Skip to main content

Accessibility menu

Skip to main content Skip to footer

Profile for W. Michael Petullo

W. Michael Petullo profile photo

Contact me

W. Michael Petullo

Assistant Professor
Comp Sci & Comp Engineering
University of Wisconsin-La Crosse

W. Michael Petullo

Assistant Professor

Comp Sci & Comp Engineering

Specialty area(s)

Software and network security

Operating system design and implementation

Open-source software development

Brief biography

I joined the UW–L faculty after a 20-year career in the Army. My later Army assignments included teaching in the Department of Electrical Engineering and Computer Science and leading an organization responsible for developing software and hardware capabilities for use in cyber operations. I deployed to both Iraq and Afghanistan. I spend much of my time outside of the classroom managing a woodland property and hobby farm north of La Crosse. I am originally from Waterloo, Iowa.

Current courses at UWL

CS120, Software Design I

CS410/510, Open Source Development

CS455/555, Fundamentals of Information Security

Education

Ph.D. in Computer Science, University of Illinois at Chicago

M.S. in Computer Science, DePaul University

B.S. in Computer Science, Drake University

Career

Teaching history

CS120, Software Design I

CS356, Software Exploitation

CS410/510, Open Source Development

CS441, Operating System Concepts

CS455/555, Fundamentals of Information Security

CS456/556, Secure Software Development

Research and publishing

Courses as Code: The Aquinas Learning System by W. Michael Petullo

The Industrial Age of Hacking by Tim Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, and W. Michael Petullo

PivotWall: SDN-Based Information Flow Control by T.J. O'Connor, William Enck, W. Michael Petullo, and Akash Verma

Using VisorFlow to Control Information Flow without Modifying the Operating System Kernel or its Userspace by Matt Shockley, Chris Maixner, Ryan Johnson, Mitch DeRidder, and W. Michael Petullo

Studying Naïve Users and the Insider Threat with SimpleFlow by Ryan Johnson, Jessie Lass, and W. Michael Petullo

The Use of Cyber-Defense Exercises in Undergraduate Computing Education by W. Michael Petullo, Kyle Moses, Ben Klimkowski, Ryan Hand, and Karl Olson

Improving Application Security Through TLS-Library Redesign by Leo St. Amour and W. Michael Petullo

On the Generality and Convenience of Etypes by W. Michael Petullo and Joseph Suh

Teaching Computer Security by Kyle V. Moses and W. Michael Petullo

Ethos' Deeply Integrated Distributed Types by W. Michael Petullo, Jon A. Solworth, Wenyuan Fei, and Pat Gavlin

MinimaLT: Minimal-latency Networking Through Better Security by W. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, and Tanja Lange

Rethinking Operating System Interfaces to Support Robust Network Applications by W. Michael Petullo

Simple-to-use, Secure-by-design Networking in Ethos by W. Michael Petullo and Jon A. Solworth

The Lazy Kernel Hacker and Application Programmer by W. Michael Petullo and Jon A. Solworth

Rethinking Operating System Interfaces to Support Robust Applications by W. Michael Petullo and Jon A. Solworth

Digital identity security architecture in Ethos by W. Michael Petullo and Jon A. Solworth

Please refer to https://www.flyn.org/publication/ for the full bibliographic data associated with these publications.