Flyn Computing
Flyn Computing
Open Source
Projects
Patches
Statistics
System integration
Notes
SRPMs
Academics
Publications
Proposals
Reading List
CDX
Statistics
Light
Dark
Automatic
References
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 1: Basic Architecture
Intel Corporation
Sep 1, 2021
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2: Instruction Set Reference
Intel Corporation
Sep 1, 2021
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 3: System Programming Guide
Intel Corporation
Sep 1, 2021
PDF
Cite
Intel 64 and IA-32 Architectures Software Developer's Manual Volume 4: Model-Specific Registers
Intel Corporation
Sep 1, 2021
PDF
Cite
Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course
Christopher Stricklan
,
TJ OConnor
Jan 1, 2021
Cite
DOI
URL
OpenWrt and SELinux
Jake Edge
Sep 1, 2020
Cite
Courseware as Code: Instituting Agile Courseware Collaboration
Julianna M. Rodriguez
,
Benjamin J. Allison
,
Christopher W. Apsey
,
Todd M. Boudreau
Jan 1, 2020
Cite
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson
Jan 1, 2020
Cite
Think Java: How to Think Like a Computer Scientist
Allen Downey
,
Chris Mayfield
Jan 1, 2020
Cite
URL
The Art, Science, and Engineering of Fuzzing: A Survey
Valentin J. M. Manès
,
HyungSeok Han
,
Choongwoo Han
,
Sang Kil Cha
,
Manuel Egele
,
Edward J. Schwartz
,
Maverick Woo
Oct 1, 2019
Cite
MAX_USERNAME_LEN set too low
W. Michael Petullo
,
Matt Johnston
Mar 1, 2019
Cite
The Python Tutorial
Python Software Foundation
Jan 1, 2019
Cite
The Rust Programming Language
Steve Klabnik
,
Carol Nichols
Jan 1, 2019
Cite
Strange behaviour [sic] surrounding ``ssh -T ...'' and non-zero exit
W. Michael Petullo
,
Matt Johnston
Nov 1, 2018
Cite
Operating Systems: Three Easy Pieces
Remzi H. Arpaci-Dusseau
,
Andrea C. Arpaci-Dusseau
Aug 1, 2018
Cite
URL
Lowering the Barriers to Capture The Flag Administration and Participation
Kevin Chung
Aug 1, 2017
Cite
Shell We Play a Game? CTF-as-a-service for Security Education
Erik Trickel
,
Francesco Disperati
,
Eric Gustafson
,
Faezeh Kalantari
,
Mike Mabey
,
Naveen Tiwari
,
Yeganeh Safaei
,
Adam Doupé
,
Giovanni Vigna
Aug 1, 2017
Cite
Between-Subjects Design
Anne Oeldorf-Hirsch
Jan 1, 2017
Cite
Counterbalancing
Elena F. Corriero
Jan 1, 2017
Cite
Within-Subjects Design
Richard Draeger
Jan 1, 2017
Cite
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef
,
Michael Hicks
,
James Parker
,
Dave Levin
,
Michelle L. Mazurek
,
Piotr Mardziel
Jan 1, 2016
Cite
Infrastructure as Code: Managing Servers in the Cloud
Kief Morris
Jan 1, 2016
Cite
The Go Programming Language
Alan A. A. Donovan
,
Brian W. Kernighan
Jan 1, 2016
Cite
Think Java: How to Think Like a Computer Scientist
Allen Downey
,
Chris Mayfield
Jan 1, 2016
Cite
URL
Using CTFs for an Undergraduate Cyber Education
Martin Carlisle
,
Michael Chiaramonte
,
David Caswell
Aug 1, 2015
Cite
Beej's Guide to Unix Interprocess Communication
Brian Hall
Jan 1, 2015
Cite
Codechella: Multi-user program visualizations for real-time tutoring and collaborative learning
Philip J. Guo
,
Jeffery White
,
Renan Zanelatto
Jan 1, 2015
Cite
Codeopticon: Real-Time, One-To-Many Human Tutoring for Computer Programming
Philip J. Guo
Jan 1, 2015
Cite
Computer Security: Principles and Practice
William Stallings
,
Lawrie Brown
Jan 1, 2015
Cite
Learning Obstacles in the Capture The Flag Model
Kevin Chung
,
Julian Cohen
Aug 1, 2014
Cite
PicoCTF: A Game-Based Computer Security Competition for High School Students
Peter Chapman
,
Jonathan Burket
,
David Brumley
Aug 1, 2014
Cite
Pro Git
Scott Chacon
,
Ben Straub
Jan 1, 2014
Cite
SEI CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems
Robert C. Seacord
Jan 1, 2014
Cite
Learn Programming++: The Design, Implementation and Deployment of an Intelligent Environment for the Teaching and Learning of Computer Programming
Gordon Hunter
,
David Livingstone
,
Paul Neve
,
Graham Alsop
Jul 1, 2013
Cite
Online Python Tutor: Embeddable Web-Based Program Visualization for CS Education
Philip J. Guo
Jan 1, 2013
Cite
Rethinking SSL Development in an Appified World
Sascha Fahl
,
Marian Harbach
,
Henning Perl
,
Markus Koetter
,
Matthew Smith
Jan 1, 2013
Cite
R3: Repeatability, Reproducibility and Rigor
Jan Vitek
,
Tomas Kalibera
Mar 1, 2012
Cite
The most dangerous code in the world: validating SSL certificates in non-browser software
Martin Georgiev
,
Subodh Iyengar
,
Suman Jana
,
Rishita Anubhai
,
Dan Boneh
,
Vitaly Shmatikov
Jan 1, 2012
Cite
The security impact of a new cryptographic library
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
Jan 1, 2012
Cite
Why Eve and Mallory love Android: an analysis of Android SSL (in)security
Sascha Fahl
,
Marian Harbach
,
Thomas Muders
,
Matthew Smith
,
Lars Baumgärtner
,
Bernd Freisleben
Jan 1, 2012
Cite
NIST Special Publication 800--145
Mell Peter
,
Grance Timothy
Sep 1, 2011
Cite
Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
Joseph Werther
,
Michael Zhivich
,
Tim Leek
,
Nickolai Zeldovich
Aug 1, 2011
Cite
Beej's Guide to Network Programming Using Internet Sockets
Brian Hall
Jan 1, 2011
Cite
Capsicum: practical capabilities in UNIX
Robert Watson
,
Janathan Anderson
,
Ben Laurie
,
Kris Kennaway
Aug 1, 2010
Cite
Experiences with practice-focused undergraduate security education
Robert Fanelli
,
T.J. O'Connor
Aug 1, 2010
Cite
Webseclab security education workbench
Elie Bursztein
,
Baptiste Gourdin
,
Celine Fabry
,
Jason Bau
,
Gustav Rydstedt
,
Hristo Bojinov
,
Dan Boneh
,
John C. Mitchell
Aug 1, 2010
Cite
Browser Security: Lessons from Google Chrome
Charles Reis
,
Adam Barth
,
Carlos Pizano
Aug 1, 2009
Cite
The Pintos Instructional Operating System Kernel
Ben Pfaff
,
Anthony Romano
,
Godmar Back
Jan 1, 2009
Cite
SEED: A Suite of Instructional Laboratories for Computer Security Education
Wenliang Du
,
Ronghua Wang
Mar 1, 2008
Cite
Hacking: The Art of Exploitation
Jon Erickson
Jan 1, 2008
Cite
When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC
Erik Buchanan
,
Ryan Roemer
,
Hovav Shacham
,
Stefan Savage
Jan 1, 2008
Cite
How to Read a Paper
S. Keshav
Jul 1, 2007
Cite
Some thoughts on security after ten years of qmail 1.0
Daniel J. Bernstein
Jan 1, 2007
PDF
Cite
Subverting the Fundamentals Sequence: Using Version Control to Enhance Course Management
Curtis Clifton
,
Lisa C. Kaczmarczyk
,
Michael Mrozek
Jan 1, 2007
Cite
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
Hovav Shacham
Jan 1, 2007
Cite
Making information flow explicit in HiStar
Nickolai Zeldovich
,
Silas Boyd-Wickizer
,
Eddie Kohler
,
David Mazières
Nov 1, 2006
Cite
Linux Device Drivers
Jonathan Corbet
,
Alessandro Rubini
,
Greg Kroah-Hartman
Jan 1, 2005
Cite
Preventing Privilege Escalation
Niels Provos
,
Markus Friedl
,
Peter Honeyman
Aug 1, 2003
Cite
Defcon Capture the Flag: defending vulnerable code from intense attack
Crispin Cowan
,
Seth Arnold
,
Steve Beattie
,
Chris Wright
,
John Viega
Apr 1, 2003
Cite
Administrator’s Guide to Linux in the Windows Enterprise
Jan 1, 2003
Cite
Setuid Demystified
Hao Chen
,
David Wagner
,
Drew Dean
Aug 1, 2002
Cite
URL
Security in Plan 9
Russ Cox
,
Eric Grosse
,
Rob Pike
,
Dave Presotto
,
Sean Quinlan
Jan 1, 2002
Cite
Implementing SELinux as a Linux Security Module
Stephen Smalley
,
Chris Vance
,
Wayne Salamon
Dec 1, 2001
Cite
Exploiting Format String Vulnerabilities
Scut / Team Teso
Sep 1, 2001
Cite
Integrating Flexible Support for Security Policies into the Linux Operating System
Peter Loscocco
,
Stephen Smalley
Jun 1, 2001
Cite
The Cathedral and the Bazaar
Eric S. Raymond
,
Tim O'Reilly
Jan 1, 1999
Cite
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
Crispin Cowan
,
Calton Pu
,
Dave Maier
,
Heather Hintony
,
Jonathan Walpole
,
Peat Bakke
,
Steve Beattie
,
Aaron Grier
,
Perry Wagle
,
Qian Zhang
Jan 1, 1998
Cite
The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments
Peter Loscocco
,
Stephen D. Smalley
,
Patrick A. Muckelbauer
,
Ruth C. Taylor
,
S. Jeff Turner
,
John F. Farrel
Jan 1, 1998
Cite
Smashing The Stack For Fun And Profit
Aleph One
Jan 1, 1996
PDF
Cite
SSH---Secure Login Connections over the Internet
Tatu Ylonen
Jan 1, 1996
Cite
An Evaluation of the Ninth SOSP Submissions or How (and How Not) to Write a Good Systems Paper
Roy Levin
,
David D. Redell
Oct 1, 1988
Cite
The C Programming Language
Brian W. Kernighan
,
Dennis M. Ritchie
Jan 1, 1988
Cite
The UNIX Programming Environment
Brian W. Kernighan
,
Rob Pike
Jan 1, 1984
Cite
New Directions in Cryptography
Whitfield Diffie
,
Martin Hellman
Nov 1, 1976
Cite
The Protection of Information in Computer Systems
Jerome H. Saltzer
,
Michael D. Schroeder
Jan 1, 1975
PDF
Cite
Protection and the Control of Information Sharing in Multics
J. H. Saltzer
Jul 1, 1974
Cite
The UNIX time-sharing system
Dennis M. Ritchie
,
Ken Thompson
Jan 1, 1974
Cite
DOI
Cite
×