{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:08:54Z","timestamp":1771045734902,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016492","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Designing a Platform to Train Secure Programming Skills with Attack-and-Defend Exercises"],"prefix":"10.1109","author":[{"given":"Leo St.","family":"Amour","sequence":"first","affiliation":[{"name":"Virginia Tech,Dept. of Computer Science,Blacksburg,USA"}]},{"given":"Eli","family":"Tilevich","sequence":"additional","affiliation":[{"name":"Virginia Tech,Dept. of Computer Science,Blacksburg,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"CVE Website","year":"2024"},{"key":"ref2","volume-title":"Shifting the balance of cybersecurity risk: Principles and approaches for secure by design software","year":"2023"},{"key":"ref3","article-title":"Secure coding education: Are we making progress?","volume-title":"Proceedings of the 16th Colloquium for Information Systems Security Education","author":"Nance"},{"key":"ref4","volume-title":"Veracode survey research identifies cybersecurity skills gap causes and cures","author":"Zorabedian","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.53735\/cisse.v11i1.179"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499391"},{"key":"ref7","article-title":"Active Learning: Creating Excitement in the Classroom","volume-title":"1991 ASHE-ERIC Higher Education Reports","author":"Bonwell","year":"1991"},{"key":"ref8","volume-title":"Computer science undergraduate students\u2019 perspectives on deliberate practice in introductory programming courses","author":"Ortega-Chasi","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_302509"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3059009.3059055"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI.2019.8760776"},{"key":"ref14","volume-title":"HackerRank - Online Coding Tests and Technical Interviews","year":"2024"},{"key":"ref15","volume-title":"Codewars - Achieve Mastery through Coding Practice and Developer Mentorship","year":"2024"},{"key":"ref16","article-title":"Red, blue and purple teams: Combining your security capabilities for the best outcome","author":"Dale","year":"2019","journal-title":"SANS Institute Information Security Reading Room"},{"key":"ref17","volume-title":"CWE - Common Weakness Enumeration","year":"2024"},{"key":"ref18","article-title":"Better learning through structured teaching: A framework for the gradual release of responsibility","author":"Fisher","year":"2021","journal-title":"ASCD"},{"key":"ref19","article-title":"Flip your classroom: Reach every student in every class every day","author":"Bergmann","year":"2012","journal-title":"International Society for Teaching in Education"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.28945\/4767"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036976"},{"issue":"7","key":"ref22","first-page":"100","article-title":"The drill and practice application in teaching science for lower secondary students","volume":"3","author":"Rathakrishnan","year":"2018","journal-title":"International Journal of Education, Psychology and Counseling"},{"key":"ref23","volume-title":"LeetCode - The World\u2019s Leading Online Programming Learning Platform","year":"2024"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2010.02.018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677297"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3143560"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999841"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231052"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231053"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352246"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12172-2_7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1076"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159511"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11451-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2746194.2746220"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445396"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677280"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO48935.2020.9245310"},{"key":"ref40","first-page":"100","article-title":"A new contest sandbox","volume":"6","author":"Mare\u0161","year":"2012","journal-title":"Olympiads in Informatics"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.15388\/ioi.2021.04"},{"key":"ref42","article-title":"Summit on education in secure software final report","author":"Burley","year":"2011","journal-title":"UC Davis College of Engineering, Davis, CA, USA, Tech. Rep."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijnurstu.2010.06.004"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","location":"London, United Kingdom","start":{"date-parts":[[2025,4,22]]},"end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016492.pdf?arnumber=11016492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:09:03Z","timestamp":1749013743000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016492","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}