{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:39:42Z","timestamp":1729611582370,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/fie.2015.7344155","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:17:58Z","timestamp":1449595078000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Using a case study to teach students about finding and fixing logic flaws in software"],"prefix":"10.1109","author":[{"given":"Lindsay","family":"Simpkins","sequence":"first","affiliation":[]},{"given":"Xiaohong","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Huiming","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Kenneth","family":"Williams","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Q Program Verifier Microsoft Research","year":"2015","author":"das","key":"ref39"},{"journal-title":"Bloom's Taxonomy Original and Revised Emerging Perspectives on Learning Teaching and Technology","year":"2014","author":"forehand","key":"ref38"},{"journal-title":"Top 10 2013-Top 10 Open Web Application Security Project","year":"2014","key":"ref33"},{"journal-title":"Research Report","article-title":"2012 Web Session Intelligence & Security Report: Business Logic Abuse Edition","year":"2012","key":"ref32"},{"article-title":"A Course Module on Application Logic Flaws","year":"2015","author":"simpkins","key":"ref31"},{"journal-title":"Computer Science Curriculum 2008 An Interim Revision of CS 2001","year":"2008","author":"cassel","key":"ref30"},{"journal-title":"A Case Study of Cashier-as-a-Service Based Merchant Logic Microsoft Research","year":"2015","author":"wang","key":"ref37"},{"journal-title":"The Security Development Lifecycle SDL A Process for Developing Demonstrably More Secure Software","year":"2006","author":"howard","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.41"},{"journal-title":"2011 CWE\/SANS Top 25 Most Dangerous Software Errors The MITRE Corporation","year":"2011","author":"martin","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.26"},{"journal-title":"Nonparamnetric Tests Boston University School of Public Health","year":"2013","key":"ref40"},{"journal-title":"Computer Science Curricula 2013 Curriculum Guidelines for Undergraduate Degree Programs in Computer Science","year":"2013","key":"ref11"},{"key":"ref12","article-title":"Software Assurance Curriculum Project Volume II: Undergraduate Course Outlines","author":"mead","year":"2010","journal-title":"Tech Rep CMU\/SEI-2010-TR-019"},{"key":"ref13","article-title":"Software Assurance Curriculum Project Volume I: Master of Software Assurance Reference Curriculum","author":"mead","year":"2010","journal-title":"Tech Rep CMU\/SEI-2010-TR-005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940947"},{"key":"ref15","first-page":"25","article-title":"Teaching Security Management with Case Studies: Experiences and Evaluation","volume":"2","author":"yuan","year":"2015","journal-title":"Journal of Education Informatics and Cybernetics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3109\/0142159X.2012.680939"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s10956-010-9231-x","article-title":"Effectiveness of Case-Based Learning Instruction on Epistemological Beliefs and Attitudes Toward Chemistry","volume":"20","author":"\u00e7am","year":"2011","journal-title":"Journal of Science Education and Technology"},{"journal-title":"Using Cases in Teaching Penn State University","year":"2006","author":"pyatt","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET.2014.6816775"},{"key":"ref28","first-page":"12","article-title":"Implementation of Case Studies in an Introduction to Engineering Course for LITEE National Dissemination Grant Competition","volume":"13","author":"le","year":"2012","journal-title":"Journal of STEM Education Innovations and Research"},{"key":"ref4","article-title":"Seven Business Logic Flaws That Put Your Website At Risk","author":"grossman","year":"2007","journal-title":"WhiteHat Security Santa Clara CA White Paper"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2010.tb01042.x"},{"journal-title":"The Web Application Hacker's Handbook Finding and Exploiting Security Flaws","year":"2011","author":"stuttard","key":"ref3"},{"journal-title":"Testing for Business Logic Open Web Application Security Project","year":"2014","key":"ref6"},{"key":"ref29","first-page":"15","article-title":"Effectiveness of LITEE Case Studies in Engineering Education: A Perspective from Genre Studies","volume":"12","author":"clayson","year":"2011","journal-title":"Journal of STEM Education Innovations and Research"},{"key":"ref5","article-title":"Defying Logic: Theory, Design, and Implementation of Complex Systems for Testing Application Logic","author":"los","year":"0","journal-title":"Black Hat Europe 2011 &#x2014; Briefings"},{"journal-title":"Teaching Materials Using Case Studies","year":"2003","author":"davis","key":"ref8"},{"journal-title":"Testing for Business Logic Open Web Application Security Project","year":"2014","key":"ref7"},{"key":"ref2","article-title":"Software Security: Building Security","author":"mcgraw","year":"2006","journal-title":"Crawfordsville"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2014.7044194"},{"journal-title":"Exploiting Software How to Break Code","year":"2004","author":"hoglund","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/52.636668"},{"key":"ref22","first-page":"280","article-title":"An inverted computing curriculum: preparing graduates to build quality systems","author":"lasalle","year":"2014","journal-title":"27th Annual Frontiers in Education Conf IEEE"},{"key":"ref21","article-title":"Software Engineering for the 21 st Century: A basis for rethinking the curriculum","author":"shaw","year":"2005","journal-title":"Tvhvvech Rep CMU-ISRI-05-108"},{"key":"ref24","first-page":"31","article-title":"Supporting Case-based Learning in Information Security with Web-based Technology","volume":"24","author":"he","year":"2013","journal-title":"Journal of Information Systems Education"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSEE.1999.755175"},{"key":"ref26","first-page":"18","article-title":"Building a Community of Scholars: One University's Comparison of Typical vs. Open Ended Ethics Case Studies in First-Year Engineering","volume":"13","author":"reid","year":"2012","journal-title":"Journal of STEM Education Innovations and Research"},{"key":"ref25","article-title":"Develop Case Studies to Teach Cryptography in A Collaborative Environment","author":"yang","year":"2011","journal-title":"2011 Int Conf on Frontiers in Education Computer Science and Computing Engineering"}],"event":{"name":"2015 IEEE Frontiers in Education Conference (FIE)","start":{"date-parts":[[2015,10,21]]},"location":"Camino Real El Paso, El Paso, TX, USA","end":{"date-parts":[[2015,10,24]]}},"container-title":["2015 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7344010\/7344011\/07344155.pdf?arnumber=7344155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T21:10:35Z","timestamp":1498252235000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7344155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/fie.2015.7344155","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}