Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report

Warning

This publication doesn't include Institute of Computer Science. It includes Faculty of Law. Official publication website can be found on muni.cz.
Authors

MALINKA Kamil FIRC Anton LOUTOCKÝ Pavel VOSTOUPAL Jakub KRIŠTOFÍK Andrej KASL František

Year of publication 2024
Type Article in Proceedings
Conference Proceedings of the 2024 Inno- vation and Technology in Computer Science Education V. 1 (ITiCSE 2024)
MU Faculty or unit

Faculty of Law

Citation
web https://arxiv.org/abs/2404.12043
Doi http://dx.doi.org/10.1145/3649217.3653633
Keywords University Education; Bug Bounty; Cybersecurity Specialization; Secure coding; Course Assignment; Experience Report
Description To keep up with the growing number of cyber-attacks and associ- ated threats, there is an ever-increasing demand for cybersecurity professionals and new methods and technologies. Training new cybersecurity professionals is a challenging task due to the broad scope of the area. One particular field where there is a shortage of experts is Ethical Hacking. Due to its complexity, it often faces educational constraints. Recognizing these challenges, we propose a solution: integrating a real-world bug bounty programme into the cybersecurity curriculum. This innovative approach aims to fill the practical cybersecurity education gap and brings additional positive benefits. To evaluate our idea, we include the proposed solution to a se- cure coding course for IT-oriented faculty. We let students choose to participate in a bug bounty programme as an option for the semester assignment in a secure coding course. We then collected responses from the students to evaluate the outcomes (improved skills, reported vulnerabilities, a better relationship with security, etc.). Evaluation of the assignment showed that students enjoyed solving such real-world problems, could find real vulnerabilities, and that it helped raise their skills and cybersecurity awareness. Participation in real bug bounty programmes also positively af- fects the security level of the tested products. We also discuss the potential risks of this approach and how to mitigate them.

You are running an old browser version. We recommend updating your browser to its latest version.

More info