486
Reading List
This is a mostly-complete list of things that I have (partially) read. The goal is for this to act as a "bibliography" citing the sources of some of my knowledge. It might also be useful if you're looking for something interesting to read. My favorites are highlighted in bold text.
2024
- Space, Time, and Motion (Sean Carroll)
- Quanta and Fields (Sean Carroll)
- A Brief History of Black Holes (Dr. Becky Smethurst)
- The Pea and the Sun (Leonard M. Wapner)
2023
- The One (Heinrich Päs)
- What Is ChatGPT Doing and Why Does It Work? (Stephen Wolfram)
- Lost Connections (Johann Hari)
- The Beginning of Infinity (David Deutsch)
- Vipassana Meditation and the Scientific Worldview (Paul Fleischman)
2022
- The Wisdom of Insecurity (Alan Watts)
- Poems for the Lost—Because I'm lost too (exurb1a)
- Thinking about mathematics (Stewart Shapiro)
- Existential Physics (Sabine Hossenfelder)
- Pracitcal Doomsday (Michal Zalewski)
- Lost in Math (Sabine Hossenfelder)
2021
- Harry Potter and the Philosopher's Stone (J.K. Rowling)
- How To DeFi (CoinGecko)
- The Science of Can and Can't (Chiara Marletto)
- Container Security (Liz Rice)
- A Fortunate Universe (Geraint Lewis and Luke Barnes)
- Man's Search for Meaning (Victor Frankl)
- The Scout Mindset (Julia Galef)
- Darkness Visible (William Styron)
- Embedded Software Development for Safety-Critical Systems (Chris Hobbs)
- Conscious (Annaka Harris)
2020
- Theory and Reality (Peter Godfrey-Smith)
- Mind & Cosmos (Thomas Nagel)
- Theory of Nothing (Russel K. Standish)
- The Emperor's New Mind (Roger Penrose)
- Attached (Amir Levine and Rachel S. F. Heller)
- From Bacteria To Bach and Back (Daniel C. Dennett)
- Self-Compassion: The Proven Power of Being Kind to Yourself (Kristin Neff)
- The Stranger (Albert Camus)
- Functional Thinking (Neal Ford)
- Think DSP: Digital Signal Processing in Python (Allen B Downey)
- The Tangled Web (Michal Zalewski)
- Billions & Billions (Carl Sagan)
- The Internet of Money Vol. 2 (Andreas M. Antonopoulos)
- Arcadia (Tom Stoppard)
2019
- Why Buddhism Is True (Robert Wright)
- Why Evolution Is True (Jerry A. Coyne)
- The Theoretical Minimum (Leonard Susskind and George Hrabovsky)
- Every Tool's a Hammer (Adam Savage)
- The Internet of Money Volume One (Andreas M. Antonopoulos)
- The Meaning of It All (Richard P. Feynman)
- Musicophilia: Tales of Music and the Brain (Oliver Sacks)
- A Scientist's Guide to Talking With The Media (Richard Hayes and Daniel Grossman)
- To Engineer Is Human: The Role of Failure in Successful Design (Henry Petroski)
- How To Change Your Mind (Michael Pollan)
- Unauthorized Access: Physical Penetration Testing for IT Security Teams (Will Allsopp)
- The Lost Art of High-Performance Driving (Ross Bentley)
- Harmony for Computer Musicians; Ch. 1-11 (Michael Hewitt)
2018
- Click Here to Kill Everybody (Bruce Schneier)
- The Psychology of Music (Elizabeth Hellmuth Margulis)
- Zero Trust Networks (Evan Gilman and Doug Barth)
- Brain on Fire (Susannah Cahalan)
- The Illustrated A Brief History of Time (Stephen Hawking)
- Reality Is Not What It Seems (Carlo Rovelli)
- The Fabric of Reality (David Deutsch)
- Astrophysics for People in a Hurry (Neil deGrasse Tyson)
- Composition for Computer Musicians (Michael Hewitt)
- Mixing Secrets for the Small Studio (Mike Senior)
- Ableton Live 9 Reference Manual
2017
- Making Music: 74 Creative Strategies for Electronic Music Producers (Dennis DeSantis)
- The Man Who Mistook His Wife For a Hat (Oliver Sacks)
- The Black Hole War (Leonard Susskind)
- QED: The Strange Theory of Light and Matter (Richard Feynman)
- Quantum Information Theory & the Foundations of Quantum Mechanics (Christopher G. Timpson)
- Music Theory for Computer Musicians (Michael Hewitt)
- Musimathics (Gareth Loy)
- Dance Music Manual (Michael Hewitt)
- Creating Mind (John E. Dowling)
- The Quantum Age (Brian Clegg)
- The Big Picture (Sean Carroll)
- I Am A Strange Loop (Douglas Hofstadter)
2016
- Computational Complexity: A Modern Approach (Arora and Barak)
- The Architecture of Language (Noam Chomsky)
- Meditations on First Philosophy (René Descartes)
- Sound: A Very Short Introduction (Mike Goldsmith)
- Chemistry Essentials for Dummies (John T. Moore)
- In Defense of Evil: Why Good Is Bad and Bad Is Good (Terroja Kincaid)
- Frankenstein (Mary Shelley)
- Free Will (Sam Harris)
- The Hidden Reality (Brian Greene)
2015
- The Art of Strategy (Avinash K. Dixit and Barry J. Nalebuff)
- Computing with Quantum Cats (John Gribbin)
- Quantum Computing Since Democritus (Scott Aaronson)
- A PhD is Not Enough (Peter J. Feibelman)
- Our Mathematical Universe (Max Tegmark)
- Canadian Red Cross First Aid & CPR Manual
- Qube: Questions of Being (Unknown)
- The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto (Phil Champagne)
- Mastering Bitcoin (Andreas M. Antonopoulos)
- A Tour of C++ (Bjarne Stroustrup)
- Intuition Pumps and Other Tools for Thinking (Daniel C. Dennett)
- Metaphysics: A Very Short Introduction (Stephen Mumford)
- Flatland: A Romance of Many Dimensions (Edwin A. Abbott)
- Getting to Yes: Negotiating an agreement without giving in (Fisher and Ury)
- The Unpersuadables: Adventures with the Enemies of Science (Will Storr)
- Gray Hat Python (Justin Seitz)
- Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (Gabriella Coleman)
- The Climate Crisis: An Introductory Guide to Climate Change (David Archer, Stefan Rahmstorf)
- The Martian (Andy Weir)
2014
- You Are Here: Around the World in 92 Minutes (Chris Hadfield)
- What the Bleep do we Know? (William Arntz et al.) (Warning: It's Bullshit)
- Getting Started with Memcached (Ahmed Soliman)
- Linear Algebra With Applications (Nicholson)
- Calculus (Spivak)
- Natural Disasters, 2nd Canadian Edition (Abbott, Samson)
- Alice's Adventures in Wonderland (Lewis Carrol)
- Music Theory for Dummies (Michael Pilhofer, Holly Day)
- Out Of Their Minds (Dennis Shasha, Cathy Lazere)
- Waking Up (Sam Harris)
- The History of Science (Audiobook) (Peter Whitfield)
- You've Got Some Explaining To Do (Jane Nevins)
- Conciousness Explained (Daniel C. Dennett)
- The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman (Richard Feynman)
- The Dragons of Eden: Speculations on the Evolution of Human Intelligence (Carl Sagan)
- The Man Who Knew Too Much: Alan Turing and The Invention of the Computer (David Leavitt)
- Distributed Systems for Fun and Profit (Mikito Takada)
- Selected Chapters from Anton: Elementary Linear Algebra, 8th Edition (Custom print for University of Calgary)
- Harry Potter and the Deathly Hallows (J. K. Rowling)
- No Place to Hide (Glenn Greenwald)
- Feynman's Tips On Physics (Richard Feynman, Michael A. Gottleib, Ralph Leighton)
- The Art of War (Sun Tzu)
- Death By Black Hole (Neil DeGrasse Tyson)
- Rocks & Minerals (Dr. R. F. Symes)
- A Universe From Nothing (Lawrence M. Krauss)
- Feynman Lectures on Computation (Richard Feynman)
2013
- On the Origin of Species By Means of Natural Selection (Charles Darwin)
- Time Reborn (Lee Smolin)
- Surely You're Joking, Mr. Feynman! (Richard Feynman)
- The Ancestor's Tale (Richard Dawkins)
- How to Win Friends & Influence People (Dale Carnegie)
- Auto Fundamentals (Stockel, Stockel, and Johanson)
- A Mathematician's Lament (Paul Lockhart)
- The Anarchist Cookbook (William Powell)
- A Guide To Kernel Exploitation
- Philosophy of Science (Curd, Cover, Pincock)
- Cypherpunks (Assange et. al.)
- The Elements of Moral Philosophy (Rachels)
- Computer Networking: A Top-Down Approach (Kurose, Ross)
- Pirate Cinema (Cory Doctorow)
- God is Not Great (Christopher Hitchens)
- Pro Git (Scott Chacon)
- How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace
- JavaScript: The Good Parts
- HTML5 Canvas
- Gödel, Escher, Bach: An Eternal Golden Braid (Douglas Hofstadter)
- Intel 64 and IA-32 Architectures Software Developer Manual: Volume 1
2012 and Before
- Introduction to Algorithms (CLRS)
- Cryptography Engineering
- Understanding Cryptography (Paar, Pelzl)
- Applied Cryptography (Schneier)
- Cryptography Theory and Practice (Stinson)
- Seven Deadliest Web Application Attacks
- Numerical Methods Using Matlab
- Essential PHP Security
- Practical Lock Picking
- Computability and Logic (Boolos)
- Writing for Computer Science
- Discrete Mathematics with Applications
- The Ruby Programming Language
- C++ For Dummies
- Understanding the Linux Kernel
- Hacking For Dummies
- Networking For Dummies
- Ghost in the wires (Mitnick)
- The art of deception (Mitnick)
- Peter Norton's Inside the PC
- The C Programming Language (K&R)
- HTML, XTHML, & CSS (Castro)
- SPARC Architecture, Assembly Language Programming, and C
- Statistics (Freedman, Pisani, Purves)
- HACKING - The Art of Exploitation
- The Standard C Library
- The God Delusion (Dawkins)
- The Magic Of Reality
- Little Brother (Cory Doctorow)
- Nineteen Eighty Four (George Orwell)
- Quantum Computing (Reiffel, Polak) (no i don't understand this at all)
- Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin)
- Structured Computer Organization (Andrew S. Tanenbaum)
- Agile Web Development With Rails (Sam Ruby, Dave Thomas, David Hansson)
- Assembly Language for x86 Processors (Kip Irvine)
- The Essentials of Technical Communication (Elizabeth Tebeaux, Sam Dragga)
- Daemon (Daniel Suarez)
- Freedom (Daniel Suarez)
- Last Words (George Carlin)
- When Will Jesus Bring The Porkchops (George Carlin)
- The Black Hole War (Leonard Susskind)
- 13 Things That Don't Make Sense (Michael Brooks)
- Physics of the Impossible (Michio Kaku)
- On Intelligence (Jeff Hawkins)
- The Selfish Gene (Richard Dawkins)
- Man of La Mancha
- The War of the Worlds (H. G. Wells)
- Stealing the Network: How to Own the Box
- Stealing the Network: How to Own an Identity
- Stealing the Network: How to Own A Continent
- A Brief History of Time (Stephen Hawking)
Papers
2024
- ChatGPT is bullshit (Michael Townsen Hicks et al.)
- The ghost is the machine: Weird machines in transient execution (Ping-Lun Wang et al.)
- A Toy Model for Local Deterministic Wave-function Collapse (Sandro Donaldi, Sabine Hossenfelder)
- Natural Recovery By the Liver and Other Organs After Chronic Alcohol Use (Paul G. Thomes et al.)
- Anonymity Loves Company: Usability and the Network Effect (Roger Dingledine and Nick Mathewson)
- The Surprise Examination Paradox and the Second Incompleteness Theorem (Shira Kirchman and Ran Raz)
- The Unreasonable Effectiveness of Mathematics in the Natural Sciences (Eugene Wigner)
2023
- Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues (Domien Schepers et al.)
- DistDet: A Cost-Effective Distributed Cyber Threat Detection System (Feng Dong et al.)
- "Millions of people are watching you": Understanding the Digital-Safety Needs and Practices of Creators (Patrawat SAmermit et al.)
- "All of them claim to be the best": Multi-perspective study of VPN users and VPN providers (Reethika Ramesh et al.)
- Bitcoin, Currencies, and Fragility (Nassim Nicholas Taleb)
- The Loopix Anonymity System (Ania M. Piotrowska et al.)
- The Nym Network (Claudia Diaz et al.)
- Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution (Jo Van Bulck et al.)
- AEPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture (Pietro Borello et al.)
- Plundervolt: Software-based Fault Injection Attacks against Intel SGX (Kit Murdock et al.)
- SGAxe: How SGX Fails in Practice (Stephan van Shaik et al.)
- Securing the Boot Process (Jessie Frazelle)
- SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems (David Cerdeira et al.)
- Three Lessons From Threema: Analysis of a Secure Messenger (Kenneth G. Paterson et al.)
2022
- The Quantum Eraser Paradox (C. Bracken et al.)
- Superdeterminism: A Guide for the Perplexed (Sabine Hossenfelder)
- Rethinking Superdeterminism (Sabine Hossenfelder and Tim Palmer)
- SATAn: Air-Gap Exfiltration Attack Via Radio Signals From SATA Cables (Mordechai Guri)
- Computational Solution to Quantum Foundational Problems (Arkady Bolotin)
2021
- Superdeterminism: A Guide for the Perplexed (Sabine Hossenfelder)
- Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications (Mingkui Wei)
- Partitioning Oracle Attacks (Julia Len et al.)
- "It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online (Allison McDonald et al.)
- Rotational cryptanalysis of reduced-round Keccak (Pawel Morawiecki et al.)
- On the Electrodynamics of Moving Bodies (Albert Einstein)
- How to Find Hidden Users: A Survey of Attacks on Anonymity Networks (Esra Erdin et al.)
2020
- PIR with compressed queries and amortized query processing (Sebastian Angel et al.)
- Many Worlds, the Born Rule, and Self-Locating Uncertainty (Sean M. Carroll et al.)
- Survey on anonymous communications in computer networks (Jian Ren and Jie Wu)
- Responsible Vulnerability Disclosure in Cryptocurrencies (Rainer Böhme et al.)
- XRD: Scalable Messaging System with Cryptographic Privacy (Albert Kwon et al.)
- On Privacy Notions in Anonymous Communication (Christine Kuhn et al.)
- ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments (Sajin Sasy and Ian Goldberg)
- k-Anonymity: A Model for Protecting Privacy (Latanya Sweeney)
- Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology (Andreas Pfitzmann and Marit Köhntopp)
- The Basics of Brain Development (Joan Stiles and Terry L. Jernigan)
- Struggling to be a person: Lived experience of avoidant personality disorder (Kristine D. Sorensen et al.)
2019
- Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems (Takeshi Sugawara et al.)
- Quantum Supremacy Using a Programmable Superconducting Processor (Eleanor G. Rieffel)
- Exterminate All Operating System Abstractions (Dawson R. Engler and M. Frans Kaashoek)
- A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World (Al Bessey et al.)
- Touching The Untouchables: Dynamic Security Analysis of the LTE Control Plane (Hongil Kim et al.)
- Deanonymization of clients in Bitcoin P2P network (Alex Biryukov et al.)
- Survivable Key Compromise in Software Update Systems (Justin Samuel et al.)
- A Survey on the Security of Blockchain Systems (Xiaoqi Li et al.)
- Blockchain challenges and opportunities: a survey (Zibin Zheng et al.)
- Coda: Decentralized cryptocurrency at scale (Izaak Meckler and Evan Shapiro)
- Harmony Technical Whitepaper (Harmony Team)
- The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations (Eyal Ronen et al.)
- NetSpectre: Read Arbitrary Memory over Network (Michael Schwarz)
- Basic Attention Token (BAT) (Brave Software)
- Eclipse Attacks on Bitcoin's Peer-to-Peer Network (Ethan Heilman et al.)
- SoK: Make JIT-Spray Great Again (Robert Gawlik and Thorsten Holz)
- A Systematic Evaluation of Transient Execution Attacks and Defenses (Claudio Canella et al.)
- Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives (Mathy Vanhoef and Frank Piessens)
- An Empirical Analysis of Anonymity in Zcash (George Kappos et al.)
- Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus (Joseph Bonneau)
- Conciousness Engineered (Michael S.A. Graziano)
2018
- Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion (Stefan Savage)
- Proof-of-Stake (Janno Siim)
- A Systematic Approach To Cryptocurrency Fees (Alexander Chepurnoy et al.)
- Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) (Carlo Meijer and Bernard van Gastel)
- Auditable, Anonymous Electronic Cash (Tomas Sander and Amnon Ta-Shma)
- Elliptic Curve Cryptography In Practice (Joppe W. Bos et al.)
- The Night Watch (James Mickens)
- Spectre Attacks: Exploiting Speculative Execution (Paul Kocher et al.)
- Meltdown (Moritz Lipp et al.)
2017
- Relationship between Music Preference and Personality Type (Vandana Sharma)
- Short and long-term musical preferences: what makes a favorite peice of music? (Alexandra Lamont and Rebecca Webb)
- Automatic Genre Classification of Music Content (Nicolas Scaringella et al.)
- Factors Influencing Pop Music Preferences of Young People (David Boyle et al.)
- 'I love Rock 'n' Roll'--Music genre preference modulates brain responses to music (Eva Istok et al.)
- fMRI investigation of cross-cultural music comprehension (Steven Morrison et al.)
- Structural integration in language and music: Evidence for a shared system (Evelina Fedorenko et al.)
- The Do Re Mi's of Everyday Life: The Structure and Personality Correlates of Music Preferences (Peter Rentfrow and Samuel Gosling)
- Toward a better understanding of the relation between music preference, listening behavior, and personality (Peter Dunn et al.)
- How Shared Preferences in Music Create Bonds Between People: Values as the Missing Link (Diana Boer et al.)
- From the functions of music to music preference (Thomas Schafer and Peter Sedlmeier)
- Mutual exposure or close peer relationships do not seem to foster increased similarity in food, music, or television program preferences (Paul Rozin et al.)
- Music genre as cognitive schema: extramusical associations with country and hip-hop music (Mark Shevy)
- Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks (Mengjia Yan et al.)
- Modeling Dynamic Identities and Uncertainty in Social Interactions: Bayesian Affect Control Theory (Tobias Schröder)
- Epistemics in Conversation (John Heritage)
- On the reception and detection of pseudo-profound bullshit (Gordon Pennycook et al.)
- Dunning-Kruger effects in reasoning: Therotical implications of the failure to recognize incompetence (Gordon Pennycook et al.)
- Introduction: Rhetorical Figures, Arguments, Computation (Randy Allen Harris et al.)
- A Cognitive Ontology of Rhetorical Figures (Randy Allen Harris et al.)
- A Large-Scale Model of the Functioning Brain (Chris Eliasmith et al.)
- Wise deliberation sustains cooperation (Igor Grossman et al.)
- Wisdom in Context (Igor Grossman)
- Creative Intuition: How Eureka Results from Three Neural Mechanisms (Paul Thagard)
- Artistic Genius and Creative Cognition (Paul Thagard)
- A step at a time: Preliterate children's simulation of narrative movement during story comprehension (Agnieszka M. Fecica and Daniela K. O'Neill)
- Getting Lost in a Book: The Science of Reading Comprehension (Anegla Nyhout et al.)
- Automatic Genre Classification of Music Content (Nicholas Scaringella et al.)
- On the reception and detection of pseudo-profound bullshit (Gordon Pennycook et al.)
- Dunning-Kruger effects in reasoning: Theoretical implications of the failure to recognize incompetence
- Synthbot: An Unsupervised Software Synthesizer Programmer (Matthew Yee-King and Martin Roth)
- Perceptual Distance in Timbre Space (Hiroko Terasawa et al.)
- The property 'instinct' (Jeffery Evans Stake)
- Young Children's Understanding of Ownership (Shaylene E. Naneekivell et al.)
- Creative Intuition: How Eureka Results from Three Neural Mechanisms
- Artistic Genius and Creative Cognition (Paul Thagard)
- Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
- Motivated Numeracy and Enlightened Self-Government (Dan M Kahan et al.)
- When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers (Susan E. McGregor et al.)
- Open Problems in the Philosophy of Information (Luciano Floridi)
- A Large-Scale Model of the Functioning Brain (Chris Eliasmith et al.)
- Using BGP to Acquire Bogus TLS Certificates (Henry Birge-Lee et al.)
- Information as Thing (Michael K. Buckland)
- What is inferrentialism? (Jaroslav Peregrin)
- Method to Protect Passwords in Databases for Web Applications (Scott Contini)
- Music, Language, and Composition (Theodor W. Adorno)
- Adverse Health Effects of Marijuana Use (Nora D. Volkow et al.)
- Dose-related neurocognitive effects of marijuana use (K. I. Bolla et al.)
- Quantum Information Processing Using Quantum Dot Spins and Cavity QED (A. Imamoglu et al.)
- Geiger-mode avalache photodiodes, history, properties and problems (D. Renker)
- The Case for Quantum Key Distribution (Douglas Stebila et al.)
- Attacks on practical quantum key distribution systems (and how to prevent them) (Nitin Jain et al.)
- Secure quantum key distribution (Hoi-Kwong Lo et al.)
- The black paper of quantum cryptography: real implementation problems (Valerio Scarani, Christian Kurtseifer)
- Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography (Artem Vakhitov et al.)
- Provably secure and practical quantum key distribution over 307km of optical fibre (Boris Korzh et al.)
- Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption (Anqi Huang et al.)
- Random Variation of Detector Efficiency: A Countermeasure against Detector Blinding Attacks for Quantum Key Distribution (Charles Ci et al.)
- Hacking Commercial Quantum Cryptography Systems by Tailored Bright Illumination (Lars Lydersen et al.)
- On Procrastination (John Perry)
- Toward a Broader View of Security Protocols (Matt Blaze)
- Engineering Silicon-Based Photonic Crystal Cavities for NV-Center Quantum Information Processing (C. A. Foell et al.)
- Quantum information processing through quantum dots in slow-light photonic crystal waveguides (C. W. Wong et al.)
- Quantum Private Comparison: A Review (Wenjie Liu et al.)
2016
- Why Philosophers Should Care About Computational Complexity (Scott Aaronson)
- Quantum Advantage Without Entanglement (Dan Kenigsberg et al.)
- How Quantum Computers Can Fail (Gil Kalai)
- Are Quantum States Exponentially Long Vectors? (Scott Aaronson)
- Multilinear Formulas and Skepticism of Quantum Computing (Scott Aaronson)
- The Status of the P versus NP Problem (Lance Fortnow)
- One Complexity Theoreist's View of Quantum Computing (Lance Fortnow)
- Cryptography During the French and American Wars in Vietname (Phan Dương Hiệu and Neal Koblitz)
- Is P Versus NP Formally Independent? (Scott Aaronson)
- On Limited Nondeterminism and ACC Circuit Lower Bounds (Holger Spakowski)
- Uniform Recognition for Acyclic Context-Sensitive Grammars is NP-complete (Erik Aarts)
- Feasible Proofs and Computations: Partnership and Fusion (Alexander A. Razborov)
- Local Reductions (Hamid Jahanjou et al.)
- The Relative Efficiency of Propositional Proof Systems (Stephen Cook and Robert Reckhow)
- Feasible Proofs and Computations: Partnership and Fusion (Alexandar Razborov)
- Time-Space Lower Bounds for Satisfiability (Lance Fortnow, Richard Lipton, and Anastasios Viglas)
- Strong ETH Breaks with Merlin and Arthur: Short Non-Interactive Proofs of Batch Evaluation (Ryan Williams)
- Programming Satan's Computer (Ross Anderson and Roger Needham)
- Quantum Physics and the Identity of Indiscernibles (Steven French and Micahel Redhead)
- Nothingness (Stanford Encyclopedia of Philosophy)
- The Physical Implementation of Quantum Computation (David P. DiVincenzo)
- IP=PSPACE: Simplified Proof (A. Shen)
- IP=PSPACE (Adi Shamir)
- Private Coins versus Public Coins in Interactive Proof Systems (Shafi Goldwasser and Michael Sipser)
- Algebraic Methods for Interactive Proof Systems (Carsten Lund, et al.)
- Turing machines that take advice (Karp and Lipton)
- Alternation (A. Chandra et al.)
- The Spy in the Sandbox - Practical Cache Attacks in Javascript (Yossef Oren, et al.)
- Is the security of quantum cryptography guaranteed by the laws of physics? (Daniel J. Bernstein)
- Hacking Blind (Andrea Bittau et al.)
- Closed timelike curves make quantum and classical computing equivalent (Scott Aaronson, John Watrous)
- Protocol Interactions and the Chosen Protocol Attack (John Kelsey et al.)
- ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs (Genken et al.)
- Defining a Model for Defense-In-Depth (James Sullivan, Michael E. Locasto)
- Causal Boxes: Quantum Information Processing Systems Closed under Composition (Christopher Portmann et al.)
2015
- The Rise and Fall of the Operating System (Antti Kantee)
- The Brave New World of Bodacious Assumptions in Cryptography (Neal Koblitz, Alfred Menezes)
- A Riddle Wrapped in an Enigma (Neal Koblitz, Alfred J. Menezes)
- Asymmetric proof-of-work based on the Generalized Birthday problem (Alex Biryukov, Dmitry Khovratovich)
- Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (David Adrian et al.)
- Is "the theory of everything" merely the ultimate ensemble theory? (Max Tegmark)
- Faster Multicollisions (Jean-Philippe Aumasson)
- On Stake and Consensus (Andrew Poelstra)
- A history of the PCP theorem (Ryan O'Donnell)
- Experiences Deploying a Large-Scale Emergent Network (Bryce Wilcox-O'Hearn)
- The Bugs We Have to Kill (Sergey Bratus et al.)
- Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard (Enes Göktaş et al.)
- Cross-Tenant Side-Channel Attacks in PaaS Clouds (Yinqian Zhang et al.)
- Fast Search in Hamming Space with Multi-Index Hashing (Mohammad Norouzi et al.)
- Towards a Theory of Application Compartmentalization (Robert N.M. Watson et al.)
- Green Lights Forever: Analyzing the Security of Traffic Infrastructure (Branden Ghena et al.)
- Attacking The Linux PRNG on Android (David Kaplan et al.)
- Security Implications of Memory Deduplication in a Virtualized Environment (Jidong Xiao et al.)
- An Exploration of L2 Cache Covert Channels in Virtualized Environments (Yunjing Xu et al.)
- Everything You've Always Wanted To Know About Certificate Validation With OpenSSL (But Were Afraid To Ask) (Alban Diquet)
- Surreptitiously Weakening Cryptographic Systems (Bruce Schneier et al.)
- Memory Deduplication as a Threat to the Guest OS (Kuniyasu Suzaki et al.)
- An Experience Report on Extracting and Viewing Memory Events via Wireshark (Sarah Laing et al.)
- Legal Issues Surrounding Monitoring During Network Research (Paul Ohm, Douglas Sicker, and Dirk Gurnwald)
- Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers (Gang Wang et al.)
- Why Is There No Science in Cyber Science? (Roy Maxion et al.)
- Information Security: Science, Pseudoscience, and Flying Pigs (Roger Schell)
- Heads-up limit hold'em poker is solved (Michael Bowling et al.)
- Cache Games – Brining Access-Based Cache Attacks on AES to Practice (Endre Bangerter, David Gullasch, Stephan Krenn)
2014
- Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage (John Demme et al.)
- Acoustic Side-Channel Attacks on Printers (Michael Backes et al.)
- What is Teaching? (Paul R. Halmos)
- Beware of BGP Attacks (Ola Nordström and Constantinos Dovrolis)
- A Pixel Is Not A Little Square (Alvy Ray Smith)
- Security Applications of Formal Language Theory (Len Sassaman et al.)
- The Halting Problem of Network Stack Insecurity (Len Sassaman et al.)
- Why does cryptographic software fail? A case study and open problems (David Lazar et al.)
- Control Flow Integrity for COTS Binaries (Mingwei Zhang and R. Sekar)
- The Misfortunes of a Trio of Mathematicians Using Computer Algebra Systems. Can We Trust in Them? (Antonio J. Durán et al.)
- The Web Never Forgets: Persistent Tracking Mechanisms in the Wild (Gunes Acar et al.)
- Defeat Spyware with Anti-Screen Capture Technology Using Visual Persistence (Johnny Lim)
- A Quick Guide to Organizing Computational Biology Projects (William Stafford Noble)
- The Search for MH370 (Chris Ashton et al.)
- Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation (Sergey Bratus et al.)
- Some thoughts on security after ten years of qmail 1.0 (Daniel J. Bernstein)
- Protection in an Information Processing Utility (Robert M. Graham)
- Protection in Operating Systems (Harrison et al.)
- Protection (Lampson et al.)
- Pretending that Systems Are Secure (S. W. Smith)
- A Geometric Review of Linear Algebra (Eero Simoncelli)
- Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits (Mehran Bozorgi et al.)
- We Need Assurance! (Brian Snow)
- Allen Dulles's 73 Rules of Spycraft (James Srodes)
- What the Tortoise Said to Achilles (Lewis Carroll)
- Gamma error in picture scaling (Eric Brasseur)
- Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance (Aaron Segal et al.)
- Computational Solution to Quantum Foundational Problems (Arkady Bolotin)
- Random-Sample Elections (David Chaum)
- Tezos: A Self-Amending Crypto-Ledger Position Paper (L. M. Goodman)
- (DRAFT) Avoiding a War on Unauthorized Computation: Why Exploit Regulation is the Biggest Danger to Coder Freedom and Future Security (Sergey Bratus, Anna Shubina)
- Leibniz's Mill Argument Against Mechanical Materialism Revisted (Paul Lodge)
- Using Clustering to Detect Chinese Censorware (Becker Polverini, William M. Pottenger)
- The Collateral Damage of Internet Censorship by DNS Injection (Five Anonymous Authors)
- Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations (Nicholas Aase et al.)
- Bypassing Internet Censorship for News Broadcasters (Karl Kathuria)
- Building web applications on top of encrypted data using Mylar (Raluca Ada Popa et al.)
- End-To-End Arguments in System Design (J.H Saltzer et al.)
- Bitcoin: censorship-resistant currency and domain name system to the people (Dušan Barok)
- Framing Signals—A Return to Portable Shellcode (Erik Bosman and Herbert Bos)
- DetecTor (Kai Engert)
- Threema security assessment (Hristo Dimitrov et al.)
- "Ooh Aah... Just a Little Bit" : A small amount of side channel can go a long way (Naomi Benger et al.)
- Programming with D-Wave: Map Coloring Problem (E. D. Dahl)
- I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis (Brad Miller et al.)
- On Reusing Ephemeral Keys in Diffie-Hellman Key Agreement Protocols (Alfred Menezes and Berkant Ustaoglu)
- OONI: Open Observatory of Network Interference
- The ND2DB attack: Database content extraction using attacks on the indexing algorithms (Ariel Futoransky et al.)
- Exposing Private Information by Timing Web Applications (Andrew Bortz et al.)
- Cuckoo Cycle: a memory-hard proof-of-work system (John Tromp)
- Paradigm Regained: Abstraction Mechanisms for Access Control
- eCryptfs: An Enterprise-class Cryptographic Filesystem for Linux (Michael Austin Halcrow)
- Cryptfs: A Stackable Vnode Level Encryption File System (Erez Zadok et al.)
- A Personal View of Average-Case Complexity (Russell Impagliazzo)
- Towards an Ethical Code for Information Security? (Steven J. Greenwald et al.)
2013
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (Daniel Genkin et al.)
- Subversion of Social Movements by Adversarial Agents (Eric L. Nelson)
- Why Chosen Ciphertext Security Matters (Victor Shoup)
- Soil Diversity and Hydration as Observed by ChemCam at Gale Crater, Mars (P. Meslin et al.)
- A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory (Patrick Stewin)
- An Empirical Study of Cryptographic Misuse in Android Applications (Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel)
- Cache Attacks and Countermeasures: the Case of AES (Extended Version) (Dag Arne Osvik et al.)
- Timing Analysis of Keystrokes and Timing Attacks on SSH (Dawn Xiaodong Song et al.)
- Are AES x86 Cache Timing Attacks Still Feasible? (Keaton Mowery et al.)
- A Cache Timing Attack on AES in Virtualization Environments (Michael Weiß et al.)
- Cache Based Remote Timing Attack on the AES (Onur Aciiçmez et al.)
- Practical Timing Side Channel Attacks Against Kernel Space ASLR (Ralf Hund et al.)
- Cache-timing attacks on AES (Daniel J. Bernstein)
- Implementation and Implications of a Stealth Hard-Drive Backdoor (Jonas Zaddach et al.)
- Mitigating Code-Reuse Attacks with Control-Flow Locking (Tyler Bletsch et al.)
- On the Possibility of Gas-Rich Dwarf Galaxies in the Lyman-Alpha Forest (Neil deGrasse Tyson)
- Taking the example of computer systems engineering for the analysis of biological cell systems (Tessa Pronk et al.)
- Chaff: Engineering an Efficient SAT Solver (Matthew W. Moskewicz et al.)
- On the possibility of a major impact on Uranus in the past century (N. D. Tyson et al.)
- Stealthy Dopant-Level Hardware Trojans (Becker et al.)
- Universal security from bits and mips to pools, lakes - and beyond (Arjen K. Lenstra et al.)
- Truncating TLS Connections to Violate Beliefs in Web Applications (Ben Smyth and Alfredo Pironti)
- Multicollisions in iterated hash functions. Application to cascaded constructions. (Atoine Joux)
- Mobile Malware: Why the Traditional AV Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines (Markus Jakobsson, Guy Stewart)
- mov is Turing Complete (Stephen Dolan)
- You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger (Evangelos Ladakis et al.)
- FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack (Yuval Yarom, Katrina Falkner)
- Structural Realism: The Best of Both Worlds? (John Worrall)
- Explicit Authentication Response Considered Harmful (Lianying Zhao and Mohammad Mannan)
- Cryptanalysis of the SIMON Family of Block Ciphers (Hoda A. Alkhzaimi, Martin M. Lauridsen)
- Master-Key Cryptosystems (Matt Blaze et al.)
- Towards Efficient Traffic-analysis Resistant Anonymity Networks (Le Blond et al.)
- Catena: A Memory-Consuming Password Scrambler (Forler et al.)
- A Fistful of Bitcoins: Characterizing Payments Among Men with No Names (Meiklejohn et al.)
- How to Write Shared Libraries (Ulrich Drepper)
- Cheating the ELF: Subversive Dynamic Linking to Libraries (the grugq)
- Dissent in Numbers: Making Strong Anonymity Scale (Wolinsky et al.)
- XFI: Software Guards for System Address Spaces (Erlingsson et al.)
- Language-Independent Sandboxing of Just-In-Time Compilation and Self-Modifying Code (Jason Ansel, Petr Marchenko)
- An Oblivious Password Cracking Server (Calvo et al.)
- BREACH: Reviving the Crime Attack (Gluck et al.)
- Church's thesis meets the N-body problem (Warren D. Smith)
- On Protection by Layout Randomization (Bartin Abadi, Gordon Plotkin)
- Security and Privacy Considerations in Digital Death (Locasto et al.)
- The security impact of a new cryptographic library (Bernstein et al.)
- Magazines and Vmem: Extending the Slab Allocator to Many CPUs and Arbitrary Resources (Jeff Bonwick, Jonathan Adams)
- PEBIL: Efficient Static Binary Instrumentation for Linux (Laurenzano et al.)
- An API for Runtime Code Patching (Bryan Buck, Jeffery K. Hollingsworth) (The DynInst API)
- PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture (Schwarz et al.)
- Impeding Malware Analysis Using Conditional Code Obfuscation (Sharif et al.)
- Obfuscation of Executable Code to Improve Resistance to Static Disassembly (Cullen Linn, Saumya Debray)
- Dissecting Android Malware: Characterization and Evolution (Yajin Zhou, Xuxian Jiang)
- A fistful of red-pills: How to automatically generate procedures to detect CPU emulators (Paleari et al.)
- ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection (Bangert et al.)
- Native Client: A Sandbox for Portable, Untrusted x86 Native Code (Yee et al.)
- Graphical Passwords: Learning from the First Twelve Years (Biddle et al.)
- Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 (Daniel Bleichenbacher)
- Jump-Oriented Programming: A New Class of Code-Reuse Attack (Bletsch et al.)
- BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection (Gu et al.)
- kBouncer: Efficient and Transparent ROP Mitigation (Vasilis Pappas)
- Remote Timing Attacks are Practical (David Brumley, Dan Boneh)
- Secure Execution via Program Shepherding (Kiriansky et al.)
- QEMU, a Fast and Portable Dynamic Translator (Fabrice Bellard)
- Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization (Pappas et al.)
- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms (Bratus et al.)
- Composition Patterns of Hacking (Bratus et al.)
- Reliable Research: Towards Experimental Standards for Computer Science (Justin Zobel)
- Control-Flow Integrity (Abadi et al.)
- Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns (Jonathan Pincus, Brandon Baker)
- Return-Oriented Programming: Systems, Languages, and Applications (Roemer et al.)
- Countering Code-Injection Attacks with Instruction-Set Randomization (Kc et al.)
- Honeywords: Making Password-Cracking Detectable (Ari Juels, Ronald L. Rivest)
- Vx32: Lightweight User-level Sandboxing on the x86 (Bryan Ford, Russ Cox)
- Q: Exploit Hardening Made Easy (Schwartz et al.)
- Non-Control-Data Attacks are Realistic Threats (Chen et al.)
Magazines, E-Zines & Other
- Google Infrastructure Security Design Overview
- How to write proofs: a quick guide (Eugenia Cheng)
- Polynomial Time and Extravagant Models (Leonid Levin)
- PHYS771 Lecture 14: Skepticism of Quantum Computing (Scott Aaronson)
- Break a dozen secret keys, get a million more for free (Daniel J. Bernstein)
- True Names (Vernor Vinge)
- The Judgement of the Birds (Loren Eiseley)
- How To Benchmark Code Execution Times on Intel IA-32 and IA-64 Instruction Set Architectures (Gabriele Paoloni)
- Politics and the English Language (George Orwell)
- Don't Call Yourself A Programmer, And Other Career Advice
- Mr. X by Carl Sagan
- 2600 Winter 2013-2014
- National Geographic February 2014
- JSOU Report 12-3: Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations, Chapter 3
- Megamos Crypto, Responsible Disclosure, and the Chilling Effect of Volkswagen Aktiengesellschaft vs Garcia, et al (Robert Carolina, Kenneth G. Paterson)
- An untitled paper from Intel on cache
- International Journal of PoC || GTFO: Issue 0x00
- International Journal of PoC || GTFO: Issue 0x01
- International Journal of PoC || GTFO: Issue 0x02
- International Journal of PoC || GTFO: Issue 0x03
- Smashing The Stack For Fun And Profit (Aleph One)
- The Conscience of a Hacker (Hacker's Manifesto) by The Mentor
- Phrack Issue #1 to #5
- Gitmo Is Killing Me (New York Times)
- Notation Guide For Precalculus and Calculus Students (Sean Raleigh)
- RFC 1036 - Standard for Interchange of USENET Messages
- RFC 5869 - HMAC-based Extract-and-Expand Key Derivation Function
- Scientific American Volume 310, Number 5
- American Scientist
- Volume 102 Number 2
- Volume 102 Number 3