Five ways to hack and cheat with bring-your-own-device electronic examinations

Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves. In this study, the decades-old computer security principle that ‘software security depends on hardware security’ is applied to a range of BYOD e-exam tools. Five potential hacks are examined, four of which are confirmed to work against at least one BYOD e-exam tool. The consequences of these hacks are significant, ranging from removal of the exam paper from the venue through to receiving live assistance from an outside expert. Potential mitigation strategies are proposed; however, these are unlikely to completely protect the integrity of BYOD e-exams. Educational institutions are urged to balance the additional affordances of BYOD e-exams for examiners against the potential affordances for cheaters.

[1]  J. Biggs What the student does: teaching for enhanced learning , 1999 .

[2]  Lisa J. Carnahan,et al.  Security in Open Systems , 1994 .

[3]  Tilo Müller,et al.  On the Practicability of Cold Boot Attacks , 2013, 2013 International Conference on Availability, Reliability and Security.

[4]  Shane Balfe,et al.  Final Fantasy - Securing On-Line Gaming with Trusted Computing , 2007, ATC.

[5]  Kyle Rankin Cold boot attack tools for Linux , 2009 .

[6]  David Carless,et al.  The examined life: perspectives of lower primary school students in Hong Kong , 2014 .

[7]  IamnitchiAdriana,et al.  Cheating in Online Games , 2014 .

[8]  A. C. Butler,et al.  Feedback enhances the positive effects and reduces the negative effects of multiple-choice testing , 2008, Memory & cognition.

[9]  D. Carless Trust, distrust and their impact on assessment reform , 2009 .

[10]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.

[11]  Sue Bennett,et al.  Assessment Might Dictate the Curriculum, but What Dictates Assessment? , 2013 .

[12]  Nora Mogey,et al.  Students’ choices between typing and handwriting in examinations , 2012 .

[13]  D. Boud Sustainable Assessment: Rethinking assessment for the learning society , 2000 .

[14]  Melody Charman Linguistic analysis of extended examination answers: Differences between on-screen and paper-based, high- and low-scoring answers , 2014, Br. J. Educ. Technol..

[15]  J. Hartley,et al.  To write or to type? The effects of handwriting and word-processing on the written style of examination essays , 2013 .

[16]  P. Dawson,et al.  A contribution to the history of assessment: how a conversation simulator redeems Socratic method , 2014 .