You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
## Security
* [Reflections on Trusting Trust ](http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf )
* [Internet Census via Insecure Routers ](http://internetcensus2012.bitbucket.org/paper.html )
* [Looking inside the (Drop) box ](http://ictc.aeoi.org.ir/sites/default/files/US-13-Prado-SSL-Gone-in-30-seconds-A-BREACH-beyond-CRIME-WP_0.pdf )
* [Making Programs Forget: Enforcing Lifetime For Sensitive Data ](https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdf )
* [Breach: Reviving The Crime Attack ](http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf )
* [Why Silent Updates Boost Security ](http://www.techzoom.net/Papers/Browser_Silent_Updates_%282009%29.pdf )
* :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud ](http://research.google.com/pubs/archive/41892.pdf )
* :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection]
*Ptacek, and Newsham. "Insertion, Evasion, and Denial of Service: eluding network intrusion detection." Secure Networks, Inc., Jan. 1998*