Guided Learning and Interactive Visualization for Teaching & Learning Stack Smashing Attacks & Defenses: Experiences and Evaluation

This Innovative Practice paper presents the design, deployment, and evaluation of a software security module that teaches stack smashing attacks and defenses using innovative pedagogical practices. Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are cr...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings - Frontiers in Education Conference pp. 1 - 9
Main Authors: Ramaprasad, Harini, Sridhar, Meera, Dangeti, Sushma I, Pradhan, Soham, Obaidat, Islam
Format: Conference Proceeding
Language:English
Published: IEEE 13.10.2024
Subjects:
ISSN:2377-634X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This Innovative Practice paper presents the design, deployment, and evaluation of a software security module that teaches stack smashing attacks and defenses using innovative pedagogical practices. Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are critical components in advanced software security curricula, since buffer overflows can arise due to simple programmer oversight, and stack smashing can have dangerous consequences in critical systems. However, these topics are known to be difficult to teach and learn due to the vast amount of background needed, the difficulty of learning type-unsafe languages, and laborious memory address space calculations involved. In this work, we aim to bring innovative pedagogical practices to this advanced cybersecurity education topic through a suite of four guided learning activities that follow the Process Oriented Guided Inquiry Learning (POGIL) style, and DISSAV, an interactive visualization tool for modeling stack smashing attacks. This paper presents an evaluation of the module based on deploying it in multiple sections of an introductory undergraduate cybersecurity course in the UNC Charlotte in Fall 2022, Spring 2023, and Fall 2023. Our study finds that students have mostly positive perceptions about activity structure / design, content, and style, but that improvements may be needed to some aspects, including question phrasing, activity length, and teamwork facilitation.
AbstractList This Innovative Practice paper presents the design, deployment, and evaluation of a software security module that teaches stack smashing attacks and defenses using innovative pedagogical practices. Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are critical components in advanced software security curricula, since buffer overflows can arise due to simple programmer oversight, and stack smashing can have dangerous consequences in critical systems. However, these topics are known to be difficult to teach and learn due to the vast amount of background needed, the difficulty of learning type-unsafe languages, and laborious memory address space calculations involved. In this work, we aim to bring innovative pedagogical practices to this advanced cybersecurity education topic through a suite of four guided learning activities that follow the Process Oriented Guided Inquiry Learning (POGIL) style, and DISSAV, an interactive visualization tool for modeling stack smashing attacks. This paper presents an evaluation of the module based on deploying it in multiple sections of an introductory undergraduate cybersecurity course in the UNC Charlotte in Fall 2022, Spring 2023, and Fall 2023. Our study finds that students have mostly positive perceptions about activity structure / design, content, and style, but that improvements may be needed to some aspects, including question phrasing, activity length, and teamwork facilitation.
Author Pradhan, Soham
Dangeti, Sushma I
Obaidat, Islam
Sridhar, Meera
Ramaprasad, Harini
Author_xml – sequence: 1
  givenname: Harini
  surname: Ramaprasad
  fullname: Ramaprasad, Harini
  email: hramapra@charlotte.edu
  organization: UNC Charlotte,Charlotte,North Carolina,USA
– sequence: 2
  givenname: Meera
  surname: Sridhar
  fullname: Sridhar, Meera
  email: msridhar@charlotte.edu
  organization: UNC Charlotte,Charlotte,North Carolina,USA
– sequence: 3
  givenname: Sushma I
  surname: Dangeti
  fullname: Dangeti, Sushma I
  email: sdangeti@charlotte.edu
  organization: UNC Charlotte,Charlotte,North Carolina,USA
– sequence: 4
  givenname: Soham
  surname: Pradhan
  fullname: Pradhan, Soham
  email: spradh11@charlotte.edu
  organization: UNC Charlotte,Charlotte,North Carolina,USA
– sequence: 5
  givenname: Islam
  surname: Obaidat
  fullname: Obaidat, Islam
  email: iaobaidat@ncat.edu
  organization: NC Agricultural and Technical State University,Greensboro,North Carolina,USA
BookMark eNpFkEtPAkEQhEejiYD8A2Pm5G1xHrvz8EZwQRISD6DxRnpne3UUBrKzEPXqHxdQ46nT6a-rUtUmJ2EVkJBLznqcM3s9HOeKK5v2BBNpjzNjhbXqiHSttkZmTGY8Y_qYtITUOlEyfToj7RhfGWPSKN0iX6ONL7GkE4Q6-PBMIZR0HBqswTV-i_TRxw0s_Cc0fhVotarpDMG97NGr_69pA-6NTpcQD5d-s9_jjrjFCkPEeEPz9zXWHoPDeDDJt7DYHFTPyWkFi4jd39khD8N8NrhLJvej8aA_STxnqkkKoVEXnFVGlxzRGlXsoqsCMq0kmlQLhZWFtMokCm6dYSVzHA130mljUtkhFz-6HhHn69ovof6Y_5UmvwFbo2Q-
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/FIE61694.2024.10892996
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Education
EISBN 9798350351507
EISSN 2377-634X
EndPage 9
ExternalDocumentID 10892996
Genre orig-research
GrantInformation_xml – fundername: UNC Charlotte
  funderid: 10.13039/100010942
GroupedDBID -~X
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
IPLJI
OCL
RIE
RIL
RIO
RNS
ID FETCH-LOGICAL-i106t-b27e7b10f87d1ee986b1696ba5763e84726ef9a4f53e219c80d0c1e81c3c78843
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001447128100147&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Mar 05 06:01:44 EST 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i106t-b27e7b10f87d1ee986b1696ba5763e84726ef9a4f53e219c80d0c1e81c3c78843
PageCount 9
ParticipantIDs ieee_primary_10892996
PublicationCentury 2000
PublicationDate 2024-Oct.-13
PublicationDateYYYYMMDD 2024-10-13
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-Oct.-13
  day: 13
PublicationDecade 2020
PublicationTitle Proceedings - Frontiers in Education Conference
PublicationTitleAbbrev FIE
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003867
Score 1.8853906
Snippet This Innovative Practice paper presents the design, deployment, and evaluation of a software security module that teaches stack smashing attacks and defenses...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Buffer overflows
Computer security
descriptive statistics
Education
engaged ped-agogy
guided learning
Memory management
Software
software security
Springs
stack smashing
Statistical analysis
Surveys
Teamwork
Title Guided Learning and Interactive Visualization for Teaching & Learning Stack Smashing Attacks & Defenses: Experiences and Evaluation
URI https://ieeexplore.ieee.org/document/10892996
WOSCitedRecordID wos001447128100147&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELVoxQALUIr4lgfElhLHjuOwIWgBCVWVKFW3KnHOqEKkqEn5A_xxzk7awsDAlkSxHF2Se_fse3eEXMgAEJe17zGjMk9oSD3FEyQriPY8NIJrV2d79BT1-2o8jge1WN1pYQDAJZ9Bxx66vfxsphd2qQz_cIVoHssGaUSRrMRaK7fLlYxqCTDz46veY1cyGdtlk0B0liN_9VBxENLb-efku6S9FuPRwQpm9sgG5C3bbLlOzGiR7R81BffJ1_1imkFG68KprzTJM-rW_RLn2uhoWlghZSW_pBiz0mGdUUkv16MwCNVv9Pm96rVEb0p7XuAdd2CQ-UJxTddVkgs3SXdVOLxNXnrd4e2DV3da8KZICUsvDSKIUuYbFWUMIFYyRdvJNEE2wgEBLJBg4kSYkAO6OK38zNcMFNNcI4cW_IA081kOh4SGzBiNURo-uUDqJxORBVzwRKowEImIjkjb2nbyURXTmCzNevzH9ROyZd-ghQvGT0mznC_gjGzqz3JazM_dJ_ANB-iybw
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwELWgIAELUIr4xgNiC8Sx4zhsCFpaUapKlKpblTgXVCFa1KT8Af44ZydtYWBgS6JYji7JvXv2vTtCLqQHiMvadViqEkdoiB3FIyQriPbcTwXXts52vx10OmowCLulWN1qYQDAJp_BlTm0e_nJRM_MUhn-4QrRPJSrZM1HIJWFXGvheLmSQSkCZm543WjVJZOhWTjxxNV87K8uKhZEGtv_nH6H1JZyPNpdAM0uWYFx1bRbLlMzqmTrR1XBPfL1MBslkNCydOorjcYJtSt_kXVutD_KjJSyEGBSjFppr8yppJfLURiG6jf6_F50W6K3uTnP8I57SJH7QnZDl3WSMztJfVE6vEZeGvXeXdMpey04IySFuRN7AQQxc1MVJAwgVDJG28k4Qj7CASHMk5CGkUh9DujktHITVzNQTHONLFrwfVIZT8ZwQKjP0lRjnIZPLpD8yUgkHhc8ksr3RCSCQ1Izth1-FOU0hnOzHv1x_ZxsNHtP7WG71Xk8JpvmbRrwYPyEVPLpDE7Juv7MR9n0zH4O35PJtcI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+-+Frontiers+in+Education+Conference&rft.atitle=Guided+Learning+and+Interactive+Visualization+for+Teaching+%26+Learning+Stack+Smashing+Attacks+%26+Defenses%3A+Experiences+and+Evaluation&rft.au=Ramaprasad%2C+Harini&rft.au=Sridhar%2C+Meera&rft.au=Dangeti%2C+Sushma+I&rft.au=Pradhan%2C+Soham&rft.date=2024-10-13&rft.pub=IEEE&rft.eissn=2377-634X&rft.spage=1&rft.epage=9&rft_id=info:doi/10.1109%2FFIE61694.2024.10892996&rft.externalDocID=10892996