Reflections on Trusting Trust (1984)
Internet Census via Insecure Routers (2012)
Looking inside the (Drop) Box (2013)
Making Programs Forget: Enforcing Lifetime For Sensitive Data (2011)
Breach: Reviving The Crime Attack (2013)
Why Silent Updates Boost Security (2009)
📜 Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014)
📜 Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998)