mirror of
				https://github.com/papers-we-love/papers-we-love.git
				synced 2025-06-13 12:54:28 +00:00 
			
		
		
		
	Update to security section
Added dates, revived a dead link and added a link to the local version of the paper.
This commit is contained in:
		
							parent
							
								
									ab42abea62
								
							
						
					
					
						commit
						3eb648fe61
					
				| @ -1,13 +1,11 @@ | |||||||
| ## Security  | ## Security  | ||||||
| 
 | 
 | ||||||
| * [Reflections on Trusting Trust](http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf) | * [Reflections on Trusting Trust (1984)](http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf) | ||||||
| * [Internet Census via Insecure Routers](http://internetcensus2012.bitbucket.org/paper.html) | * [Internet Census via Insecure Routers (2012)](http://internetcensus2012.bitbucket.org/paper.html) | ||||||
| * [Looking inside the (Drop) box](http://ictc.aeoi.org.ir/sites/default/files/US-13-Prado-SSL-Gone-in-30-seconds-A-BREACH-beyond-CRIME-WP_0.pdf) | * [Looking inside the (Drop) Box (2013)](http://ams2.mirrors.digitalocean.com/openwall/presentations/Security-Analysis-of-Dropbox/woot13-kholia.pdf) | ||||||
| * [Making Programs Forget: Enforcing Lifetime For Sensitive Data](https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdf) | * [Making Programs Forget: Enforcing Lifetime For Sensitive Data (2011)](https://www.usenix.org/events/hotos11/tech/final_files/Kannan.pdf) | ||||||
| * [Breach: Reviving The Crime Attack](http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf) | * [Breach: Reviving The Crime Attack (2013)](http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf) | ||||||
| * [Why Silent Updates Boost Security](http://www.techzoom.net/Papers/Browser_Silent_Updates_%282009%29.pdf) | * [Why Silent Updates Boost Security (2009)](http://www.techzoom.net/Papers/Browser_Silent_Updates_%282009%29.pdf) | ||||||
| * :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud](http://research.google.com/pubs/archive/41892.pdf) | * :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014)](macaroons-cookies-with-contextual-caveats.pdf) | ||||||
| 
 | 
 | ||||||
| * :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection] | * :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998)](ids-evasion-ptacek-newsham.pdf) | ||||||
| 
 |  | ||||||
|      *Ptacek, and Newsham. "Insertion, Evasion, and Denial of Service: eluding network intrusion detection." Secure Networks, Inc., Jan. 1998* |  | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user