2015-10-07 19:11:04 +00:00
## Security
2015-10-19 12:29:49 +00:00
* [Reflections on Trusting Trust (1984) ](http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf )
2017-05-20 02:45:20 +00:00
* [Internet Census via Insecure Routers (2012) ](https://internetcensus2012.bitbucket.io/paper.html )
2016-05-31 11:34:27 +00:00
* [Looking inside the (Drop) Box (2013) ](https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdf )
2015-10-19 12:29:49 +00:00
* [Making Programs Forget: Enforcing Lifetime For Sensitive Data (2011) ](https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdf )
* [Breach: Reviving The Crime Attack (2013) ](http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf )
* [Why Silent Updates Boost Security (2009) ](http://www.techzoom.net/Papers/Browser_Silent_Updates_%282009%29.pdf )
2017-10-23 10:53:57 +00:00
* [A survey of coordinated attacks and collaborative intrusion detection (2010) ](https://www.tk.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TK/zhou2010survey.pdf )
2015-10-07 19:11:04 +00:00
2017-10-23 10:53:57 +00:00
* :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014) ](macaroons-cookies-with-contextual-caveats.pdf )
2015-10-19 12:29:49 +00:00
* :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998) ](ids-evasion-ptacek-newsham.pdf )
2020-03-24 02:17:10 +00:00