Flyn Computing
Flyn Computing
Open Source
Projects
Patches
Statistics
System integration
Notes
SRPMs
Academics
Publications
Proposals
Reading List
CDX
Statistics
Light
Dark
Automatic
Paper-Conference
Courses as Code: The Aquinas Learning System
W. Michael Petullo
PDF
Cite
Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course
Christopher Stricklan
,
TJ OConnor
Jan 1, 2021
Cite
DOI
URL
The Industrial Age of Hacking
Tim Nosco
,
Jared Ziegler
,
Zechariah Clark
,
Davy Marrero
,
Todd Finkler
,
Andrew Barbarello
,
W. Michael Petullo
PDF
Cite
PivotWall: SDN-Based Information Flow Control
T.J. O'Connor
,
William Enck
,
W. Michael Petullo
,
Akash Verma
Cite
Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace
Matt Shockley
,
Chris Maixner
,
Ryan Johnson
,
Mitch DeRidder
,
W. Michael Petullo
PDF
Cite
Lowering the Barriers to Capture The Flag Administration and Participation
Kevin Chung
Aug 1, 2017
Cite
Shell We Play a Game? CTF-as-a-service for Security Education
Erik Trickel
,
Francesco Disperati
,
Eric Gustafson
,
Faezeh Kalantari
,
Mike Mabey
,
Naveen Tiwari
,
Yeganeh Safaei
,
Adam Doupé
,
Giovanni Vigna
Aug 1, 2017
Cite
Studying Naive Users and the Insider Threat with SimpleFlow
Ryan Johnson
,
Jessie Lass
,
W. Michael Petullo
PDF
Cite
The Use of Cyber-Defense Exercises in Undergraduate Computing Education
W. Michael Petullo
,
Kyle Moses
,
Ben Klimkowski
,
Ryan Hand
,
Karl Olson
PDF
Cite
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef
,
Michael Hicks
,
James Parker
,
Dave Levin
,
Michelle L. Mazurek
,
Piotr Mardziel
Jan 1, 2016
Cite
Improving Application Security Through TLS-Library Redesign
Leo St. Amour
,
W. Michael Petullo
PDF
Cite
Using CTFs for an Undergraduate Cyber Education
Martin Carlisle
,
Michael Chiaramonte
,
David Caswell
Aug 1, 2015
Cite
On the Generality and Convenience of Etypes
W. Michael Petullo
,
Joseph Suh
PDF
Cite
Codechella: Multi-user program visualizations for real-time tutoring and collaborative learning
Philip J. Guo
,
Jeffery White
,
Renan Zanelatto
Jan 1, 2015
Cite
Codeopticon: Real-Time, One-To-Many Human Tutoring for Computer Programming
Philip J. Guo
Jan 1, 2015
Cite
Teaching Computer Security
Kyle v. Moses
,
W. Michael Petullo
PDF
Cite
Learning Obstacles in the Capture The Flag Model
Kevin Chung
,
Julian Cohen
Aug 1, 2014
Cite
Ethos' Deeply Integrated Distributed Types
W. Michael Petullo
,
Jon A. Solworth
,
Wenyuan Fei
,
Pat Gavlin
PDF
Cite
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo
,
Xu Zhang
,
Jon A. Solworth
,
Daniel J. Bernstein
,
Tanja Lange
PDF
Cite
Learn Programming++: The Design, Implementation and Deployment of an Intelligent Environment for the Teaching and Learning of Computer Programming
Gordon Hunter
,
David Livingstone
,
Paul Neve
,
Graham Alsop
Jul 1, 2013
Cite
Simple-to-use, Secure-by-design Networking in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Online Python Tutor: Embeddable Web-Based Program Visualization for CS Education
Philip J. Guo
Jan 1, 2013
Cite
Rethinking SSL Development in an Appified World
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
Jan 1, 2013
Cite
The most dangerous code in the world: validating SSL certificates in non-browser software
Martin Georgiev
,
Subodh Iyengar
,
Suman Jana
,
Rishita Anubhai
,
Dan Boneh
,
Vitaly Shmatikov
Jan 1, 2012
Cite
The security impact of a new cryptographic library
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
Jan 1, 2012
Cite
Why Eve and Mallory love Android: an analysis of Android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Lars Baumgärtner
,
Bernd Freisleben
Jan 1, 2012
Cite
Digital identity security architecture in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther
,
Michael Zhivich
,
Tim Leek
,
Nickolai Zeldovich
Aug 1, 2011
Cite
Capsicum: practical capabilities in UNIX
Robert Watson
,
Janathan Anderson
,
Ben Laurie
,
Kris Kennaway
Aug 1, 2010
Cite
Experiences with practice-focused undergraduate security education
Robert Fanelli
,
T.J. O'Connor
Aug 1, 2010
Cite
Webseclab security education workbench
Elie Bursztein
,
Baptiste Gourdin
,
Celine Fabry
,
Jason Bau
,
Gustav Rydstedt
,
Hristo Bojinov
,
Dan Boneh
,
John C. Mitchell
Aug 1, 2010
Cite
The Pintos Instructional Operating System Kernel
Ben Pfaff
,
Anthony Romano
,
Godmar Back
Jan 1, 2009
Cite
When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC
Erik Buchanan
,
Ryan Roemer
,
Hovav Shacham
,
Stefan Savage
Jan 1, 2008
Cite
Some thoughts on security after ten years of qmail 1.0
Daniel J. Bernstein
Jan 1, 2007
PDF
Cite
Subverting the Fundamentals Sequence: Using Version Control to Enhance Course Management
Curtis Clifton
,
Lisa C. Kaczmarczyk
,
Michael Mrozek
Jan 1, 2007
Cite
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
Hovav Shacham
Jan 1, 2007
Cite
The Open Science Grid
Ruth Pordes
,
Don Petravick
,
Bill Kramer
,
Doug Olson
,
Miron Livny
,
Alain Roy
,
Paul Avery
,
Kent Blackburn
,
Torre Wenaus
,
Frank Würthwein
,
Ian Foster
,
Rob Gardner
,
Mike Wilde
,
Alan Blatecky
,
John McGee
,
Rob Quick
Jan 1, 2007
Cite
Making information flow explicit in HiStar
Nickolai Zeldovich
,
Silas Boyd-Wickizer
,
Eddie Kohler
,
David Mazières
Nov 1, 2006
Cite
Preventing Privilege Escalation
Niels Provos
,
Markus Friedl
,
Peter Honeyman
Aug 1, 2003
Cite
Defcon Capture the Flag: defending vulnerable code from intense attack
Crispin Cowan
,
Seth Arnold
,
Steve Beattie
,
Chris Wright
,
John Viega
Apr 1, 2003
Cite
Setuid Demystified
Hao Chen
,
David Wagner
,
Drew Dean
Aug 1, 2002
Cite
URL
Security in Plan 9
Russ Cox
,
Eric Grosse
,
Rob Pike
,
Dave Presotto
,
Sean Quinlan
Jan 1, 2002
Cite
Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco
,
Stephen Smalley
Jun 1, 2001
Cite
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
Crispin Cowan
,
Calton Pu
,
Dave Maier
,
Heather Hintony
,
Jonathan Walpole
,
Peat Bakke
,
Steve Beattie
,
Aaron Grier
,
Perry Wagle
,
Qian Zhang
Jan 1, 1998
Cite
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Peter Loscocco
,
Stephen D. Smalley
,
Patrick A. Muckelbauer
,
Ruth C. Taylor
,
S. Jeff Turner
,
John F. Farrel
Jan 1, 1998
Cite
SSH---Secure Login Connections over the Internet
Tatu Ylonen
Jan 1, 1996
Cite
Unified Login with Pluggable Authentication Modules (PAM)
Vipin Samar
Jan 1, 1996
Cite
Development of the Domain Name System
Paul v. Mockapetris
,
Kevin J. Dunlap
Jan 1, 1988
Cite
Design and implementation of the Sun network filesystem
Russel Sandberg
,
David Goldberg
,
Steve Kleiman
,
Dan Walsh
,
Bob Lyon
Jan 1, 1985
Cite
Cite
×