Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Summit Organizers
  • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
  • At a Glance
  • Summit Program
  • Co-Located Workshops
  • Activities
    • Birds-of-a-Feather Sessions
  • Sponsorship
  • Students and Grants
  • Questions?
  • Help Promote!
  • For Participants
  • Call for Participation

sponsors

Platinum Sponsor

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » A Case Study in Helping Students to Covertly Eat Their Classmates
Tweet

connect with us

http://twitter.com/usenixsecurity
http://www.usenix.org/facebook
http://www.usenix.org/linkedin
http://www.usenix.org/gplus
http://www.usenix.org/youtube

A Case Study in Helping Students to Covertly Eat Their Classmates

Wednesday, July 23, 2014 - 3:30pm
Authors: 

Roya Ensafi, Mike Jacobi, and Jedidiah R. Crandall, University of New Mexico

Abstract: 

Werewolves is an online version of the game Werewolves of Miller’s Hollow that we developed in 2012 to help teach information flow in a computer security and privacy class. The game pits werewolves against townspeople in a shared Linux system, where students must use the command line environment to find information flow leaks in the form of side channels that reveal the werewolves’ identities.

Werewolves has many desirable traits, such as the ability to make learning about information flow fun and the fact that the kinds of attacks students can carry out to gain an advantage in the game are open ended, which leads to self-guided learning. However, these benefits quickly deteriorate if one or two students dominate the game. In this paper, we discuss instances where this has occurred through several uses of the game, and propose ways to ameliorate this problem.

Roya Ensafi, University of New Mexico

Mike Jacobi, University of New Mexico

Jedidiah R. Crandall, University of New Mexico

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@inproceedings {183459,
author = {Roya Ensafi and Mike Jacobi and Jedidiah R. Crandall},
title = {A Case Study in Helping Students to Covertly Eat Their Classmates},
booktitle = {2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)},
year = {2014},
address = {San Diego, CA},
url = {https://www.usenix.org/conference/3gse14/summit-program/presentation/ensafi},
publisher = {USENIX Association},
month = aug,
}
Download
Ensafi PEF

Presentation Video 

Presentation Audio

MP3 Download

Download Audio

  • Log in or    Register to post comments

Platinum Sponsors

© USENIX

  • Privacy Policy
  • Contact Us