Flyn Computing
Flyn Computing
Open Source
Projects
Patches
Statistics
System integration
Notes
SRPMs
Academics
Publications
Proposals
Reading List
CDX
Statistics
Light
Dark
Automatic
1
Courses as Code: The Aquinas Learning System
W. Michael Petullo
PDF
Cite
Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course
Christopher Stricklan
,
TJ OConnor
Last updated on Sep 3, 2024
Cite
DOI
URL
The Industrial Age of Hacking
Tim Nosco
,
Jared Ziegler
,
Zechariah Clark
,
Davy Marrero
,
Todd Finkler
,
Andrew Barbarello
,
W. Michael Petullo
PDF
Cite
PivotWall: SDN-Based Information Flow Control
T.J. O'Connor
,
William Enck
,
W. Michael Petullo
,
Akash Verma
Cite
Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace
Matt Shockley
,
Chris Maixner
,
Ryan Johnson
,
Mitch DeRidder
,
W. Michael Petullo
PDF
Cite
Lowering the Barriers to Capture The Flag Administration and Participation
Kevin Chung
Last updated on Sep 3, 2024
Cite
Shell We Play a Game? CTF-as-a-service for Security Education
Erik Trickel
,
Francesco Disperati
,
Eric Gustafson
,
Faezeh Kalantari
,
Mike Mabey
,
Naveen Tiwari
,
Yeganeh Safaei
,
Adam Doupé
,
Giovanni Vigna
Last updated on Sep 3, 2024
Cite
Studying Naive Users and the Insider Threat with SimpleFlow
Ryan Johnson
,
Jessie Lass
,
W. Michael Petullo
PDF
Cite
The Use of Cyber-Defense Exercises in Undergraduate Computing Education
W. Michael Petullo
,
Kyle Moses
,
Ben Klimkowski
,
Ryan Hand
,
Karl Olson
PDF
Cite
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef
,
Michael Hicks
,
James Parker
,
Dave Levin
,
Michelle L. Mazurek
,
Piotr Mardziel
Last updated on Sep 3, 2024
Cite
Improving Application Security Through TLS-Library Redesign
Leo St. Amour
,
W. Michael Petullo
PDF
Cite
Using CTFs for an Undergraduate Cyber Education
Martin Carlisle
,
Michael Chiaramonte
,
David Caswell
Last updated on Sep 3, 2024
Cite
On the Generality and Convenience of Etypes
W. Michael Petullo
,
Joseph Suh
PDF
Cite
Codechella: Multi-user program visualizations for real-time tutoring and collaborative learning
Philip J. Guo
,
Jeffery White
,
Renan Zanelatto
Last updated on Sep 3, 2024
Cite
Codeopticon: Real-Time, One-To-Many Human Tutoring for Computer Programming
Philip J. Guo
Last updated on Sep 3, 2024
Cite
Teaching Computer Security
Kyle V. Moses
,
W. Michael Petullo
PDF
Cite
Learning Obstacles in the Capture The Flag Model
Kevin Chung
,
Julian Cohen
Last updated on Sep 3, 2024
Cite
Ethos' Deeply Integrated Distributed Types
W. Michael Petullo
,
Jon A. Solworth
,
Wenyuan Fei
,
Pat Gavlin
PDF
Cite
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo
,
Xu Zhang
,
Jon A. Solworth
,
Daniel J. Bernstein
,
Tanja Lange
PDF
Cite
Learn Programming++: The Design, Implementation and Deployment of an Intelligent Environment for the Teaching and Learning of Computer Programming
Gordon Hunter
,
David Livingstone
,
Paul Neve
,
Graham Alsop
Last updated on Sep 3, 2024
Cite
Simple-to-use, Secure-by-design Networking in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Online Python Tutor: Embeddable Web-Based Program Visualization for CS Education
Philip J. Guo
Last updated on Sep 3, 2024
Cite
Rethinking SSL Development in an Appified World
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
Last updated on Sep 3, 2024
Cite
The most dangerous code in the world: validating SSL certificates in non-browser software
Martin Georgiev
,
Subodh Iyengar
,
Suman Jana
,
Rishita Anubhai
,
Dan Boneh
,
Vitaly Shmatikov
Last updated on Sep 3, 2024
Cite
The security impact of a new cryptographic library
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
Last updated on Sep 3, 2024
Cite
Why Eve and Mallory love Android: an analysis of Android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Lars Baumgärtner
,
Bernd Freisleben
Last updated on Sep 3, 2024
Cite
Digital identity security architecture in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther
,
Michael Zhivich
,
Tim Leek
,
Nickolai Zeldovich
Last updated on Sep 3, 2024
Cite
Capsicum: practical capabilities in UNIX
Robert Watson
,
Janathan Anderson
,
Ben Laurie
,
Kris Kennaway
Last updated on Sep 3, 2024
Cite
Experiences with practice-focused undergraduate security education
Robert Fanelli
,
T.J. O'Connor
Last updated on Sep 3, 2024
Cite
Webseclab security education workbench
Elie Bursztein
,
Baptiste Gourdin
,
Celine Fabry
,
Jason Bau
,
Gustav Rydstedt
,
Hristo Bojinov
,
Dan Boneh
,
John C. Mitchell
Last updated on Sep 3, 2024
Cite
The Pintos Instructional Operating System Kernel
Ben Pfaff
,
Anthony Romano
,
Godmar Back
Last updated on Sep 3, 2024
Cite
When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC
Erik Buchanan
,
Ryan Roemer
,
Hovav Shacham
,
Stefan Savage
Last updated on Sep 3, 2024
Cite
Some thoughts on security after ten years of qmail 1.0
Daniel J. Bernstein
Last updated on Sep 3, 2024
PDF
Cite
Subverting the Fundamentals Sequence: Using Version Control to Enhance Course Management
Curtis Clifton
,
Lisa C. Kaczmarczyk
,
Michael Mrozek
Last updated on Sep 3, 2024
Cite
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
Hovav Shacham
Last updated on Sep 3, 2024
Cite
Making information flow explicit in HiStar
Nickolai Zeldovich
,
Silas Boyd-Wickizer
,
Eddie Kohler
,
David Mazières
Last updated on Sep 3, 2024
Cite
Preventing Privilege Escalation
Niels Provos
,
Markus Friedl
,
Peter Honeyman
Last updated on Sep 3, 2024
Cite
Defcon Capture the Flag: defending vulnerable code from intense attack
Crispin Cowan
,
Seth Arnold
,
Steve Beattie
,
Chris Wright
,
John Viega
Last updated on Sep 3, 2024
Cite
Setuid Demystified
Hao Chen
,
David Wagner
,
Drew Dean
Last updated on Sep 3, 2024
Cite
URL
Security in Plan 9
Russ Cox
,
Eric Grosse
,
Rob Pike
,
Dave Presotto
,
Sean Quinlan
Last updated on Sep 3, 2024
Cite
Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco
,
Stephen Smalley
Last updated on Sep 3, 2024
Cite
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
Crispin Cowan
,
Calton Pu
,
Dave Maier
,
Heather Hintony
,
Jonathan Walpole
,
Peat Bakke
,
Steve Beattie
,
Aaron Grier
,
Perry Wagle
,
Qian Zhang
Last updated on Sep 3, 2024
Cite
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Peter Loscocco
,
Stephen D. Smalley
,
Patrick A. Muckelbauer
,
Ruth C. Taylor
,
S. Jeff Turner
,
John F. Farrel
Last updated on Sep 3, 2024
Cite
SSH---Secure Login Connections over the Internet
Tatu Ylonen
Last updated on Sep 3, 2024
Cite
Cite
×