Exploring how students solve open-ended assignments: a study of SQL injection attempts in a cybersecurity course

C Koutcheme, A Tilanterä, A Peltonen… - Proceedings of the 27th …, 2022 - dl.acm.org
Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022dl.acm.org
Research into computing and learning how to program has been ongoing for decades.
Commonly, this research has been focused on novice learners and the difficulties they
encounter, especially during CS1. Cybersecurity is a critical aspect in computing--as a topic
in university education as well as a core skill in the industry. In this study, we investigate how
students solve open-ended assignments on a cybersecurity course offered to university
students after two years of CS studies. Specifically, we looked at how students perform SQL …
Research into computing and learning how to program has been ongoing for decades. Commonly, this research has been focused on novice learners and the difficulties they encounter, especially during CS1. Cybersecurity is a critical aspect in computing -- as a topic in university education as well as a core skill in the industry. In this study, we investigate how students solve open-ended assignments on a cybersecurity course offered to university students after two years of CS studies. Specifically, we looked at how students perform SQL injection attacks on an web application system, and study to what extent we can characterize the process in which they come up with successful injections. Our results show that there are distinguishable strategies used by individual students who seek to hack the system, where these approaches revolve around exploration and exploitation tactics. We also find evidence of learning due to a more pronounced use of exploitation in a subsequent similar assignment.
ACM Digital Library
Showing the best result for this search. See all results