{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:38:54Z","timestamp":1740101934863,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","funder":[{"name":"Australian Council of Deans of Information & Communications Technology (ACDICT)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.1145\/3587102.3588788","type":"proceedings-article","created":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T22:17:59Z","timestamp":1688163479000},"page":"229-235","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Automatic Problem Generation for CTF-Style Assessments in IT Forensics Courses"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8338-1032","authenticated-orcid":false,"given":"Sepehr","family":"Minagar","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4569-3384","authenticated-orcid":false,"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,6,30]]},"reference":[{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_1_1","unstructured":"The sleuthkit autopsy, 2023. https:\/\/www.sleuthkit.org\/autopsy\/, Last accessed 20 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_2_1","unstructured":"Exam stress, 2023. https:\/\/www.concordia.ca\/cunews\/offices\/provost\/health\/topics\/stress-management\/exam-stress.html, Last accessed 19 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_3_1","unstructured":"Exterro forensics toolkit (ftk), 2023. https:\/\/www.exterro.com\/forensic-toolkit, Last accessed 20 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_4_1","unstructured":"Isc2 2022 cyberseurity workforce study, 2023. https:\/\/www.isc2.org\/Research\/Workforce-Study, Last accessed 20 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_5_1","unstructured":"Autohotkey, 2023. https:\/\/www.autohotkey.com\/, Last accessed 19 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_6_1","unstructured":"Ansible, 2023. https:\/\/www.ansible.com\/, Last accessed 19 Jan 2023."},{"volume-title":"Last accessed","year":"2022","key":"e_1_3_2_1_7_1","unstructured":"Embedded answers (cloze) question type, 2023. https:\/\/docs.moodle.org\/400\/en\/Embedded_Answers_(Cloze)_question_type, Last accessed 2 Aug 2022."},{"volume-title":"Last accessed","year":"2022","key":"e_1_3_2_1_8_1","unstructured":"Core documentation, 2023. http:\/\/coreemu.github.io\/core\/, Last accessed 2 Aug 2022."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_9_1","unstructured":"Damn vulnerable web application (dvwa), 2023. https:\/\/github.com\/digininja\/DVWA, Last accessed 19 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_10_1","unstructured":"Exiftool, 2023. https:\/\/exiftool.org\/, Last accessed 20 Jan 2023."},{"volume-title":"Last accessed","year":"2022","key":"e_1_3_2_1_11_1","unstructured":"Template designer documentation, 2023. https:\/\/jinja.palletsprojects.com\/en\/3.0.x\/templates\/, Last accessed 15 Aug 2022."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_12_1","unstructured":"Moodle open source learning platform, 2023. https:\/\/docs.moodle.org, Last accessed 19 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_13_1","unstructured":"Regripper, 2023. https:\/\/brettshavers.com\/entry\/regripper, Last accessed 19 Jan 2023."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_14_1","unstructured":"Virtualbox, 2023. https:\/\/www.VirtualBox.org\/, Last accessed 19 Jan 2023."},{"volume-title":"Last accessed","year":"2022","key":"e_1_3_2_1_15_1","unstructured":"Wireshark, 2023. https:\/\/www.wireshark.org\/, Last accessed 16 Aug 2022."},{"volume-title":"Last accessed","year":"2023","key":"e_1_3_2_1_16_1","unstructured":"Yaml ain't markup language (YAML?), 2023. https:\/\/www.yaml.org\/, Last accessed 19 Jan 2023."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJILT-02-2017-0009"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00059"},{"key":"e_1_3_2_1_19_1","volume-title":"Automatic problem generation for {Capture-the-Flag} competitions. In 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15)","author":"Burket J.","year":"2015","unstructured":"J. Burket, P. Chapman, T. Becker, C. Ganas, and D. Brumley. Automatic problem generation for {Capture-the-Flag} competitions. In 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15), 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"2017 USENIX Workshop on Advances in Security Education (ASE 17)","author":"Burns T. J.","year":"2017","unstructured":"T. J. Burns, S. C. Rios, T. K. Jordan, Q. Gu, and T. Underwood. Analysis and exercises for engaging beginners in online CTF competitions for security education. In 2017 USENIX Workshop on Advances in Security Education (ASE 17), Vancouver, BC, Aug. 2017. USENIX Association. URL https:\/\/www.usenix.org\/conference\/ase17\/workshop-program\/presentation\/burns."},{"key":"e_1_3_2_1_21_1","first-page":"175","volume-title":"Proceedings of the 28th C&ESAR","author":"Chetwyn R. A.","year":"2021","unstructured":"R. A. Chetwyn and L. Erdodi. Cheat detection in cyber security capture the flag games-an automated cyber threat hunting approach. Proceedings of the 28th C&ESAR, page 175, 2021."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502718.3524806"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430665.3456376"},{"key":"e_1_3_2_1_24_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Hulin P.","year":"2017","unstructured":"P. Hulin, A. Davis, R. Sridhar, A. Fasano, C. Gallagher, A. Sedlacek, T. Leek, and B. Dolan-Gavitt. {AutoCTF}: Creating diverse pwnables via automated bug injection. In 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62433-0_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125686"},{"key":"e_1_3_2_1_27_1","volume-title":"CA","author":"Mirkovic J.","year":"2014","unstructured":"J. Mirkovic and P. A. H. Peterson. Class Capture-the-Flag exercises. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14), San Diego, CA, Aug. 2014. USENIX Association. URL https:\/\/www.usenix.org\/conference\/3gse14\/summit-program\/presentation\/mirkovic."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340436.3342728"},{"key":"e_1_3_2_1_29_1","volume-title":"2017 USENIX Workshop on Advances in Security Education (ASE 17)","author":"Schreuders Z. C.","year":"2017","unstructured":"Z. C. Schreuders, T. Shaw, M. Shan-A-Khuda, G. Ravichandran, J. Keighley, and M. Ordean. Security scenario generator ({ { { { {SecGen)} } } } }: A framework for generating randomly vulnerable rich-scenario {VMs} for learning computer security and hosting {CTF} events. In 2017 USENIX Workshop on Advances in Security Education (ASE 17), 2017."},{"key":"e_1_3_2_1_30_1","first-page":"1","volume-title":"Education and Information Technologies","author":"\u00e1bensky V.","year":"2022","unstructured":"V. v\u00e1bensky, J. Vykopal, P. Celeda, K. Tk\u00e1cik, and D. Popovic. Student assessment in cybersecurity training automated by pattern mining and clustering. Education and Information Technologies, pages 1--32, 2022."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366893"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE49875.2021.9637180"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499420"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003052081"}],"event":{"name":"ITiCSE 2023: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Turku Finland","acronym":"ITiCSE 2023"},"container-title":["Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587102.3588788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T10:34:27Z","timestamp":1719657267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587102.3588788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":34,"alternative-id":["10.1145\/3587102.3588788","10.1145\/3587102"],"URL":"https:\/\/doi.org\/10.1145\/3587102.3588788","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]},"assertion":[{"value":"2023-06-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}