Flyn Computing
Flyn Computing
Open Source
Projects
Patches
Statistics
System integration
Notes
SRPMs
Academics
Publications
Proposals
Reading List
CDX
Statistics
Light
Dark
Automatic
Paper-Conference
Courses as Code: The Aquinas Learning System
W. Michael Petullo
PDF
Cite
Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course
Christopher Stricklan
,
TJ OConnor
Jan 1, 2021
Cite
DOI
URL
The Industrial Age of Hacking
Tim Nosco
,
Jared Ziegler
,
Zechariah Clark
,
Davy Marrero
,
Todd Finkler
,
Andrew Barbarello
,
W. Michael Petullo
PDF
Cite
PivotWall: SDN-Based Information Flow Control
T.J. O'Connor
,
William Enck
,
W. Michael Petullo
,
Akash Verma
Cite
Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace
Matt Shockley
,
Chris Maixner
,
Ryan Johnson
,
Mitch DeRidder
,
W. Michael Petullo
PDF
Cite
Lowering the Barriers to Capture The Flag Administration and Participation
Kevin Chung
Aug 1, 2017
Cite
Shell We Play a Game? CTF-as-a-service for Security Education
Erik Trickel
,
Francesco Disperati
,
Eric Gustafson
,
Faezeh Kalantari
,
Mike Mabey
,
Naveen Tiwari
,
Yeganeh Safaei
,
Adam Doupé
,
Giovanni Vigna
Aug 1, 2017
Cite
Studying Naive Users and the Insider Threat with SimpleFlow
Ryan Johnson
,
Jessie Lass
,
W. Michael Petullo
PDF
Cite
The Use of Cyber-Defense Exercises in Undergraduate Computing Education
W. Michael Petullo
,
Kyle Moses
,
Ben Klimkowski
,
Ryan Hand
,
Karl Olson
PDF
Cite
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef
,
Michael Hicks
,
James Parker
,
Dave Levin
,
Michelle L. Mazurek
,
Piotr Mardziel
Jan 1, 2016
Cite
Improving Application Security Through TLS-Library Redesign
Leo St. Amour
,
W. Michael Petullo
PDF
Cite
Using CTFs for an Undergraduate Cyber Education
Martin Carlisle
,
Michael Chiaramonte
,
David Caswell
Aug 1, 2015
Cite
On the Generality and Convenience of Etypes
W. Michael Petullo
,
Joseph Suh
PDF
Cite
Codechella: Multi-user program visualizations for real-time tutoring and collaborative learning
Philip J. Guo
,
Jeffery White
,
Renan Zanelatto
Jan 1, 2015
Cite
Codeopticon: Real-Time, One-To-Many Human Tutoring for Computer Programming
Philip J. Guo
Jan 1, 2015
Cite
Teaching Computer Security
Kyle v. Moses
,
W. Michael Petullo
PDF
Cite
Learning Obstacles in the Capture The Flag Model
Kevin Chung
,
Julian Cohen
Aug 1, 2014
Cite
Ethos' Deeply Integrated Distributed Types
W. Michael Petullo
,
Jon A. Solworth
,
Wenyuan Fei
,
Pat Gavlin
PDF
Cite
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo
,
Xu Zhang
,
Jon A. Solworth
,
Daniel J. Bernstein
,
Tanja Lange
PDF
Cite
Learn Programming++: The Design, Implementation and Deployment of an Intelligent Environment for the Teaching and Learning of Computer Programming
Gordon Hunter
,
David Livingstone
,
Paul Neve
,
Graham Alsop
Jul 1, 2013
Cite
Simple-to-use, Secure-by-design Networking in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Online Python Tutor: Embeddable Web-Based Program Visualization for CS Education
Philip J. Guo
Jan 1, 2013
Cite
Rethinking SSL Development in an Appified World
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
Jan 1, 2013
Cite
The most dangerous code in the world: validating SSL certificates in non-browser software
Martin Georgiev
,
Subodh Iyengar
,
Suman Jana
,
Rishita Anubhai
,
Dan Boneh
,
Vitaly Shmatikov
Jan 1, 2012
Cite
The security impact of a new cryptographic library
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
Jan 1, 2012
Cite
Why Eve and Mallory love Android: an analysis of Android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Lars Baumgärtner
,
Bernd Freisleben
Jan 1, 2012
Cite
Digital identity security architecture in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther
,
Michael Zhivich
,
Tim Leek
,
Nickolai Zeldovich
Aug 1, 2011
Cite
Capsicum: practical capabilities in UNIX
Robert Watson
,
Janathan Anderson
,
Ben Laurie
,
Kris Kennaway
Aug 1, 2010
Cite
Experiences with practice-focused undergraduate security education
Robert Fanelli
,
T.J. O'Connor
Aug 1, 2010
Cite
Webseclab security education workbench
Elie Bursztein
,
Baptiste Gourdin
,
Celine Fabry
,
Jason Bau
,
Gustav Rydstedt
,
Hristo Bojinov
,
Dan Boneh
,
John C. Mitchell
Aug 1, 2010
Cite
The Pintos Instructional Operating System Kernel
Ben Pfaff
,
Anthony Romano
,
Godmar Back
Jan 1, 2009
Cite
When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC
Erik Buchanan
,
Ryan Roemer
,
Hovav Shacham
,
Stefan Savage
Jan 1, 2008
Cite
Some thoughts on security after ten years of qmail 1.0
Daniel J. Bernstein
Jan 1, 2007
PDF
Cite
Subverting the Fundamentals Sequence: Using Version Control to Enhance Course Management
Curtis Clifton
,
Lisa C. Kaczmarczyk
,
Michael Mrozek
Jan 1, 2007
Cite
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
Hovav Shacham
Jan 1, 2007
Cite
Making information flow explicit in HiStar
Nickolai Zeldovich
,
Silas Boyd-Wickizer
,
Eddie Kohler
,
David Mazières
Nov 1, 2006
Cite
Preventing Privilege Escalation
Niels Provos
,
Markus Friedl
,
Peter Honeyman
Aug 1, 2003
Cite
Defcon Capture the Flag: defending vulnerable code from intense attack
Crispin Cowan
,
Seth Arnold
,
Steve Beattie
,
Chris Wright
,
John Viega
Apr 1, 2003
Cite
Setuid Demystified
Hao Chen
,
David Wagner
,
Drew Dean
Aug 1, 2002
Cite
URL
Security in Plan 9
Russ Cox
,
Eric Grosse
,
Rob Pike
,
Dave Presotto
,
Sean Quinlan
Jan 1, 2002
Cite
Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco
,
Stephen Smalley
Jun 1, 2001
Cite
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
Crispin Cowan
,
Calton Pu
,
Dave Maier
,
Heather Hintony
,
Jonathan Walpole
,
Peat Bakke
,
Steve Beattie
,
Aaron Grier
,
Perry Wagle
,
Qian Zhang
Jan 1, 1998
Cite
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Peter Loscocco
,
Stephen D. Smalley
,
Patrick A. Muckelbauer
,
Ruth C. Taylor
,
S. Jeff Turner
,
John F. Farrel
Jan 1, 1998
Cite
SSH---Secure Login Connections over the Internet
Tatu Ylonen
Jan 1, 1996
Cite
Cite
×