Acta Informatica Pragensia Vol. 4 No. 3

Security Measures in Automated Assessment System for Programming Courses

DOI: https://doi.org/10.18267/j.aip.71

[plný text (PDF)]

Jana Šťastná, Ján Juhár, Miroslav Biňas, Martin Tomášek

N/A

Reference:
Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., & Kruegel, C. (2009). A view on current malware behaviors. In Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more (p. 8). Berkeley: USENIX Association Berkeley.

Beaucamps, P., Gnaedig, I., & Marion, J. Y. (2012). Abstraction-based malware analysis using rewriting and model checking. In Proceedings of the 17th European Symposium on Research in Computer Security (pp. 806-823). Berlin: Springer. doi: 10.1007/978-3-642-33167-1_46

Biňas, M., & Pietriková, E. (2014). Useful recommendations for successful implementation of programming courses. In Proceedings of the 12th International Conference on Emerging eLearning Technologies and Applications (pp. 397-401). New York: IEEE. doi: 10.1109/ICETA.2014.7107618

Biňas, M. (2014). Identifying web services for automatic assessments of programming assignments. In Proceedings of the 12th International Conference on Emerging eLearning Technologies and Applications (pp. 45-50). New York: IEEE. doi: 10.1109/ICETA.2014.7107547

Boritz, J. E. (2005). IS practitioners’ views on core concepts of information integrity. International Journal of Accounting Information Systems, 6(4), 260-279. doi: 10.1016/j.accinf.2005.07.001

Docker Inc. (2015). What is Docker. Retrieved from https://www.docker.com/what-docker

Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys, 44(2), 6. doi: 10.1145/2089125.2089126

Ferrie, P. (2007). Attacks on more virtual machine emulators. Retrieved from https://www.symantec.com/avcenter/reference/Virtual_Machine_Threats.pdf

Ihantola, P., Ahoniemi, T., Karavirta, V., & Seppälä, O. (2010). Review of recent systems for automatic assessment of programming assignments. In Proceedings of the 10th Koli Calling International Conference on Computing Education Research (pp. 86–93). doi: 10.1145/1930464.1930480

Landi, W. (1992). Undecidability of Static Analysis. ACM Letters on Programming Languages and Systems, 1(4), 323-337. doi: 10.1145/161494.161501

Law, K. M.Y., Lee, V. C.S., & Yu Y.T. (2010). Learning motivation in e-learning facilitated computer programming courses. Computers & Education, 55 (1), 218-228. doi: 10.1016/j.compedu.2010.01.007

Makai, M. (2015). Task Queues - Full Stack Python. Retrieved from http://www.fullstackpython.com/task-queues.html

Nishiyama, H. (2012). Improved sandboxing for java virtual machine using hybrid execution model. In Proceedings of the 6th International Conference on New Trends in Information Science and Service Science and Data Mining (pp. 173-178). New York: IEEE.

Ormandy, T. (2007). An empirical study into the security exposure to hosts of hostile virtualized environments. Retrieved from http://taviso.decsystem.org/virtsec.pdf

Payer, M., Hartmann, T., & Gross, T.R. (2012). Safe Loading - A Foundation for Secure Execution of Untrusted Programs. In Proceedings of the IEEE Symposium on Security and Privacy (pp. 18-32). New York: IEEE. doi: 10.1109/SP.2012.11

Pears, A., Seidman, S., Malmi, L., Mannila, L., Adams, E., Bennedsen, J., Devlin, M., & Paterson, J. (2007). A survey of literature on the teaching of introductory programming. ACM SIGCSE Bulletin, 39(4), 204-223. doi: 10.1145/1345375.1345441

Petazzoni, J. (2014). Containers & Docker: How Secure Are They? Retrieved from http://blog.docker.com/2013/08/containers-docker-how-secure-are-they/

Pieterse, V. (2013). Automated Assessment of Programming Assignments. In Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research (pp. 45-56). New York: ACM. doi: 10.1145/1559755.1559763

Pietriková, E., & Chodarev, S. (2015). Profile-driven Source Code Exploration. In Proceedings of the IEEE Federated Conference on Computer Science and Information Systems (pp. 929-934). New York: IEEE. doi: 10.15439/2015F238

Pietriková, E., Juhár, J., & Šťastná, J. (2015). Towards Automated Assessment in Game-Creative Programming Courses. Proceedings of the 13th International Conference on Emerging eLearning Technologies and Applications (pp. 307-312). Košice: TUKE.

Ray, E., & Schultz, E. (2009). Virtualization Security. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (pp. 42:1-42:5). New York: ACM. doi: 10.1145/1558607.1558655

Špaček, F., Sohlich, R., & Dulík, T. (2015). Docker as Platform for Assignments Evaluation. Procedia Engineering, 100, 1665-1671. doi: 10.1016/j.proeng.2015.01.541

Thorburn, G., & Rowe, G. (1997). PASS: An automated system for program assessment. Computers & Education, 29 (4), 195-206. doi: 10.1016/S0360-1315(97)00021-3

Wagener, G., State, R., & Dulaunoy, A. (2008). Malware behaviour analysis. Journal in Computer Virology, 4(4), 279-287. doi: 10.1007/s11416-007-0074-9

Wang, F.L., & Wong, T.-L. (2008), Designing Programming Exercises with Computer Assisted Instruction. In J. Fong, R. Kwan, & F.L. Wang (Eds.), Lecture Notes in Computer Science: Hybrid Learning and Education (pp. 283-293). Berlin: Springer. doi: 10.1007/978-3-540-85170-7_25

Willems, C., Holz, T., & Freiling, F. (2007). Toward automated dynamic malware analysis using CWSandbox. IEEE Security & Privacy, (2), 32-39.

Wögerer, W. (2005). A Survey of Static Program Analysis Techniques. Retrieved from http://www.ics.uci.edu/~lopes/teaching/inf212W12/readings/Woegerer-progr-analysis.pdf

Zeltser, L. (2015). Security Risks and Benefits of Docker Application Containers. Retrieved from https://zeltser.com/security-risks-and-benefits-of-docker-application/