Flyn Computing
Flyn Computing
Open Source
Projects
Patches
Statistics
System integration
Notes
SRPMs
Academics
Publications
Proposals
Reading List
CDX
Statistics
Light
Dark
Automatic
References
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 1: Basic Architecture
Intel Corporation
Sep 1, 2021
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2: Instruction Set Reference
Intel Corporation
Sep 1, 2021
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3: System Programming Guide
Intel Corporation
Sep 1, 2021
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 4: Model-Specific Registers
Intel Corporation
Sep 1, 2021
PDF
Cite
Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course
Christopher Stricklan
,
TJ OConnor
Jan 1, 2021
Cite
DOI
URL
OpenWrt and SELinux
Jake Edge
Sep 1, 2020
Cite
Courseware as Code: Instituting Agile Courseware Collaboration
Julianna M. Rodriguez
,
Benjamin J. Allison
,
Christopher W. Apsey
,
Todd M. Boudreau
Jan 1, 2020
Cite
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson
Jan 1, 2020
Cite
Think Java: How to Think Like a Computer Scientist
Allen Downey
,
Chris Mayfield
Jan 1, 2020
Cite
URL
The Art, Science, and Engineering of Fuzzing: A Survey
Valentin J. M. Manès
,
HyungSeok Han
,
Choongwoo Han
,
Sang Kil Cha
,
Manuel Egele
,
Edward J. Schwartz
,
Maverick Woo
Oct 1, 2019
Cite
MAX_USERNAME_LEN set too low
W. Michael Petullo
,
Matt Johnston
Mar 1, 2019
Cite
The Python Tutorial
Python Software Foundation
Jan 1, 2019
Cite
The Rust Programming Language
Steve Klabnik
,
Carol Nichols
Jan 1, 2019
Cite
Strange behaviour [sic] surrounding ``ssh -T ...'' and non-zero exit
W. Michael Petullo
,
Matt Johnston
Nov 1, 2018
Cite
Operating Systems: Three Easy Pieces
Remzi H. Arpaci-Dusseau
,
Andrea C. Arpaci-Dusseau
Aug 1, 2018
Cite
URL
Lowering the Barriers to Capture The Flag Administration and Participation
Kevin Chung
Aug 1, 2017
Cite
Shell We Play a Game? CTF-as-a-service for Security Education
Erik Trickel
,
Francesco Disperati
,
Eric Gustafson
,
Faezeh Kalantari
,
Mike Mabey
,
Naveen Tiwari
,
Yeganeh Safaei
,
Adam Doupé
,
Giovanni Vigna
Aug 1, 2017
Cite
Between-Subjects Design
Anne Oeldorf-Hirsch
Jan 1, 2017
Cite
Counterbalancing
Elena F. Corriero
Jan 1, 2017
Cite
Within-Subjects Design
Richard Draeger
Jan 1, 2017
Cite
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef
,
Michael Hicks
,
James Parker
,
Dave Levin
,
Michelle L. Mazurek
,
Piotr Mardziel
Jan 1, 2016
Cite
Infrastructure as Code: Managing Servers in the Cloud
Kief Morris
Jan 1, 2016
Cite
The Go Programming Language
Alan A. A. Donovan
,
Brian W. Kernighan
Jan 1, 2016
Cite
Think Java: How to Think Like a Computer Scientist
Allen Downey
,
Chris Mayfield
Jan 1, 2016
Cite
URL
Using CTFs for an Undergraduate Cyber Education
Martin Carlisle
,
Michael Chiaramonte
,
David Caswell
Aug 1, 2015
Cite
Beej's Guide to Unix Interprocess Communication
Brian Hall
Jan 1, 2015
Cite
Codechella: Multi-user program visualizations for real-time tutoring and collaborative learning
Philip J. Guo
,
Jeffery White
,
Renan Zanelatto
Jan 1, 2015
Cite
Codeopticon: Real-Time, One-To-Many Human Tutoring for Computer Programming
Philip J. Guo
Jan 1, 2015
Cite
Computer Security: Principles and Practice
William Stallings
,
Lawrie Brown
Jan 1, 2015
Cite
Learning Obstacles in the Capture The Flag Model
Kevin Chung
,
Julian Cohen
Aug 1, 2014
Cite
PicoCTF: A Game-Based Computer Security Competition for High School Students
Peter Chapman
,
Jonathan Burket
,
David Brumley
Aug 1, 2014
Cite
Pro Git
Scott Chacon
,
Ben Straub
Jan 1, 2014
Cite
SEI CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems
Robert C. Seacord
Jan 1, 2014
Cite
Learn Programming++: The Design, Implementation and Deployment of an Intelligent Environment for the Teaching and Learning of Computer Programming
Gordon Hunter
,
David Livingstone
,
Paul Neve
,
Graham Alsop
Jul 1, 2013
Cite
Online Python Tutor: Embeddable Web-Based Program Visualization for CS Education
Philip J. Guo
Jan 1, 2013
Cite
Rethinking SSL Development in an Appified World
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
Jan 1, 2013
Cite
R3: Repeatability, Reproducibility and Rigor
Jan Vitek
,
Tomas Kalibera
Mar 1, 2012
Cite
The most dangerous code in the world: validating SSL certificates in non-browser software
Martin Georgiev
,
Subodh Iyengar
,
Suman Jana
,
Rishita Anubhai
,
Dan Boneh
,
Vitaly Shmatikov
Jan 1, 2012
Cite
The security impact of a new cryptographic library
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
Jan 1, 2012
Cite
Why Eve and Mallory love Android: an analysis of Android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Lars Baumgärtner
,
Bernd Freisleben
Jan 1, 2012
Cite
NIST Special Publication 800--145
Mell Peter
,
Grance Timothy
Sep 1, 2011
Cite
Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther
,
Michael Zhivich
,
Tim Leek
,
Nickolai Zeldovich
Aug 1, 2011
Cite
Beej's Guide to Network Programming Using Internet Sockets
Brian Hall
Jan 1, 2011
Cite
Capsicum: practical capabilities in UNIX
Robert Watson
,
Janathan Anderson
,
Ben Laurie
,
Kris Kennaway
Aug 1, 2010
Cite
Experiences with practice-focused undergraduate security education
Robert Fanelli
,
T.J. O'Connor
Aug 1, 2010
Cite
Webseclab security education workbench
Elie Bursztein
,
Baptiste Gourdin
,
Celine Fabry
,
Jason Bau
,
Gustav Rydstedt
,
Hristo Bojinov
,
Dan Boneh
,
John C. Mitchell
Aug 1, 2010
Cite
Browser Security: Lessons from Google Chrome
Charles Reis
,
Adam Barth
,
Carlos Pizano
Aug 1, 2009
Cite
The Pintos Instructional Operating System Kernel
Ben Pfaff
,
Anthony Romano
,
Godmar Back
Jan 1, 2009
Cite
Nginx: The High-Performance Web Server and Reverse Proxy
Will Reese
Sep 1, 2008
Cite
URL
SEED: A Suite of Instructional Laboratories for Computer Security Education
Wenliang Du
,
Ronghua Wang
Mar 1, 2008
Cite
Hacking: The Art of Exploitation
Jon Erickson
Jan 1, 2008
Cite
When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC
Erik Buchanan
,
Ryan Roemer
,
Hovav Shacham
,
Stefan Savage
Jan 1, 2008
Cite
How to Read a Paper
S. Keshav
Jul 1, 2007
Cite
Managing RPM-Based Systems with Kickstart and Yum
Ethan McCallum
Mar 1, 2007
Cite
Some thoughts on security after ten years of qmail 1.0
Daniel J. Bernstein
Jan 1, 2007
PDF
Cite
Subverting the Fundamentals Sequence: Using Version Control to Enhance Course Management
Curtis Clifton
,
Lisa C. Kaczmarczyk
,
Michael Mrozek
Jan 1, 2007
Cite
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
Hovav Shacham
Jan 1, 2007
Cite
The Open Science Grid
Ruth Pordes
,
Don Petravick
,
Bill Kramer
,
Doug Olson
,
Miron Livny
,
Alain Roy
,
Paul Avery
,
Kent Blackburn
,
Torre Wenaus
,
Frank Würthwein
,
Ian Foster
,
Rob Gardner
,
Mike Wilde
,
Alan Blatecky
,
John McGee
,
Rob Quick
Jan 1, 2007
Cite
Making information flow explicit in HiStar
Nickolai Zeldovich
,
Silas Boyd-Wickizer
,
Eddie Kohler
,
David Mazières
Nov 1, 2006
Cite
Linux Device Drivers
Jonathan Corbet
,
Alessandro Rubini
,
Greg Kroah-Hartman
Jan 1, 2005
Cite
The Net-SNMP Programming Guide
Ben Rockwood
Nov 1, 2004
Cite
Preventing Privilege Escalation
Niels Provos
,
Markus Friedl
,
Peter Honeyman
Aug 1, 2003
Cite
Defcon Capture the Flag: defending vulnerable code from intense attack
Crispin Cowan
,
Seth Arnold
,
Steve Beattie
,
Chris Wright
,
John Viega
Apr 1, 2003
Cite
Administrator’s Guide to Linux in the Windows Enterprise
Jan 1, 2003
Cite
Postfix: The Definitive Guide
Kyle D. Dent
Jan 1, 2003
Cite
OpenLDAP Everywhere
Craig Swanson
,
Matt Lung
Dec 1, 2002
Cite
URL
Setuid Demystified
Hao Chen
,
David Wagner
,
Drew Dean
Aug 1, 2002
Cite
URL
Security in Plan 9
Russ Cox
,
Eric Grosse
,
Rob Pike
,
Dave Presotto
,
Sean Quinlan
Jan 1, 2002
Cite
Implementing SELinux as a Linux Security Module
Stephen Smalley
,
Chris Vance
,
Wayne Salamon
Dec 1, 2001
Cite
Exploiting Format String Vulnerabilities
Scut / Team Teso
Sep 1, 2001
Cite
Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco
,
Stephen Smalley
Jun 1, 2001
Cite
The Cathedral and the Bazaar
Eric S. Raymond
,
Tim O'Reilly
Jan 1, 1999
Cite
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
Crispin Cowan
,
Calton Pu
,
Dave Maier
,
Heather Hintony
,
Jonathan Walpole
,
Peat Bakke
,
Steve Beattie
,
Aaron Grier
,
Perry Wagle
,
Qian Zhang
Jan 1, 1998
Cite
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Peter Loscocco
,
Stephen D. Smalley
,
Patrick A. Muckelbauer
,
Ruth C. Taylor
,
S. Jeff Turner
,
John F. Farrel
Jan 1, 1998
Cite
Smashing The Stack For Fun And Profit
Aleph One
Jan 1, 1996
PDF
Cite
SSH---Secure Login Connections over the Internet
Tatu Ylonen
Jan 1, 1996
Cite
Unified Login with Pluggable Authentication Modules (PAM)
Vipin Samar
Jan 1, 1996
Cite
LINUX--a Free Unix-386 Kernel
Linus Torvalds
Oct 1, 1991
Cite
An Evaluation of the Ninth SOSP Submissions or How (and How Not) to Write a Good Systems Paper
Roy Levin
,
David D. Redell
Oct 1, 1988
Cite
Project Athena Facilities---an Overview for Faculty
Jerome H. Saltzer
Mar 1, 1988
Cite
Development of the Domain Name System
Paul v. Mockapetris
,
Kevin J. Dunlap
Jan 1, 1988
Cite
The C Programming Language
Brian W. Kernighan
,
Dennis M. Ritchie
Jan 1, 1988
Cite
A Berkeley Odyssey
Marshall Kirk McKusick
Jan 1, 1985
Cite
Design and implementation of the Sun network filesystem
Russel Sandberg
,
David Goldberg
,
Steve Kleiman
,
Dan Walsh
,
Bob Lyon
Jan 1, 1985
Cite
The UNIX Programming Environment
Brian W. Kernighan
,
Rob Pike
Jan 1, 1984
Cite
New Directions in Cryptography
Whitfield Diffie
,
Martin Hellman
Nov 1, 1976
Cite
The Protection of Information in Computer Systems
Jerome H. Saltzer
,
Michael D. Schroeder
Jan 1, 1975
PDF
Cite
Protection and the Control of Information Sharing in Multics
J. H. Saltzer
Jul 1, 1974
Cite
The UNIX time-sharing system
Dennis M. Ritchie
,
Ken Thompson
Jan 1, 1974
Cite
DOI
Cite
×