Abstract
Robust programming lies at the heart of the type of coding called “secure programming”. Yet it is rarely taught in academia. More commonly, the focus is on how to avoid creating well-known vulnerabilities. While important, that misses the point: a well-structured, robust program should anticipate where problems might arise and compensate for them. This paper discusses one view of robust programming and gives an example of how it may be taught.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Infusion pump improvement initiative. Tech. rep. Center for Devices and Radiological Health, U. S. Food and Drug Administration (April 2010), http://www.fda.gov/downloads/MedicalDevices/ProductsandMedicalProcedures//parGeneralHospitalDevicesandSupplies/InfusionPumps/UCM206189.pdf
Bilton, N.: Bug causes iphone alarm to greet new year with silence (January 2, 2011), http://www.nytimes.com/2011/01/03/technology/03iphone.html
Bishop, M.: Computer Security: Art and Science. Addison-Wesley, Boston (2002), http://www.amazon.com/gp/product/0201440997
Bishop, M.: Some ‘secure programming’ exercises for an introductory programming class. In: Proceedings of the Seventh World Conference on Information Security Education (July 2009)
Bishop, M., Frincke, D.: Teaching secure programming. IEEE Security & Privacy 3(5), 54–56 (2005)
Bishop, M., Orvis, B.J.: A clinic to teach good programming practices. In: Proceedings of the Tenth Colloquium on Information Systems Security Education, pp. 168–174 (June 2006)
Johnson, R.: More details on today’s outage (September 2010), http://www.facebook.com/note.php?note_id=431441338919&id=9445547199&ref=mf
Kernighan, B.W., Pike, R.: The Practice of Programming. Addison-Wesley Professional, Boston (1999)
Kernighan, B.W., Plauger, P.J.: The Elements of Programming Style, 2nd edn. Computing McGraw-Hill (1978)
Ledgard, H.F.: Programming Proverbs. Hayden Book Co. (1975)
Maguire, S.: Writing Solid Code. Microsoft Programming Series. Microsoft Press, Redmond (1993), http://www.amazon.com/dp/1556155514
Seacord, R.C.: Secure Coding in C and C++. Addison-Wesley Professional, Upper Saddle River (2005), http://www.amazon.com/dp/0321335724
Zetter, K.: Serious error in Diebold voting software caused lost ballots in California county—Update (December 8, 2008), http://www.wired.com/threatlevel/2008/12/unique-election/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bishop, M., Elliott, C. (2013). Robust Programming by Example. In: Dodge, R.C., Futcher, L. (eds) Information Assurance and Security Education and Training. WISE WISE WISE 2013 2011 2009. IFIP Advances in Information and Communication Technology, vol 406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39377-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-39377-8_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39376-1
Online ISBN: 978-3-642-39377-8
eBook Packages: Computer ScienceComputer Science (R0)