{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T04:01:12Z","timestamp":1743307272012,"version":"3.40.3"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,8]]},"DOI":"10.1109\/educon60312.2024.10578853","type":"proceedings-article","created":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:23:24Z","timestamp":1720459404000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["As Secure as Dangerous Can Be: Considerations for Secure Auto-Graders in the Context of MOOCs"],"prefix":"10.1109","author":[{"given":"Sebastian","family":"Serth","sequence":"first","affiliation":[{"name":"Hasso Plattner Institute, University of Potsdam,Potsdam,Germany"}]},{"given":"Daniel","family":"K\u00f6hler","sequence":"additional","affiliation":[{"name":"Hasso Plattner Institute, University of Potsdam,Potsdam,Germany"}]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[{"name":"Hasso Plattner Institute, University of Potsdam,Potsdam,Germany"}]}],"member":"263","reference":[{"key":"ref1","first-page":"439","article-title":"An interactive Web-based IDE towards teaching and learning in programming courses","volume-title":"Proceedings of 2013 IEEE TALE Conference)","author":"Tran"},{"key":"ref2","first-page":"3","article-title":"Improving the Scalability and Security of Execution Environments for Auto-Graders in the Context of MOOCs","volume-title":"Proceedings of the Fifth Workshop \u201cAutomatische Bewertung von Programmieraufgaben\u201d (2021), Virtual Event, Germany, October 28-29, 2019","author":"Serth","year":"2021"},{"volume-title":"A student\u2019s dream: hacking (then fixing) Gradescope\u2019s autograder","year":"2023","author":"Saligrama","key":"ref3"},{"volume-title":"Revenge for Late Nights: Penetration Testing of University Autograders","year":"2016","author":"Pudney","key":"ref4"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"37","DOI":"10.15388\/ioi.2021.04","article-title":"Security of Grading Systems","author":"Mare\u0161","year":"2021","journal-title":"Olympiads in Informatics"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.5220\/0007424800150026"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/GECon58119.2023.10295106"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1822090.1822179"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3093336.3037727"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3231644.3231703"},{"volume-title":"skulpt - Python. Client Side","year":"2021","author":"Graham","key":"ref11"},{"volume-title":"[Online-IDE] LearnJ - ein interaktiver Java-Kurs f\u00fcr Sch\u00fcler\/innen","year":"2022","author":"Pabst","key":"ref12"},{"volume-title":"[Online-IDE] LernJ vs. Java: Unterschiede","year":"2023","author":"Pabst","key":"ref13"},{"volume-title":"ruby.wasm - Notable Limitations","year":"2023","author":"Saito","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICSE.2013.6606611"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3513140"},{"volume-title":"OWASP Top 10 - 2021","year":"2021","key":"ref17"},{"volume-title":"Path Traversal - OWASP","year":"2020","key":"ref18"},{"volume-title":"Cross Site Scripting (XSS) - OWASP","year":"2022","author":"Kirsten","key":"ref19"},{"key":"ref20","article-title":"Security Analysis of Gradescope","volume-title":"Tech. Rep.","author":"Hao","year":"2016"},{"volume-title":"How a frustrating computer science assignment gave me the idea to take over the server that graded it (GradeScope)","year":"2020","author":"Lyu","key":"ref21"},{"volume-title":"Hacking Gradescope Autograder","year":"2019","author":"Wang","key":"ref22"},{"key":"ref23","first-page":"5","article-title":"CodeOcean and CodeHarbor: Auto-Grader and Code Repository","volume-title":"SPLICE 2021 workshop CS Education Infrastructure for All III: From Ideas to Practice, Virtual Event","author":"Serth","year":"2021"},{"key":"ref24","first-page":"35","article-title":"Security Considerations for Java Graders","volume-title":"Proceedings of the Fourth Workshop\u201d Automatische Bewertung von Programmieraufgaben\u201d (ABP 2019), Essen, Germany, October 8-9, 2019","author":"Strickroth"},{"key":"ref25","first-page":"159","article-title":"Der Grader Praktomat","volume-title":"Automatisierte Bewertung in der Programmierausbildung","author":"Breitner","year":"2016"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.procs.2020.07.025"},{"issue":"3","key":"ref27","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MS.2015.62","article-title":"Docker [Software engineering]","volume":"32","author":"Anderson","year":"2015","journal-title":"IEEE Software"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1111\/j.1468-2257.2008.00447.x"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.ins.2020.11.053","article-title":"Neural software vulnerability analysis using rich intermediate graph representations of programs","volume":"553","author":"Ghaffarian","year":"2021","journal-title":"Information Sciences"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/586110.586140"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1049\/iet-sen.2020.0084"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3092566"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/MSP.2005.3"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/MSP.2005.23"},{"volume-title":"Learning Tools Interoperability (LTI)\u00ae","year":"2019","key":"ref35"},{"volume-title":"Ransacking your password reset tokens","year":"2023","author":"Euler","key":"ref36"},{"volume-title":"Containing a Real Vulnerability","year":"2020","author":"Voznika","key":"ref37"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1109\/AGILE.2006.19","article-title":"Automating Functional Tests Using Selenium","volume-title":"AGILE 2006 (AGILE\u201906)","author":"Holmes","year":"2006"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1145\/3287324.3287507"}],"event":{"name":"2024 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2024,5,8]]},"location":"Kos Island, Greece","end":{"date-parts":[[2024,5,11]]}},"container-title":["2024 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10578342\/10578320\/10578853.pdf?arnumber=10578853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T03:01:27Z","timestamp":1743217287000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10578853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,8]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/educon60312.2024.10578853","relation":{},"subject":[],"published":{"date-parts":[[2024,5,8]]}}}