John Aycock

Orcid: 0000-0003-0352-489X

Affiliations:
  • University of Calgary, Canada


According to our database1, John Aycock authored at least 71 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AI-Generated Code Not Considered Harmful.
Proceedings of the 25th Western Canadian Conference on Computing Education, 2023

spy3: A Python Subset for CS1.
Proceedings of the 25th Western Canadian Conference on Computing Education, 2023

Binary Reverse Engineering for All.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

FrAG: A Framework for the Analysis of Games.
Proceedings of the IEEE Conference on Games, 2023

2022
The Sincerest Form of Flattery: Large-Scale Analysis of Code Re-Use in Atari 2600 Games.
Proceedings of the FDG '22: Proceedings of the 17th International Conference on the Foundations of Digital Games, 2022

2021
Teaching Social Engineering Using Improv.
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.2, Virtual Event, Germany, June 26, 2021

2020
10 Binary Games for Computer Science Education.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator.
Proceedings of the FDG '20: International Conference on the Foundations of Digital Games, 2020

2019
Entombed: An archaeological examination of an Atari 2600 game.
Art Sci. Eng. Program., 2019

Uncivil Engineering: A Textual Divide in Game Studies.
Game Stud., 2019

Adapting the "Unessay" for Use in Computer Science.
Proceedings of the 24th Western Canadian Conference on Computing Education, 2019

S<sup>4</sup>LVE: shareable videogame analysis and visualization.
Proceedings of the 14th International Conference on the Foundations of Digital Games, 2019

2018
Exercises for teaching reverse engineering.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

Stick to the script: lightweight recording and playback of live coding.
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018

2016
Code Protection: When Abstinence is not an Option.
Proceedings of the 21st Western Canadian Conference on Computing Education, 2016

An Industrial Partnership Game Development Capstone Course.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Retrogame Archeology - Exploring Old Computer Games
Springer, ISBN: 978-3-319-30004-7, 2016

2015
Permutation Steganography in FAT Filesystems.
Trans. Data Hiding Multim. Secur., 2015

Stringlish: improved English string searching in binary files.
Softw. Pract. Exp., 2015

A Game Engine in Pure Python for CS1: Design, Experience, and Limits.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

Applied Computer History: Experience Teaching Systems Topics through Retrogames.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

2014
An Experience Report on Extracting and Viewing Memory Events via Wireshark.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

2013
Assured Supraliminal Steganography in Computer Games.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
What's in a name. . . generator?
J. Comput. Virol., 2012

Lightweight Client-Side Methods for Detecting Email Forgery.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

μPython: non-majors programming from the very first lecture.
Proceedings of the Annual Conference on Innovation and Technology in Computer Science Education, 2012

Babel: a secure computer is a polyglot.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

The Gold Standard: Automatically Generating Puzzle Game Levels.
Proceedings of the Eighth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2012

ThinAV: truly lightweight mobile cloud-based anti-malware.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Spyware and Adware
Advances in Information Security 50, Springer, ISBN: 978-0-387-77740-5, 2011

Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research.
Proceedings of the Financial Cryptography and Data Security, 2011

User-preference-based automated level generation for platform games.
Proceedings of the 2011 IEEE Conference on Computational Intelligence and Games, 2011

Does domain highlighting help people identify phishing sites?
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
SPoIM: A close look at pollution attacks in P2P live streaming.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Enbug: when debuggers go bad.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Ethical Proactive Threat Research.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Early action in an Earley parser.
Acta Informatica, 2009

Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
Proceedings of the Information Hiding, 11th International Workshop, 2009

A Multi-Agent Approach to Testing Anti-Spam Software.
Proceedings of the Database and Expert Systems Applications, 2009

Code Obfuscation Using Pseudo-random Number Generators.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Kwyjibo: automatic domain name generation.
Softw. Pract. Exp., 2008

"Good" worms and human rights.
SIGCAS Comput. Soc., 2008

The tale of the weather worm.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Image spam - ASCII to the rescue!
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

Spamulator: the Internet on a laptop.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

Global-scale Anti-spam Testing in Your Own Back Yard.
Proceedings of the CEAS 2008, 2008

2007
Army of Botnets.
Proceedings of the Network and Distributed System Security Symposium, 2007

Inverse Geolocation: Worms with a Sense of Direction.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Extracting NPC behavior from computer games using computer vision and machine learning techniques.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Games, 2007

2006
Anti-disassembly using Cryptographic Hash Functions.
J. Comput. Virol., 2006

Teaching Spam and Spyware at the University of C@1g4ry.
Proceedings of the CEAS 2006, 2006

Computer Viruses and Malware
Advances in Information Security 22, Springer, ISBN: 978-0-387-30236-2, 2006

2005
Choice in the classroom.
ACM SIGCSE Bull., 2005

Timing is everything.
Comput. Secur., 2005

Viruses 101.
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005

An Exceptional Programming Language.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

Improved Port Knocking with Strong Authentication.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Extending Old Compiler Tools with Meta-Tools.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

NEST: NEtwork Server Tool.
Proceedings of the International Conference on Internet Computing, 2004

2003
The ART of compiler construction projects.
ACM SIGPLAN Notices, 2003

A brief history of just-in-time.
ACM Comput. Surv., 2003

2002
Practical Earley Parsing.
Comput. J., 2002

2001
Practical Earley parsing and the SPARK toolkit.
PhD thesis, 2001

Schrödinger's token.
Softw. Pract. Exp., 2001

Why bison is becoming extinct.
XRDS, 2001

Even faster generalized LR parsing.
Acta Informatica, 2001

Directly-Executable Earley Parsing.
Proceedings of the Compiler Construction, 10th International Conference, 2001

2000
Analysis of Equation Structure using Least Cost Parsing.
Proceedings of the Sixth Internatonal Workshop on Parsing Technologies, 2000

Simple Generation of Static Single-Assignment Form.
Proceedings of the Compiler Construction, 9th International Conference, 2000

1999
An architecture for easy Web page updating.
XRDS, 1999

Faster Generalized LR Parsing.
Proceedings of the Compiler Construction, 8th International Conference, 1999


  Loading...