Spelling suggestions: "subject:"recure C++ programming"" "subject:"recure C++ erogramming""
1 |
Learning Modules for Secure C++ Programming and Visualization Tool for Computer Architecture EducationMateo Alberto Garcia (19322008) 05 August 2024 (has links)
<p dir="ltr">This research focuses on creating educational materials for secure software development and a visualization tool for a Computer Organization and Design (COD) course. The integration of digital technology in our lives has greatly increased in the last two decades, and the recent pandemic has sped this up even more. Cybercriminals are now able to target people and organizations to gain money and reputation. To protect against cybercriminals, cybersecurity has become crucial for all Internet users and is in high demand. However, the cybersecurity industry is struggling to meet this demand because there are more job openings than qualified professionals. Our goal is to raise cybersecurity awareness to encourage safe technology use and inspire students to consider careers in cybersecurity. Towards this, the first part of this research led to the creation of learning modules for secure programming in C++. These modules teach about various software vulnerabilities and their mitigation. The vulnerabilities covered include switch-case, functions, random numbers, integer overflow, and buffer overflow. Students will learn the importance of creating well-designed software that is also safe. COD is one of the most important courses in the Computer Engineering/Science (CE/CS) curriculum. A good understanding of computer functionality is extremely valuable for CE/CS students, but this course is challenging to learn. To help with this, the second part of this research developed a visualization-based learning tool for the COD course. The tool includes learning modules on standard microarchitecture and microarchitecture security, supporting the cybersecurity awareness initiative. So far, three visualization modules have been developed in this tool, covering memory access, CPU pipelining, and the Spectre attack.</p>
|
Page generated in 0.0681 seconds