Do not confuse being able to hack with knowing the art of writing secure code

During the secure coding trainings of High Tech Institute and Scademy
you will learn how to put hackers aside

You can turn writing secure code into a good habit. Something you barely stop to think about, like brushing your teeth or putting on your seat belt. High Tech Institute is working with the specialists at Hungary’s Scademy to teach you how.

‘We teach developers how not to code.’ László Drajkó likes unsettling his conversational partners with this bold statement. Yet that’s what the software security courses taught by his company, Secure Coding Academy (Scademy), revolve around: teaching coders the professional discipline to prevent weak spots in their software.

Perhaps ‘discipline’ is too strong a word. Drajkó thinks it’s more comparable to putting on your seat belt. ‘You no longer notice you’re putting it on. In the same way, you can teach yourself the good habit of writing secure code. And then you’ll automatically avoid pitfalls, without stopping to think about it. We teach people to instinctively use good coding habits.’ 

Software - 20180613-scademy-laszlo-dsc_1619_01
Secure coding does not cost extra time, according to László Drajkó. ‘It takes time to learn how, but once you have there’s no difference.’

Teaching people to write secure code is a labour-intensive endeavour. Break-ins are continually happening around the world, exposing vulnerabilities. It takes a sizeable team to keep up with all that information and work it into training material as case studies. ‘An independent teacher would spend four hours staying up to date and incorporating new material for every hour of class,’ Drajkó estimates.

That’s why High Tech Institute is partnering with Scademy, a specialist fully focused on training people to write secure code. The Hungarian company offers almost forty courses; security for embedded systems is its speciality.

Software - 20180613-scademy-laszlo-en-erno-dsc_1627_01
‘In our training you do not learn how to hack, you learn how to put them aside’, say Ernõ Jeges (left) and László Drajkó (right) from Secure Coding Academy. In the Summer they have visited, together with High Tech Institute, several clients at High Tech Campus in Eindhoven.

The Commodore 64 and the ZX Spectrum

Scademy is located in Hungary’s capital, Budapest. In the eighties young László Drajkó had access to computers, though within the Russian sphere of influence that access was very limited. His first acquaintance came when he was twelve. ‘Science was non-political. The educational system was highly theoretical, but quite good. Behind the Iron Curtain, we had to rely on our brains and we had few other resources.’

Drajkó and his fellow students wrote their code on paper. ‘We ran it in our heads. We checked for coding mistakes that had never been implemented. We made our corrections on paper, too. Because when we finally had access to a machine, we wanted to feed it error-free programs. We barely had money or computers.’

In the mid-eighties the Hungarian coders were permitted to travel to Germany and Austria, where they were able to buy Commodore 64s and ZX Spectrums. ‘The generation before ours had to shell out millions of dollars for a computer, but suddenly we could buy a home computer for five hundred dollars. The PC had a major impact on our age group.’

In the mid-eighties Drajkó was studying computer science in Hungary. The Iron Curtain fell while he was still in college, which had a huge impact on him. A European Economic Community grant enabled him to attend the Delft University of Technology. The result was culture shock. His first few months in the Netherlands immersed him in ‘total miscommunication’.

Though he spoke English, Drajkó didn’t understand his advisors’ questions. ‘Not in terms of language, but conceptually. The educational approach was completely different. They’d ask things like, ‘László, what problem would you like to work on?’ And I’d say, ‘No, no, I don’t have any problems. Just tell me what code you want me to write and I’ll find the best algorithm for it.’ But then they said things like, ‘How would you like to change the world for the better?’ And I thought, ‘I’ve wound up in art school!’

Novell, Compaq and Microsoft

After twenty-five years working for international companies such as Novell, Compaq and Microsoft, Drajkó decided to invest in a training company. He wanted to share what he knew and was looking for a suitable niche. He found it in security. ‘I asked myself what was going wrong and one of the answers was cybersecurity.’

The amount of incidents increases tremendously, while there is only little awareness. Only a few companies are working on it. Everybody is busy reparing the mistakes, but that does not solve the problem. Education is the chance to prevent softwaresecurity crisis. 


Old acquaintances

Some time ago Drajkó ran into two familiar faces, Zoltán Hornák and Ernő Jeges. All three studied at the Budapest University of Technology, but Hornák and Jeges have known each other since 1990. That year, the Hungarian and the Serbian competed against each other in the second International Olympiad in Informatics in Minsk. A few years later, Jeges decided to study computer science in Budapest.

Software - 20180613-scademy-erno-dsc_1609_01
Ernõ Jeges is one of the founders and partners of Scademy. Next to that he is an engaged trainer. Ernő Jeges’s goal is not to teach people how to hack, but to instil paranoia. 'That emotion is important', he says. 'It has an impact which you will not get with online trainings.'

Hornák and Jeges became fast friends and during their doctoral research they conducted tests for Nokia, breaking into mobile telephones and networked systems. Demand was so high they abandoned their PhDs and started hacking systems on assignment. ‘White hat hacking was uncharted territory back then,’ Jeges says. ‘Very few companies were doing it. Nokia had a ton of assignments, and we realized we were learning more on the job than we were at the university.’

The penetration testing (pentesting) assignments poured in to their company, Search Lab: the pair were hired to break into networking hardware, set-top boxes and more. Most of the target systems were embedded. ‘Not many security companies focus on those, because you need to understand the system at the chip level. Most pentesting companies focus on websites and web services, but we explicitly specialize in embedded.’

The 2008 crisis hit Search Lab hard. In that same period, the mobile phone industry switched entirely to the Iphone and Android platforms. Hornák and Jeges lost most of their business from clients with whom they had a long history. They started spending their hours on building a training platform.

Their shared focus on security sparked the click with Drajkó. ‘The number of incidents is growing exponentially, while awareness is minimal,’ he explains. ‘Only a handful of companies are doing something about it. Everyone’s busy patching errors, but that doesn’t address the problem. Education is the golden opportunity to prevent a software security crisis. Our stance is that we aren’t selling painkillers and band-aids, but building an immune system that’s extremely resilient.’

Hornák and Jeges have developed a fully automated platform for putting together materials and handouts for security courses. ‘We now have a library of training material to cover a total of fifty days,’ Jeges claims.

Software - 20180613-scademy-erno-dsc_1611
‘We aren’t selling painkillers and band-aids, but building an immune system that’s extremely resilient,’ say Ernő Jeges.

Instil paranoia

The security industry is in constant motion and to keep up with it, Scademy offers online training in addition to traditional classroom fare. For a modest annual fee, participants can shore up their knowledge using a digital gamification platform. The online approach also makes it easy to track results. ‘We measure our success by the way clients translate our expertise into coding habits,’ Drajkó says.

The need for inherently secure code is high, but not all developers are enthusiastic about security classes. ‘If you ask developers to choose a course from nineteen different options, security will probably come in at the bottom. It sounds very prescriptive. A new platform, new language or new architecture is much more appealing to them.’

Scademy’s software security courses don’t teach developers how to hack. There are plenty of classes that do that, Drajkó says. Many of his clients in the US have experience with them. ‘But they’ve been turned off by them, because the course designers couldn’t relate it to their daily work.’

Drajkó believes that learning hacking techniques in order to prevent hacks is a waste of time. ‘It doesn’t matter whether it’s ethical hacking or hacking with bad intent. Because in terms of technology there’s no difference; it’s a question of morality.’

Drajkó believes that developers do need to be well versed in what exactly hacking is. ‘That’s why we address it. Participants also need to understand that hackers have infinite time and infinite resources. They make use of bots and third-party computers. In the embedded domain that use is growing in lockstep with the Internet of Things.’

That’s why Scademy’s courses always start with a peek inside the hacker’s mind. ‘For example, we show them that a buffer overflow can be a problem,’ Jeges says. ‘That someone can take control that way, and it will no longer be your program that’s running.’

Jeges’s goal is not to teach people how to hack, but to instil paranoia. ‘The first day, participants go home feeling uneasy. They realize they’ve made mistakes in the past. That feeling is important. It has an impact we can’t achieve through online training.’ After that experience participants are all ears, Jeges notes with a smile. ‘Emotionally and intellectually.’

That makes the class ripe for covering best practices. ‘We show them the difference between well-meant attempts to make code hack-proof and actual best practices,’ Jeges says. ‘They can apply the new techniques and skills they learn the next day.’

Case studies are an important component of those best practices. ‘We use every incident that’s been global news,’ Jeges explains. Scademy makes good use of Search Lab’s expertise there. For example, last year Scademy’s pentesting sister company published a code analysis on Wannacry, the ransomware that targeted Microsoft Windows and infected several hundred thousand computers around the world that April, within forty-eight hours.

High Tech Institute organises the training
'C and C++ secure coding'
twice a year. 
Aslo, it is available as incompany edition. 

Course description