Build It, Break It, Fix It: Contesting Secure Development

07/02/2019
by   James Parker, et al.
0

Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims to assess the ability to securely build software, not just break it. In BIBIFI, teams build specified software with the goal of maximizing correctness, performance, and security. The latter is tested when teams attempt to break other teams' submissions. Winners are chosen from among the best builders and the best breakers. BIBIFI was designed to be open-ended; teams can use any language, tool, process, etc. that they like. As such, contest outcomes shed light on factors that correlate with successfully building secure software and breaking insecure software. We ran three contests involving a total of 156 teams and three different programming problems. Quantitative analysis from these contests found that the most efficient build-it submissions used C/C++, but submissions coded in a statically-type safe language were 11 times less likely to have a security flaw than C/C++ submissions. Break-it teams that were also successful build-it teams were significantly better at finding security bugs.

READ FULL TEXT

page 8

page 12

page 26

page 28

research
04/08/2021

Secure Software Engineering in the Financial Services: A Practitioners' Perspective

Secure software engineering is a fundamental activity in modern software...
research
11/13/2022

Collaborative Application Security Testing for DevSecOps: An Empirical Analysis of Challenges, Best Practices and Tool Support

DevSecOps is a software development paradigm that places a high emphasis...
research
02/13/2019

Vulnerability Prediction Based on Weighted Software Network for Secure Software Building

To build a secure communications software, Vulnerability Prediction Mode...
research
12/31/2022

RSA+: An algorithm at least as secure as RSA

The RSA algorithm has been around for nearly five decades and remains on...
research
11/26/2019

Moving Fast and Breaking Things: How to stop crashing more than twice

"Moving fast, and breaking things", instead of "being safe and secure", ...
research
06/27/2022

Measuring and Clustering Network Attackers using Medium-Interaction Honeypots

Network honeypots are often used by information security teams to measur...

Please sign up or login with your details

Forgot password? Click here to reset