Understanding and Improving Secure Coding Behavior with Eye Tracking Methodologies

被引:2
作者
Davis, Daniel [1 ]
Zhu, Feng [1 ]
机构
[1] Univ Alabama Huntsville, Comp Sci Dept, Huntsville, AL 35899 USA
来源
ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE | 2020年
关键词
Cybersecurity; Cyber Threats; Education; Coding Behavior; Eye Tracking; Software Vulnerabilities; Cyber-Attacks; Secure Coding;
D O I
10.1145/3374135.3385293
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure coding is a mission that cannot be neglected as computing devices continue increasing. Every year, thousands of new software vulnerabilities are identified. Education is a crucial factor and a significant challenge to counter cyber threats. But gaining insight into how people learn has always been challenging. There is a considerable need for improved methodologies with active hands-on educational techniques for programmers to learn practical strategies to mitigate software vulnerabilities; to protect private data; and ultimately to write secure code in the first place. To the best of our knowledge, this is the first usage of eye tracking technologies to understand secure coding practices and to improve education. We focused on exploring the ways that students comprehended and learned to develop secure software. We recorded their eye gaze movements while they studied our hands-on learning module and mitigated the weaknesses within the source code. Our study involved 29 students mitigating software vulnerabilities via manual analysis of the source code. The eye tracking data allows us to objectively study and gain insight in order to understand and improve students learning behavior. Our analysis indicates that there is a distinction in the learning phase for students that answered correctly compared to students that did not provide the correct mitigation strategy. Specifically, our research indicates the most effective and efficient way to learn secure coding is to fully understand coding errors before working on the source code. Our findings also suggest that we can use reading patterns to understand student behaviors in order to be capable of developing improved hands-on learning material.
引用
收藏
页码:107 / 114
页数:8
相关论文
共 46 条
[1]  
[Anonymous], 2019, Psychology and Neuroscience
[2]  
[Anonymous], 2003, Writing Secure Code
[3]  
[Anonymous], OWASP ZAP
[4]  
Bednarik R., 2013, REPORTS STUDIES FORE, V42
[5]  
Bednarik Roman, 2016, Reports and Studies in Forestry and Natural Sciences
[6]  
Busjahn T., 2015, 9 WIPSCE C COMP ED J
[7]  
Buttner D., 2014, The Importance of Manual Secure Code Review
[8]  
Coley S., 2014, COMM WEAKN SCOR SYST
[9]  
Duchowski A.T., 2017, Eye tracking methodology: Theory and practice
[10]  
Farnsworth B., 2017, IMOTIONS JAN