Serious Game for Industrial Cybersecurity: Experiential Learning through Code Review

被引:0
作者
Iosif, Andrei-Cristian [1 ]
Lechner, Ulrike [2 ]
Pinto-Albuquerque, Maria [3 ]
Gasiba, Tiago Espinha [1 ]
机构
[1] Siemens AG, Munich, Germany
[2] Univ Bundeswehr Munchen, Munich, Germany
[3] Inst Univ Lisboa ISCTE IUL, ISTAR, Lisbon, Portugal
来源
2024 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING EDUCATION AND TRAINING, CSEE & T 2024 | 2024年
关键词
Code Review; Cybersecurity; Compliance; Action Design Research; Developer Empowerment; SOFTWARE DEVELOPERS; DESIGN SCIENCE;
D O I
10.1109/CSEET62301.2024.10663058
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Every stage of the industrial software development process is crucial for ensuring high-quality results in a time of increasing digitalization and complexity. Code review is a method to enhance software quality and also promote knowledge exchange among teams. It is generally accepted that the earlier that software bugs and vulnerabilities are caught during product development, the more costs can be saved. As such, code review can play an important role in industrial software development. However, industry experience showcases that code review can be resource-intensive, and the direct impact on code quality can be hard to quantify. Related work shows that practitioners performing code reviews do not focus specifically on security, partly due to a gap in awareness of the topic. Our research focuses on improving the efficiency and effectiveness of code review practices, particularly in identifying and addressing security issues in an industrial context. The present work showcases results from using a serious game as a means to empower developers, by exhibiting code review best practices and raising awareness of security concerns. We collect results over a series of 11 experiments conducted in an industrial setting together with a total of 175 industrial practitioners, serving as a pilot stage, based on which we discuss and conclude on important aspects of the design of the game.
引用
收藏
页数:6
相关论文
共 34 条
  • [21] Code Reviewing in the Trenches Challenges and Best Practices
    MacLeod, Laura
    Greiler, Michaela
    Storey, Margaret-Anne
    Bird, Christian
    Czerwonka, Jacek
    [J]. IEEE SOFTWARE, 2018, 35 (04) : 34 - 42
  • [22] Preliminary Findings about DevSecOps from Grey Literature
    Mao, Runfeng
    Zhang, He
    Dai, Qiming
    Huang, Huang
    Rong, Guoping
    Shen, Haifeng
    Chen, Lianping
    Lu, Kaixiang
    [J]. 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS 2020), 2020, : 450 - 457
  • [23] How to Integrate Security Compliance Requirements with Agile Software Engineering at Scale?
    Moyon, Fabiola
    Mendez, Daniel
    Beckers, Kristian
    Klepper, Sebastian
    [J]. PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT (PROFES 2020), 2020, 12562 : 69 - 87
  • [24] O. Foundation, 2021, OWASP Top 10-2021
  • [25] Challenges and solutions when adopting DevSecOps: A systematic review
    Rajapakse, Roshan N.
    Zahedi, Mansooreh
    Babar, M. Ali
    Shen, Haifeng
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 141
  • [26] Holding on to Compliance While Adopting DevSecOps: An SLR
    Ramaj, Xhesika
    Sanchez-Gordon, Mary
    Gkioulos, Vasileios
    Chockalingam, Sabarathinam
    Colomo-Palacios, Ricardo
    [J]. ELECTRONICS, 2022, 11 (22)
  • [27] Managing Security in Software Or: How I Learned to Stop Worrying and Manage the Security Technical Debt
    Rindell, Kalle
    Bernsmed, Karin
    Jaatun, Martin Gilje
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [28] Sein MK, 2011, MIS QUART, V35, P37
  • [29] Siami Namin A., 2016, CSEIT. Global Science & Technology Forum (GSTF)
  • [30] SnchezGordn M., 2020, P IEEE ACM 42 INT C, P266, DOI DOI 10.1145/3387940.3392233