Flyn Computing
Flyn Computing
Open Source
Projects
Patches
Statistics
System integration
Notes
SRPMs
Academics
Publications
Proposals
Reading List
CDX
Statistics
Light
Dark
Automatic
References
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 1: Basic Architecture
Intel Corporation
Last updated on Sep 3, 2024
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2: Instruction Set Reference
Intel Corporation
Last updated on Sep 3, 2024
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3: System Programming Guide
Intel Corporation
Last updated on Sep 3, 2024
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 4: Model-Specific Registers
Intel Corporation
Last updated on Sep 3, 2024
PDF
Cite
Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course
Christopher Stricklan
,
TJ OConnor
Last updated on Sep 3, 2024
Cite
DOI
URL
OpenWrt and SELinux
Jake Edge
Last updated on Sep 3, 2024
Cite
Courseware as Code: Instituting Agile Courseware Collaboration
Julianna M. Rodriguez
,
Benjamin J. Allison
,
Christopher W. Apsey
,
Todd M. Boudreau
Last updated on Sep 3, 2024
Cite
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson
Last updated on Sep 3, 2024
Cite
Think Java: How to Think Like a Computer Scientist
Allen Downey
,
Chris Mayfield
Last updated on Sep 3, 2024
Cite
URL
The Art, Science, and Engineering of Fuzzing: A Survey
Valentin J. M. Manès
,
HyungSeok Han
,
Choongwoo Han
,
Sang Kil Cha
,
Manuel Egele
,
Edward J. Schwartz
,
Maverick Woo
Last updated on Sep 3, 2024
Cite
MAX_USERNAME_LEN set too low
W. Michael Petullo
,
Matt Johnston
Last updated on Sep 3, 2024
Cite
The Python Tutorial
Python Software Foundation
Last updated on Sep 3, 2024
Cite
The Rust Programming Language
Steve Klabnik
,
Carol Nichols
Last updated on Sep 3, 2024
Cite
Strange behaviour [sic] surrounding ``ssh -T ...'' and non-zero exit
W. Michael Petullo
,
Matt Johnston
Last updated on Sep 3, 2024
Cite
Operating Systems: Three Easy Pieces
Remzi H. Arpaci-Dusseau
,
Andrea C. Arpaci-Dusseau
Last updated on Sep 3, 2024
Cite
URL
Lowering the Barriers to Capture The Flag Administration and Participation
Kevin Chung
Last updated on Sep 3, 2024
Cite
Shell We Play a Game? CTF-as-a-service for Security Education
Erik Trickel
,
Francesco Disperati
,
Eric Gustafson
,
Faezeh Kalantari
,
Mike Mabey
,
Naveen Tiwari
,
Yeganeh Safaei
,
Adam Doupé
,
Giovanni Vigna
Last updated on Sep 3, 2024
Cite
Between-Subjects Design
Anne Oeldorf-Hirsch
Last updated on Sep 3, 2024
Cite
Counterbalancing
Elena F. Corriero
Last updated on Sep 3, 2024
Cite
Within-Subjects Design
Richard Draeger
Last updated on Sep 3, 2024
Cite
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef
,
Michael Hicks
,
James Parker
,
Dave Levin
,
Michelle L. Mazurek
,
Piotr Mardziel
Last updated on Sep 3, 2024
Cite
Infrastructure as Code: Managing Servers in the Cloud
Kief Morris
Last updated on Sep 3, 2024
Cite
The Go Programming Language
Alan A. A. Donovan
,
Brian W. Kernighan
Last updated on Sep 3, 2024
Cite
Think Java: How to Think Like a Computer Scientist
Allen Downey
,
Chris Mayfield
Last updated on Sep 3, 2024
Cite
URL
Using CTFs for an Undergraduate Cyber Education
Martin Carlisle
,
Michael Chiaramonte
,
David Caswell
Last updated on Sep 3, 2024
Cite
Beej's Guide to Unix Interprocess Communication
Brian Hall
Last updated on Sep 3, 2024
Cite
Codechella: Multi-user program visualizations for real-time tutoring and collaborative learning
Philip J. Guo
,
Jeffery White
,
Renan Zanelatto
Last updated on Sep 3, 2024
Cite
Codeopticon: Real-Time, One-To-Many Human Tutoring for Computer Programming
Philip J. Guo
Last updated on Sep 3, 2024
Cite
Computer Security: Principles and Practice
William Stallings
,
Lawrie Brown
Last updated on Sep 3, 2024
Cite
Learning Obstacles in the Capture The Flag Model
Kevin Chung
,
Julian Cohen
Last updated on Sep 3, 2024
Cite
PicoCTF: A Game-Based Computer Security Competition for High School Students
Peter Chapman
,
Jonathan Burket
,
David Brumley
Last updated on Sep 3, 2024
Cite
Pro Git
Scott Chacon
,
Ben Straub
Last updated on Sep 3, 2024
Cite
SEI CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems
Robert C. Seacord
Last updated on Sep 3, 2024
Cite
Learn Programming++: The Design, Implementation and Deployment of an Intelligent Environment for the Teaching and Learning of Computer Programming
Gordon Hunter
,
David Livingstone
,
Paul Neve
,
Graham Alsop
Last updated on Sep 3, 2024
Cite
Online Python Tutor: Embeddable Web-Based Program Visualization for CS Education
Philip J. Guo
Last updated on Sep 3, 2024
Cite
Rethinking SSL Development in an Appified World
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
Last updated on Sep 3, 2024
Cite
R3: Repeatability, Reproducibility and Rigor
Jan Vitek
,
Tomas Kalibera
Last updated on Sep 3, 2024
Cite
The most dangerous code in the world: validating SSL certificates in non-browser software
Martin Georgiev
,
Subodh Iyengar
,
Suman Jana
,
Rishita Anubhai
,
Dan Boneh
,
Vitaly Shmatikov
Last updated on Sep 3, 2024
Cite
The security impact of a new cryptographic library
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
Last updated on Sep 3, 2024
Cite
Why Eve and Mallory love Android: an analysis of Android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Lars Baumgärtner
,
Bernd Freisleben
Last updated on Sep 3, 2024
Cite
NIST Special Publication 800--145
Mell Peter
,
Grance Timothy
Last updated on Sep 3, 2024
Cite
Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther
,
Michael Zhivich
,
Tim Leek
,
Nickolai Zeldovich
Last updated on Sep 3, 2024
Cite
Beej's Guide to Network Programming Using Internet Sockets
Brian Hall
Last updated on Sep 3, 2024
Cite
Capsicum: practical capabilities in UNIX
Robert Watson
,
Janathan Anderson
,
Ben Laurie
,
Kris Kennaway
Last updated on Sep 3, 2024
Cite
Experiences with practice-focused undergraduate security education
Robert Fanelli
,
T.J. O'Connor
Last updated on Sep 3, 2024
Cite
Webseclab security education workbench
Elie Bursztein
,
Baptiste Gourdin
,
Celine Fabry
,
Jason Bau
,
Gustav Rydstedt
,
Hristo Bojinov
,
Dan Boneh
,
John C. Mitchell
Last updated on Sep 3, 2024
Cite
Browser Security: Lessons from Google Chrome
Charles Reis
,
Adam Barth
,
Carlos Pizano
Last updated on Sep 3, 2024
Cite
The Pintos Instructional Operating System Kernel
Ben Pfaff
,
Anthony Romano
,
Godmar Back
Last updated on Sep 3, 2024
Cite
SEED: A Suite of Instructional Laboratories for Computer Security Education
Wenliang Du
,
Ronghua Wang
Last updated on Sep 3, 2024
Cite
Hacking: The Art of Exploitation
Jon Erickson
Last updated on Sep 3, 2024
Cite
When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC
Erik Buchanan
,
Ryan Roemer
,
Hovav Shacham
,
Stefan Savage
Last updated on Sep 3, 2024
Cite
How to Read a Paper
S. Keshav
Last updated on Sep 3, 2024
Cite
Some thoughts on security after ten years of qmail 1.0
Daniel J. Bernstein
Last updated on Sep 3, 2024
PDF
Cite
Subverting the Fundamentals Sequence: Using Version Control to Enhance Course Management
Curtis Clifton
,
Lisa C. Kaczmarczyk
,
Michael Mrozek
Last updated on Sep 3, 2024
Cite
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
Hovav Shacham
Last updated on Sep 3, 2024
Cite
Making information flow explicit in HiStar
Nickolai Zeldovich
,
Silas Boyd-Wickizer
,
Eddie Kohler
,
David Mazières
Last updated on Sep 3, 2024
Cite
Preventing Privilege Escalation
Niels Provos
,
Markus Friedl
,
Peter Honeyman
Last updated on Sep 3, 2024
Cite
Defcon Capture the Flag: defending vulnerable code from intense attack
Crispin Cowan
,
Seth Arnold
,
Steve Beattie
,
Chris Wright
,
John Viega
Last updated on Sep 3, 2024
Cite
Administrator’s Guide to Linux in the Windows Enterprise
Last updated on Sep 3, 2024
Cite
Setuid Demystified
Hao Chen
,
David Wagner
,
Drew Dean
Last updated on Sep 3, 2024
Cite
URL
Security in Plan 9
Russ Cox
,
Eric Grosse
,
Rob Pike
,
Dave Presotto
,
Sean Quinlan
Last updated on Sep 3, 2024
Cite
Implementing SELinux as a Linux Security Module
Stephen Smalley
,
Chris Vance
,
Wayne Salamon
Last updated on Sep 3, 2024
Cite
Exploiting Format String Vulnerabilities
scut / team teso
Last updated on Sep 3, 2024
Cite
Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco
,
Stephen Smalley
Last updated on Sep 3, 2024
Cite
The Cathedral and the Bazaar
Eric S. Raymond
,
Tim O'Reilly
Last updated on Sep 3, 2024
Cite
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
Crispin Cowan
,
Calton Pu
,
Dave Maier
,
Heather Hintony
,
Jonathan Walpole
,
Peat Bakke
,
Steve Beattie
,
Aaron Grier
,
Perry Wagle
,
Qian Zhang
Last updated on Sep 3, 2024
Cite
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Peter Loscocco
,
Stephen D. Smalley
,
Patrick A. Muckelbauer
,
Ruth C. Taylor
,
S. Jeff Turner
,
John F. Farrel
Last updated on Sep 3, 2024
Cite
Smashing The Stack For Fun And Profit
Aleph One
Last updated on Sep 3, 2024
PDF
Cite
SSH---Secure Login Connections over the Internet
Tatu Ylonen
Last updated on Sep 3, 2024
Cite
An Evaluation of the Ninth SOSP Submissions or How (and How Not) to Write a Good Systems Paper
Roy Levin
,
David D. Redell
Last updated on Sep 3, 2024
Cite
The C Programming Language
Brian W. Kernighan
,
Dennis M. Ritchie
Last updated on Sep 3, 2024
Cite
The UNIX Programming Environment
Brian W. Kernighan
,
Rob Pike
Last updated on Sep 3, 2024
Cite
New Directions in Cryptography
Whitfield Diffie
,
Martin Hellman
Last updated on Sep 3, 2024
Cite
The Protection of Information in Computer Systems
Jerome H. Saltzer
,
Michael D. Schroeder
Last updated on Sep 3, 2024
PDF
Cite
Protection and the Control of Information Sharing in Multics
J. H. Saltzer
Last updated on Sep 3, 2024
Cite
The UNIX time-sharing system
Dennis M. Ritchie
,
Ken Thompson
Last updated on Sep 3, 2024
Cite
DOI
Cite
×