Главная
Study mode:
on
1
Introduction
2
Why Contests
3
Principles
4
Contest Structure
5
Incentive Structures
6
Scoring System
7
Break It and Fix It
8
Builder Scores
9
Zerosum Game
10
Contest Data
11
Build It
12
Fix It
13
The Results
14
Secure Log
15
Results
16
Programming Languages
17
Analyzing the Score
18
The Score Table
19
The Graph
20
Common bugs
21
Example
22
Resilience
23
Future Research
24
Conclusion
Description:
Explore a novel approach to secure software development through a contest-based framework presented at the 23rd ACM Conference on Computer and Communications Security. Delve into the principles, structure, and incentive systems of the "Build It, Break It, Fix It" contest, designed to improve secure coding practices. Examine the scoring system, contest data, and results from the secure log implementation challenge. Analyze the impact of programming language choices, common bugs, and resilience factors on security outcomes. Gain insights into future research directions and potential applications of this innovative methodology for enhancing software security.

Build It, Break It, Fix It - Contesting Secure Development

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00