":[21],"in":[22,152,155,169,183],"cybersecurity":[23],"incidents":[24],"due":[25],"programming":[27,38],"errors,":[28],"there":[29],"is":[30],"pressing":[32],"need":[33],"improve":[35],"programmers'":[36],"skills.":[39],"Despite":[40],"educators'":[41],"numerous":[42],"efforts":[43],"towards":[44,80],"this":[45,51],"goal,":[46],"communicating":[47],"importance":[49],"training":[52],"remains":[55],"challenge.":[57],"Grounding":[58],"on":[59,144],"theory":[61],"intrinsic":[63],"motivation,":[64],"we":[65,174],"propose":[66],"that":[67,93,163,180],"exposing":[68],"authentic,":[71],"relatable":[72,96],"can":[74],"significantly":[75],"enhance":[76],"their":[77],"orientation":[79],"Our":[83],"approach":[84],"involves":[85],"selecting":[86],"from":[88],"National":[90],"Vulnerability":[91],"Database":[92],"are":[94,107],"both":[95],"and":[99,124,127,179],"understandable":[100],"without":[101],"extensive":[102],"external":[103],"context.":[104],"These":[105],"transformed":[108],"into":[109],"comprehensive":[110],"course":[111,142],"modules,":[112],"each":[113],"featuring":[114],"demonstrative":[116],"video,":[117],"source":[118],"code":[119],"snippets":[120],"vulnerability":[123],"its":[125],"patch,":[126],"associated":[128],"developer":[129],"communications":[130],"about":[131],"vulnerability.":[133],"We":[134],"assess":[135],"impact":[137],"one":[139],"our":[141],"modules":[143],"students'":[145],"disposition":[147],"through":[148],"conducted":[151],"two":[153],"universities":[154],"an":[156],"identical":[157],"setting.":[158],"The":[159],"results":[161],"indicate":[162],"appreciate":[165],"seeing":[166],"detail,":[170],"especially":[171],"video":[173],"recorded":[175],"reproducing":[176],"vulnerability,":[178],"they":[181],"gain":[182],"self-efficacy":[184],"after":[185],"completing":[186],"module.":[188]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
