TY - CONF
T1 - A case study in helping students to covertly eat their classmates
AU - Ensafi, Roya
AU - Jacobi, Mike
AU - Crandall, Jedidiah R.
N1 - Funding Information:
We would like to thank all of the tasty people who shared vulnerabilities and other insights about Werewolves with us, all of the savory students who have played Werewolves, all of our appetizing colleagues at CSET 2012 and other venues that have given us feedback, Jörg Schneider and all the scrumptious members of the ENOFLAG team, and the delectable anonymous reviewers for 3GSE. John Montoya and Tim C'de Baca helped us to understand the logic errors in the Werewolves server and are helping to develop version 1.3. The UNM Department of Computer Science supported Mike Jacobi with a teaching assistantship during the development of Werewolves. This material is based upon work supported by the National Science Foundation under Grant Nos. #0844880, #0905177, #1017602, and #1314297.
Funding Information:
We would like to thank all of the tasty people who shared vulnerabilities and other insights about Werewolves with us, all of the savory students who have played Werewolves, all of our appetizing colleagues at CSET 2012 and other venues that have given us feedback, Jörg Schneider and all the scrumptious members of the ENOFLAG team, and the delectable anonymous reviewers for 3GSE. John Montoya and Tim C’de Baca helped us to understand the logic errors in the Werewolves server and are helping to develop version 1.3. The UNM Department of Computer Science supported Mike Jacobi with a teaching assistantship during the development of Werewolves. This material is based upon work supported by the National Science Foundation under Grant Nos. #0844880, #0905177, #1017602, and #1314297.
Publisher Copyright:
© 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2014. All rights reserved.
PY - 2014
Y1 - 2014
N2 - Werewolves is an online version of the game Werewolves of Miller's Hollow that we developed in 2012 to help teach information flow in a computer security and privacy class. The game pits werewolves against townspeople in a shared Linux system, where students must use the command line environment to find information flow leaks in the form of side channels that reveal the werewolves' identities. Werewolves has many desirable traits, such as the ability to make learning about information flow fun and the fact that the kinds of attacks students can carry out to gain an advantage in the game are open ended, which leads to self-guided learning. However, these benefits quickly deteriorate if one or two students dominate the game. In this paper, we discuss instances where this has occurred through several uses of the game, and propose ways to ameliorate this problem.
AB - Werewolves is an online version of the game Werewolves of Miller's Hollow that we developed in 2012 to help teach information flow in a computer security and privacy class. The game pits werewolves against townspeople in a shared Linux system, where students must use the command line environment to find information flow leaks in the form of side channels that reveal the werewolves' identities. Werewolves has many desirable traits, such as the ability to make learning about information flow fun and the fact that the kinds of attacks students can carry out to gain an advantage in the game are open ended, which leads to self-guided learning. However, these benefits quickly deteriorate if one or two students dominate the game. In this paper, we discuss instances where this has occurred through several uses of the game, and propose ways to ameliorate this problem.
UR - http://www.scopus.com/inward/record.url?scp=85089936112&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85089936112&partnerID=8YFLogxK
M3 - Paper
AN - SCOPUS:85089936112
T2 - 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2014
Y2 - 18 August 2014
ER -