Home
Download

Open Source

Projects
Patches

Research

Publications
CDX
Proposals
Reading List
Statistics

System Integration

Notes
SRPMs

Academic and trade publications

The following is a list of the peer-reviewed and trade publications I have been involved in. An asterisk (*) marks my student advisees.

 
Ryan Johnson*, Jessie Lass*, and W. Michael Petullo. Studying naïve users and the insider threat with SimpleFlow. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST '16, New York, NY, USA, October 2016. ACM. [ bib ]
 
W. Michael Petullo, Kyle Moses, Ben Klimkowski, Ryan Hand, and Karl Olson. The use of cyber-defense exercises in undergraduate computing education. In Proceedings of the 2016 USENIX Workshop on Advances in Security Education, ASE '16, Washington, DC, USA, August 2016. USENIX Association. [ bib | paper ]
 
Leo St. Amour* and W. Michael Petullo. Improving application security through TLS-library redesign. In Peter Schwabe, Jon Solworth, and Rajat Subhra, editors, Proceedings of the Fifth International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, October 2015. (30% acceptance rate). [ bib | paper ]
 
W. Michael Petullo and Joseph Suh*. On the generality and convenience of Etypes. In Proceedings of the 2015 IEEE Security and Privacy Workshops, New York, NY, USA, May 2015. IEEE. [ bib | paper ]
 
Kyle V. Moses and W. Michael Petullo. Teaching computer security. In Proceedings of the ASEE Middle Atlantic Section Meeting, ASEE MidAtlantic '14, Washington, DC, USA, November 2014. ASEE. [ bib | paper ]
 
W. Michael Petullo, Jon A. Solworth, Wenyuan Fei, and Pat Gavlin. Ethos' deeply integrated distributed types. In Proceedings of the 2014 IEEE Security and Privacy Workshops, New York, NY, USA, May 2014. IEEE. [ bib | paper ]
 
W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, and Tanja Lange. MinimaLT: Minimal-latency networking through better security. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS '13, New York, NY, USA, November 2013. ACM. (20% acceptance rate). [ bib | slides | paper ]
 
W. Michael Petullo and Jon A. Solworth. Simple-to-use, secure-by-design networking in Ethos. In Proceedings of the 6th European Workshop on System Security, EUROSEC '13, New York, NY, USA, April 2013. ACM. (30% acceptance rate). [ bib | paper ]
 
W. Michael Petullo and Jon A. Solworth. The lazy kernel hacker and application programmer. Presentation at the 3rd ACM workshop on Runtime Environments, Systems, Layering and Virtualized Environments, March 2013. [ bib ]
 
W. Michael Petullo and Jon A. Solworth. Simple-to-use, secure-by-design networking in Ethos. Presentation at the 3rd ACM workshop on Runtime Environments, Systems, Layering and Virtualized Environments, March 2013. [ bib ]
 
W. Michael Petullo and Jon A. Solworth. Digital identity security architecture in Ethos. In Proceedings of the 7th ACM workshop on Digital Identity Management, DIM '11, pages 23-30, New York, NY, USA, October 2011. ACM. (45% acceptance rate). [ bib | paper ]
 
W. Michael Petullo and Jon A. Solworth. Rethinking operating system interfaces to support robust applications. Poster Session of the 2012 IEEE Symposium on Security and Privacy, May 2012. [ bib | paper ]
 
W. Michael Petullo and Jon A. Solworth. The Ethos project: Security through simplification. Poster Session of the 2012 USENIX Symposium on Operating Systems Design and Implementation, October 2012. [ bib ]
 
W. Michael Petullo. Let's help Johnny write robust applications, 2012. Invited talk, December 3, University of Wisconsin-Madison. [ bib ]
 
W. Michael Petullo. Rethinking Operating System Interfaces to Support Robust Network Applications. PhD thesis, University of Illinois at Chicago, Chicago, IL, USA, May 2013. [ bib | paper ]
 
W. Michael Petullo. Building custom firmware with OpenWrt. Linux Journal, 2010(196):56-61, August 2010. Belltown Media. [ bib | paper ]
 
W. Michael Petullo. Implementing encrypted home directories. Linux Journal, 2003(112), August 2003. Belltown Media. [ bib | paper ]
 
W. Michael Petullo. Encrypt your root filesystem. Linux Journal, 2005(129), January 2005. Belltown Media. [ bib | paper ]
 
W. Michael Petullo. Developing GNOME applications with Java. Linux Journal, 2005(135):72-78, July 2005. Belltown Media. [ bib | paper ]
 
W. Michael Petullo. Amateur video production using free software and Linux. Linux Journal, May 2002. Belltown Media. [ bib | paper ]
 
W. Michael Petullo. Open source telephony: a Fedora-based VoIP server with Asterisk. Red Hat Magazine, July 2008. [ bib | paper ]
 
W. Michael Petullo. From camera to website: Building an open source video streamer. Red Hat Magazine, April 2008. [ bib | paper ]
 
W. Michael Petullo. Serving Apples: Integrating Mac OS X clients into a Fedora network. Red Hat Magazine, January 2008. [ bib | paper ]
 
W. Michael Petullo. Disk encryption in Fedora: Past, present and future. Red Hat Magazine, January 2007. [ bib | paper ]
 
W. Michael Petullo. Adding encryption support to HAL: A user's experience with Fedora development. Red Hat Magazine, October 2005. [ bib | paper ]
Email: webpage@flyn.org — ✉ 315A South Moore Loop; West Point, New York 10996; USA