Proceedings of the 41st ACM Technical Symposium on Computer Science Education 2010
DOI: 10.1145/1734263.1734303
|View full text |Cite
|
Sign up to set email alerts
|

Teaching the principles of the hacker curriculum to undergraduates

Abstract: The "Hacker Curriculum" exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability to question the trust assumptions in the design and implementation of computer systems rather than any negative use of such skills.Chief among these principles and methods are two useful pedagogical techniques: (1) developing a cross-layer view of systems (one unconstrained by API definitions or traditional subject matter boundaries) and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(22 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…This approach is predicated on the utility of understanding failure modes. Rather than teaching students the "success" cases, we attempt to deliver a culture shock that makes them disrespect API boundaries and adopt a cross-layer view of the CS discipline as described by Bratus et al [3]. We also routinely encourage our students to adopt a dual frame of mind (attacker and defender) when solving problems to prevent artificial abstraction layers from becoming boundaries of competence [20].…”
Section: Related Workmentioning
confidence: 99%
“…This approach is predicated on the utility of understanding failure modes. Rather than teaching students the "success" cases, we attempt to deliver a culture shock that makes them disrespect API boundaries and adopt a cross-layer view of the CS discipline as described by Bratus et al [3]. We also routinely encourage our students to adopt a dual frame of mind (attacker and defender) when solving problems to prevent artificial abstraction layers from becoming boundaries of competence [20].…”
Section: Related Workmentioning
confidence: 99%
“…[10] One methodology for incorporating cyber ethics into an information security program is the introduction of students to ethical hacking techniques. With the growth of the Internet from computers to phones to tablets there is an increase in the types of security threats around the world, challenging the academic world to prepare qualified information security and information assurance professionals (graduates) who also incorporate ethics into their skill sets [11][12][13]. Such techniques build a sense of responsibility for the security of all online users as a whole and teach students to find vulnerabilities in a responsible manner, including the reporting of those vulnerabilities to the appropriate parties.…”
Section: Need For Cyber Ethics In Information Security Curriculamentioning
confidence: 99%
“…Consequently, students trained in offensive techniques do not necessarily become malicious hackers, but rather become competent security professionals. The fact of not studying and applying the techniques, tactics, and methodologies of attackers would leave large gaps in the knowledge base of graduates (Brutus et al, 2010;Ledin, 2011). However, it is obvious that there is no guarantee that very few of the students who have been taught offensive techniques in schools will be hackers in the future and perform malicious hacking activities against systems and networks.…”
Section: University Email Servers (14%)mentioning
confidence: 99%
“…However, there is growing interest in offensive techniques which were originally developed by hackers (Bishop, 1997;Brutus, Shubina, & Locasto, 2010;Hill, Carver, Humphries, & Pooch, 2001;Ledin, 2011;Mullins et al, 2002;Trabelsi, 2011;Yuan & Zhong, 2008). In fact, ethical hacking techniques are central for better understanding the ways in which security systems fail.…”
Section: Introductionmentioning
confidence: 99%