{"title":"The Study on Security Online Judge System Applied Sandbox Technology","authors":"J. Kuo, Zhi-Jia Wen, Han-Xuan Huang, I-Ting Guo","doi":"10.1109/SNPD54884.2022.10051768","DOIUrl":null,"url":null,"abstract":"Most of today's programming courses use online judge systems as course materials. With the increase of courses and people in the field of computer science and information engineering, the use of online judge systems is becoming more and more widespread, but simultaneously, there are more and more attacks on online judge systems. So how avoiding these attacks on online judge systems is becoming more and more important. This research studies and organizes these attack methods, and creates a threat model for the online judge system, to design code analysis rules and implement a code analysis tool. This tool can help developers analyze the existing online judge system to check whether the judicial system is at risk of being attacked and to deal with it as soon as possible to enhance the security of the judge system.","PeriodicalId":425462,"journal":{"name":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE/ACIS 23rd International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SNPD54884.2022.10051768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Most of today's programming courses use online judge systems as course materials. With the increase of courses and people in the field of computer science and information engineering, the use of online judge systems is becoming more and more widespread, but simultaneously, there are more and more attacks on online judge systems. So how avoiding these attacks on online judge systems is becoming more and more important. This research studies and organizes these attack methods, and creates a threat model for the online judge system, to design code analysis rules and implement a code analysis tool. This tool can help developers analyze the existing online judge system to check whether the judicial system is at risk of being attacked and to deal with it as soon as possible to enhance the security of the judge system.