Serious Game for Industrial Cybersecurity: Experiential Learning through Code Review

被引:0
作者
Iosif, Andrei-Cristian [1 ]
Lechner, Ulrike [2 ]
Pinto-Albuquerque, Maria [3 ]
Gasiba, Tiago Espinha [1 ]
机构
[1] Siemens AG, Munich, Germany
[2] Univ Bundeswehr Munchen, Munich, Germany
[3] Inst Univ Lisboa ISCTE IUL, ISTAR, Lisbon, Portugal
来源
2024 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING EDUCATION AND TRAINING, CSEE & T 2024 | 2024年
关键词
Code Review; Cybersecurity; Compliance; Action Design Research; Developer Empowerment; SOFTWARE DEVELOPERS; DESIGN SCIENCE;
D O I
10.1109/CSEET62301.2024.10663058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Every stage of the industrial software development process is crucial for ensuring high-quality results in a time of increasing digitalization and complexity. Code review is a method to enhance software quality and also promote knowledge exchange among teams. It is generally accepted that the earlier that software bugs and vulnerabilities are caught during product development, the more costs can be saved. As such, code review can play an important role in industrial software development. However, industry experience showcases that code review can be resource-intensive, and the direct impact on code quality can be hard to quantify. Related work shows that practitioners performing code reviews do not focus specifically on security, partly due to a gap in awareness of the topic. Our research focuses on improving the efficiency and effectiveness of code review practices, particularly in identifying and addressing security issues in an industrial context. The present work showcases results from using a serious game as a means to empower developers, by exhibiting code review best practices and raising awareness of security concerns. We collect results over a series of 11 experiments conducted in an industrial setting together with a total of 175 industrial practitioners, serving as a pilot stage, based on which we discuss and conclude on important aspects of the design of the game.
引用
收藏
页数:6
相关论文
共 34 条
  • [1] Ami AS, 2023, Arxiv, DOI arXiv:2307.16325
  • [2] [Anonymous], 2023, CWE Top 25 Most Dangerous Software Weaknesses
  • [3] [Anonymous], 2019, ISO/IEC TR 24772-1:2019
  • [4] [Anonymous], 2019, ISO/IEC 64223-4-2:2019-12
  • [5] [Anonymous], 2017, ISO/IEC 20246:2017
  • [6] [Anonymous], 2018, ISO/IEC 64223-4-1:2018-1
  • [7] Baskerville RL, 1996, J INFORM TECHNOL, V11, P235, DOI 10.1080/026839696345289
  • [8] Characteristics of Useful Code Reviews: An Empirical Study at Microsoft
    Bosu, Amiangshu
    Greiler, Michaela
    Bird, Christian
    [J]. 12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), 2015, : 146 - 156
  • [9] Software Security during Modern Code Review: The Developer's Perspective
    Braz, Larissa
    Bacchelli, Alberto
    [J]. PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 810 - 821
  • [10] Brooks C., 2023, Cybersecurity trends and statistics