Flyn Computing
Flyn Computing
Open Source
Projects
Patches
Statistics
System integration
Notes
SRPMs
Academics
Publications
Proposals
Reading List
CDX
Statistics
Light
Dark
Automatic
Publications
Type
0
1
2
3
4
5
6
7
Date
2022
2021
2020
2018
2017
2016
2015
2014
2013
2012
2011
2010
2008
2007
2005
2003
2002
Courses as Code: The Aquinas Learning System
W. Michael Petullo
PDF
Cite
The Industrial Age of Hacking
W. Michael Petullo
Cite
The Industrial Age of Hacking
Tim Nosco
,
Jared Ziegler
,
Zechariah Clark
,
Davy Marrero
,
Todd Finkler
,
Andrew Barbarello
,
W. Michael Petullo
PDF
Cite
PivotWall: SDN-Based Information Flow Control
T.J. O'Connor
,
William Enck
,
W. Michael Petullo
,
Akash Verma
Cite
Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace
Matt Shockley
,
Chris Maixner
,
Ryan Johnson
,
Mitch DeRidder
,
W. Michael Petullo
PDF
Cite
Studying Naive Users and the Insider Threat with SimpleFlow
Ryan Johnson
,
Jessie Lass
,
W. Michael Petullo
PDF
Cite
The Use of Cyber-Defense Exercises in Undergraduate Computing Education
W. Michael Petullo
,
Kyle Moses
,
Ben Klimkowski
,
Ryan Hand
,
Karl Olson
PDF
Cite
Improving Application Security Through TLS-Library Redesign
Leo St. Amour
,
W. Michael Petullo
PDF
Cite
On the Generality and Convenience of Etypes
W. Michael Petullo
,
Joseph Suh
PDF
Cite
Teaching Computer Security
Kyle V. Moses
,
W. Michael Petullo
PDF
Cite
Ethos' Deeply Integrated Distributed Types
W. Michael Petullo
,
Jon A. Solworth
,
Wenyuan Fei
,
Pat Gavlin
PDF
Cite
MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo
,
Xu Zhang
,
Jon A. Solworth
,
Daniel J. Bernstein
,
Tanja Lange
PDF
Cite
Rethinking Operating System Interfaces to Support Robust Network Applications
W. Michael Petullo
PDF
Cite
Simple-to-use, Secure-by-design Networking in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
The Lazy Kernel Hacker and Application Programmer
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
The Ethos Project: Security Through Simplification
W. Michael Petullo
,
Jon A. Solworth
Cite
Rethinking Operating System Interfaces to Support Robust Applications
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Let's Help Johnny Write Robust Applications
W. Michael Petullo
Cite
Digital identity security architecture in Ethos
W. Michael Petullo
,
Jon A. Solworth
PDF
Cite
Building custom firmware with OpenWrt
W. Michael Petullo
Cite
URL
Open source telephony: a Fedora-based VoIP server with Asterisk
W. Michael Petullo
Cite
URL
From camera to website: Building an open source video streamer
W. Michael Petullo
Cite
URL
Serving Apples: Integrating Mac OS X clients into a Fedora network
W. Michael Petullo
Cite
URL
Disk encryption in Fedora: Past, present and future
W. Michael Petullo
Cite
URL
Adding encryption support to HAL: A user's experience with Fedora development
W. Michael Petullo
Cite
URL
Developing GNOME applications with Java
W. Michael Petullo
Cite
URL
Encrypt your root filesystem
W. Michael Petullo
Cite
URL
Implementing encrypted home directories
W. Michael Petullo
Cite
URL
Amateur Video Production Using Free Software and Linux
W. Michael Petullo
Cite
URL
Cite
×