446

Reading List

This is a mostly-complete list of things that I have (partially) read. The goal is for this to act as a "bibliography" citing the sources of some of my knowledge. It might also be useful if you're looking for something interesting to read. My favorites are highlighted in bold text.

2020

2019

  • Why Buddhism Is True (Robert Wright)
  • Why Evolution Is True (Jerry A. Coyne)
  • The Theoretical Minimum (Leonard Susskind and George Hrabovsky)
  • Every Tool's a Hammer (Adam Savage)
  • The Internet of Money Volume One (Andreas M. Antonopoulos)
  • The Meaning of It All (Richard P. Feynman)
  • Musicophilia: Tales of Music and the Brain (Oliver Sacks)
  • A Scientist's Guide to Talking With The Media (Richard Hayes and Daniel Grossman)
  • To Engineer Is Human: The Role of Failure in Successful Design (Henry Petroski)
  • How To Change Your Mind (Michael Pollan)
  • Unauthorized Access: Physical Penetration Testing for IT Security Teams (Will Allsopp)
  • The Lost Art of High-Performance Driving (Ross Bentley)
  • Harmony for Computer Musicians; Ch. 1-11 (Michael Hewitt)

2018

  • Click Here to Kill Everybody (Bruce Schneier)
  • The Psychology of Music (Elizabeth Hellmuth Margulis)
  • Zero Trust Networks (Evan Gilman and Doug Barth)
  • Brain on Fire (Susannah Cahalan)
  • The Illustrated A Brief History of Time (Stephen Hawking)
  • Reality Is Not What It Seems (Carlo Rovelli)
  • The Fabric of Reality (David Deutsch)
  • Astrophysics for People in a Hurry (Neil deGrasse Tyson)
  • Composition for Computer Musicians (Michael Hewitt)
  • Mixing Secrets for the Small Studio (Mike Senior)
  • Ableton Live 9 Reference Manual

2017

  • Making Music: 74 Creative Strategies for Electronic Music Producers (Dennis DeSantis)
  • The Man Who Mistook His Wife For a Hat (Oliver Sacks)
  • Mixing Secrets For the Small Studio (Mike Senior)
  • The Black Hole War (Stephen Hawking)
  • QED: The Strange Theory of Light and Matter (Richard Feynman)
  • Quantum Information Theory & the Foundations of Quantum Mechanics (Christopher G. Timpson)
  • Music Theory for Computer Musicians (Michael Hewitt)
  • Musimathics (Gareth Loy)
  • Dance Music Manual (Michael Hewitt)
  • Creating Mind (John E. Dowling)
  • The Quantum Age (Brian Clegg)
  • The Big Picture (Sean Carroll)
  • I Am A Strange Loop (Douglas Hofstadter)

2016

  • Computational Complexity: A Modern Approach (Arora and Barak)
  • The Architecture of Language (Noam Chomsky)
  • Meditations on First Philosophy (René Descartes)
  • Sound: A Very Short Introduction (Mike Goldsmith)
  • Chemistry Essentials for Dummies (John T. Moore)
  • In Defense of Evil: Why Good Is Bad and Bad Is Good (Terroja Kincaid)
  • Frankenstein (Mary Shelley)
  • Free Will (Sam Harris)
  • The Hidden Reality (Brian Greene)

2015

  • The Art of Strategy (Avinash K. Dixit and Barry J. Nalebuff)
  • Computing with Quantum Cats (John Gribbin)
  • Quantum Computing Since Democritus (Scott Aaronson)
  • A PhD is Not Enough (Peter J. Feibelman)
  • Our Mathematical Universe (Max Tegmark)
  • Canadian Red Cross First Aid & CPR Manual
  • Qube: Questions of Being (Unknown)
  • The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto (Phil Champagne)
  • Mastering Bitcoin (Andreas M. Antonopoulos)
  • A Tour of C++ (Bjarne Stroustrup)
  • Intuition Pumps and Other Tools for Thinking (Daniel C. Dennett)
  • Metaphysics: A Very Short Introduction (Stephen Mumford)
  • Flatland: A Romance of Many Dimensions (Edwin A. Abbott)
  • Getting to Yes: Negotiating an agreement without giving in (Fisher and Ury)
  • The Unpersuadables: Adventures with the Enemies of Science (Will Storr)
  • Gray Hat Python (Justin Seitz)
  • Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (Gabriella Coleman)
  • The Climate Crisis: An Introductory Guide to Climate Change (David Archer, Stefan Rahmstorf)
  • The Martian (Andy Weir)

2014

  • You Are Here: Around the World in 92 Minutes (Chris Hadfield)
  • What the Bleep do we Know? (William Arntz et al.) (Warning: It's Bullshit)
  • Getting Started with Memcached (Ahmed Soliman)
  • Linear Algebra With Applications (Nicholson)
  • Calculus (Spivak)
  • Natural Disasters, 2nd Canadian Edition (Abbott, Samson)
  • Alice's Adventures in Wonderland (Lewis Carrol)
  • Music Theory for Dummies (Michael Pilhofer, Holly Day)
  • Out Of Their Minds (Dennis Shasha, Cathy Lazere)
  • Waking Up (Sam Harris)
  • The History of Science (Audiobook) (Peter Whitfield)
  • You've Got Some Explaining To Do (Jane Nevins)
  • Conciousness Explained (Daniel C. Dennett)
  • The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman (Richard Feynman)
  • The Dragons of Eden: Speculations on the Evolution of Human Intelligence (Carl Sagan)
  • The Man Who Knew Too Much: Alan Turing and The Invention of the Computer (David Leavitt)
  • Distributed Systems for Fun and Profit (Mikito Takada)
  • Selected Chapters from Anton: Elementary Linear Algebra, 8th Edition (Custom print for University of Calgary)
  • Harry Potter and the Deathly Hallows (J. K. Rowling)
  • No Place to Hide (Glenn Greenwald)
  • Feynman's Tips On Physics (Richard Feynman, Michael A. Gottleib, Ralph Leighton)
  • The Art of War (Sun Tzu)
  • Death By Black Hole (Neil DeGrasse Tyson)
  • Rocks & Minerals (Dr. R. F. Symes)
  • A Universe From Nothing (Lawrence M. Krauss)
  • Feynman Lectures on Computation (Richard Feynman)

2013

  • On the Origin of Species By Means of Natural Selection (Charles Darwin)
  • Time Reborn (Lee Smolin)
  • Surely You're Joking, Mr. Feynman! (Richard Feynman)
  • The Ancestor's Tale (Richard Dawkins)
  • How to Win Friends & Influence People (Dale Carnegie)
  • Auto Fundamentals (Stockel, Stockel, and Johanson)
  • A Mathematician's Lament (Paul Lockhart)
  • The Anarchist Cookbook (William Powell)
  • A Guide To Kernel Exploitation
  • Philosophy of Science (Curd, Cover, Pincock)
  • Cypherpunks (Assange et. al.)
  • The Elements of Moral Philosophy (Rachels)
  • Computer Networking: A Top-Down Approach (Kurose, Ross)
  • Pirate Cinema (Cory Doctorow)
  • God is Not Great (Christopher Hitchens)
  • Pro Git (Scott Chacon)
  • How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace
  • JavaScript: The Good Parts
  • HTML5 Canvas
  • Gödel, Escher, Bach: An Eternal Golden Braid (Douglas Hofstadter)
  • Intel 64 and IA-32 Architectures Software Developer Manual: Volume 1

2012 and Before

  • Introduction to Algorithms (CLRS)
  • Cryptography Engineering
  • Understanding Cryptography (Paar, Pelzl)
  • Applied Cryptography (Schneier)
  • Cryptography Theory and Practice (Stinson)
  • Seven Deadliest Web Application Attacks
  • Numerical Methods Using Matlab
  • Essential PHP Security
  • Practical Lock Picking
  • Computability and Logic (Boolos)
  • Writing for Computer Science
  • Discrete Mathematics with Applications
  • The Ruby Programming Language
  • C++ For Dummies
  • Understanding the Linux Kernel
  • Hacking For Dummies
  • Networking For Dummies
  • Ghost in the wires (Mitnick)
  • The art of deception (Mitnick)
  • Peter Norton's Inside the PC
  • The C Programming Language (K&R)
  • HTML, XTHML, & CSS (Castro)
  • SPARC Architecture, Assembly Language Programming, and C
  • Statistics (Freedman, Pisani, Purves)
  • HACKING - The Art of Exploitation
  • The Standard C Library
  • The God Delusion (Dawkins)
  • The Magic Of Reality
  • Little Brother (Cory Doctorow)
  • Nineteen Eighty Four (George Orwell)
  • Quantum Computing (Reiffel, Polak) (no i don't understand this at all)
  • Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin)
  • Structured Computer Organization (Andrew S. Tanenbaum)
  • Agile Web Development With Rails (Sam Ruby, Dave Thomas, David Hansson)
  • Assembly Language for x86 Processors (Kip Irvine)
  • The Essentials of Technical Communication (Elizabeth Tebeaux, Sam Dragga)
  • Daemon (Daniel Suarez)
  • Freedom (Daniel Suarez)
  • Last Words (George Carlin)
  • When Will Jesus Bring The Porkchops (George Carlin)
  • The Black Hole War (Leonard Susskind)
  • 13 Things That Don't Make Sense (Michael Brooks)
  • Physics of the Impossible (Michio Kaku)
  • On Intelligence (Jeff Hawkins)
  • The Selfish Gene (Richard Dawkins)
  • Man of La Mancha
  • The War of the Worlds (H. G. Wells)
  • Stealing the Network: How to Own the Box
  • Stealing the Network: How to Own an Identity
  • Stealing the Network: How to Own A Continent
  • A Brief History of Time (Stephen Hawking)

Papers

2020

  • Survey on anonymous communications in computer networks (Jian Ren and Jie Wu)
  • Responsible Vulnerability Disclosure in Cryptocurrencies (Rainer Böhme et al.)
  • XRD: Scalable Messaging System with Cryptographic Privacy (Albert Kwon et al.)
  • On Privacy Notions in Anonymous Communication (Christine Kuhn et al.)
  • ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments (Sajin Sasy and Ian Goldberg)
  • k-Anonymity: A Model for Protecting Privacy (Latanya Sweeney)
  • Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology (Andreas Pfitzmann and Marit Köhntopp)
  • The Basics of Brain Development (Joan Stiles and Terry L. Jernigan)
  • Struggling to be a person: Lived experience of avoidant personality disorder (Kristine D. Sorensen et al.)

2019

  • Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems (Takeshi Sugawara et al.)
  • Quantum Supremacy Using a Programmable Superconducting Processor (Eleanor G. Rieffel)
  • Exterminate All Operating System Abstractions (Dawson R. Engler and M. Frans Kaashoek)
  • A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World (Al Bessey et al.)
  • Touching The Untouchables: Dynamic Security Analysis of the LTE Control Plane (Hongil Kim et al.)
  • Deanonymization of clients in Bitcoin P2P network (Alex Biryukov et al.)
  • Survivable Key Compromise in Software Update Systems (Justin Samuel et al.)
  • A Survey on the Security of Blockchain Systems (Xiaoqi Li et al.)
  • Blockchain challenges and opportunities: a survey (Zibin Zheng et al.)
  • Coda: Decentralized cryptocurrency at scale (Izaak Meckler and Evan Shapiro)
  • Harmony Technical Whitepaper (Harmony Team)
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations (Eyal Ronen et al.)
  • NetSpectre: Read Arbitrary Memory over Network (Michael Schwarz)
  • Basic Attention Token (BAT) (Brave Software)
  • Eclipse Attacks on Bitcoin's Peer-to-Peer Network (Ethan Heilman et al.)
  • SoK: Make JIT-Spray Great Again (Robert Gawlik and Thorsten Holz)
  • A Systematic Evaluation of Transient Execution Attacks and Defenses (Claudio Canella et al.)
  • Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives (Mathy Vanhoef and Frank Piessens)
  • An Empirical Analysis of Anonymity in Zcash (George Kappos et al.)
  • Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus (Joseph Bonneau)
  • Conciousness Engineered (Michael S.A. Graziano)

2018

  • Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion (Stefan Savage)
  • Proof-of-Stake (Janno Siim)
  • A Systematic Approach To Cryptocurrency Fees (Alexander Chepurnoy et al.)
  • Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) (Carlo Meijer and Bernard van Gastel)
  • Auditable, Anonymous Electronic Cash (Tomas Sander and Amnon Ta-Shma)
  • Elliptic Curve Cryptography In Practice (Joppe W. Bos et al.)
  • The Night Watch (James Mickens)
  • Spectre Attacks: Exploiting Speculative Execution (Paul Kocher et al.)
  • Meltdown (Moritz Lipp et al.)

2017

  • Relationship between Music Preference and Personality Type (Vandana Sharma)
  • Short and long-term musical preferences: what makes a favorite peice of music? (Alexandra Lamont and Rebecca Webb)
  • Automatic Genre Classification of Music Content (Nicolas Scaringella et al.)
  • Factors Influencing Pop Music Preferences of Young People (David Boyle et al.)
  • 'I love Rock 'n' Roll'--Music genre preference modulates brain responses to music (Eva Istok et al.)
  • fMRI investigation of cross-cultural music comprehension (Steven Morrison et al.)
  • Structural integration in language and music: Evidence for a shared system (Evelina Fedorenko et al.)
  • The Do Re Mi's of Everyday Life: The Structure and Personality Correlates of Music Preferences (Peter Rentfrow and Samuel Gosling)
  • Toward a better understanding of the relation between music preference, listening behavior, and personality (Peter Dunn et al.)
  • How Shared Preferences in Music Create Bonds Between People: Values as the Missing Link (Diana Boer et al.)
  • From the functions of music to music preference (Thomas Schafer and Peter Sedlmeier)
  • Mutual exposure or close peer relationships do not seem to foster increased similarity in food, music, or television program preferences (Paul Rozin et al.)
  • Music genre as cognitive schema: extramusical associations with country and hip-hop music (Mark Shevy)
  • Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks (Mengjia Yan et al.)
  • Modeling Dynamic Identities and Uncertainty in Social Interactions: Bayesian Affect Control Theory (Tobias Schröder)
  • Epistemics in Conversation (John Heritage)
  • On the reception and detection of pseudo-profound bullshit (Gordon Pennycook et al.)
  • Dunning-Kruger effects in reasoning: Therotical implications of the failure to recognize incompetence (Gordon Pennycook et al.)
  • Introduction: Rhetorical Figures, Arguments, Computation (Randy Allen Harris et al.)
  • A Cognitive Ontology of Rhetorical Figures (Randy Allen Harris et al.)
  • A Large-Scale Model of the Functioning Brain (Chris Eliasmith et al.)
  • Wise deliberation sustains cooperation (Igor Grossman et al.)
  • Wisdom in Context (Igor Grossman)
  • Creative Intuition: How Eureka Results from Three Neural Mechanisms (Paul Thagard)
  • Artistic Genius and Creative Cognition (Paul Thagard)
  • A step at a time: Preliterate children's simulation of narrative movement during story comprehension (Agnieszka M. Fecica and Daniela K. O'Neill)
  • Getting Lost in a Book: The Science of Reading Comprehension (Anegla Nyhout et al.)
  • Automatic Genre Classification of Music Content (Nicholas Scaringella et al.)
  • On the reception and detection of pseudo-profound bullshit (Gordon Pennycook et al.)
  • Dunning-Kruger effects in reasoning: Theoretical implications of the failure to recognize incompetence
  • Synthbot: An Unsupervised Software Synthesizer Programmer (Matthew Yee-King and Martin Roth)
  • Perceptual Distance in Timbre Space (Hiroko Terasawa et al.)
  • The property 'instinct' (Jeffery Evans Stake)
  • Young Children's Understanding of Ownership (Shaylene E. Naneekivell et al.)
  • Creative Intuition: How Eureka Results from Three Neural Mechanisms
  • Artistic Genius and Creative Cognition (Paul Thagard)
  • Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
  • Motivated Numeracy and Enlightened Self-Government (Dan M Kahan et al.)
  • When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers (Susan E. McGregor et al.)
  • Open Problems in the Philosophy of Information (Luciano Floridi)
  • A Large-Scale Model of the Functioning Brain (Chris Eliasmith et al.)
  • Using BGP to Acquire Bogus TLS Certificates (Henry Birge-Lee et al.)
  • Information as Thing (Michael K. Buckland)
  • What is inferrentialism? (Jaroslav Peregrin)
  • Method to Protect Passwords in Databases for Web Applications (Scott Contini)
  • Music, Language, and Composition (Theodor W. Adorno)
  • Adverse Health Effects of Marijuana Use (Nora D. Volkow et al.)
  • Dose-related neurocognitive effects of marijuana use (K. I. Bolla et al.)
  • Quantum Information Processing Using Quantum Dot Spins and Cavity QED (A. Imamoglu et al.)
  • Geiger-mode avalache photodiodes, history, properties and problems (D. Renker)
  • The Case for Quantum Key Distribution (Douglas Stebila et al.)
  • Attacks on practical quantum key distribution systems (and how to prevent them) (Nitin Jain et al.)
  • Secure quantum key distribution (Hoi-Kwong Lo et al.)
  • The black paper of quantum cryptography: real implementation problems (Valerio Scarani, Christian Kurtseifer)
  • Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography (Artem Vakhitov et al.)
  • Provably secure and practical quantum key distribution over 307km of optical fibre (Boris Korzh et al.)
  • Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption (Anqi Huang et al.)
  • Random Variation of Detector Efficiency: A Countermeasure against Detector Blinding Attacks for Quantum Key Distribution (Charles Ci et al.)
  • Hacking Commercial Quantum Cryptography Systems by Tailored Bright Illumination (Lars Lydersen et al.)
  • On Procrastination (John Perry)
  • Toward a Broader View of Security Protocols (Matt Blaze)
  • Engineering Silicon-Based Photonic Crystal Cavities for NV-Center Quantum Information Processing (C. A. Foell et al.)
  • Quantum information processing through quantum dots in slow-light photonic crystal waveguides (C. W. Wong et al.)
  • Quantum Private Comparison: A Review (Wenjie Liu et al.)

2016

  • Why Philosophers Should Care About Computational Complexity (Scott Aaronson)
  • Quantum Advantage Without Entanglement (Dan Kenigsberg et al.)
  • How Quantum Computers Can Fail (Gil Kalai)
  • Are Quantum States Exponentially Long Vectors? (Scott Aaronson)
  • Multilinear Formulas and Skepticism of Quantum Computing (Scott Aaronson)
  • The Status of the P versus NP Problem (Lance Fortnow)
  • One Complexity Theoreist's View of Quantum Computing (Lance Fortnow)
  • Cryptography During the French and American Wars in Vietname (Phan Dương Hiệu and Neal Koblitz)
  • Is P Versus NP Formally Independent? (Scott Aaronson)
  • On Limited Nondeterminism and ACC Circuit Lower Bounds (Holger Spakowski)
  • Uniform Recognition for Acyclic Context-Sensitive Grammars is NP-complete (Erik Aarts)
  • Feasible Proofs and Computations: Partnership and Fusion (Alexander A. Razborov)
  • Local Reductions (Hamid Jahanjou et al.)
  • The Relative Efficiency of Propositional Proof Systems (Stephen Cook and Robert Reckhow)
  • Feasible Proofs and Computations: Partnership and Fusion (Alexandar Razborov)
  • Time-Space Lower Bounds for Satisfiability (Lance Fortnow, Richard Lipton, and Anastasios Viglas)
  • Strong ETH Breaks with Merlin and Arthur: Short Non-Interactive Proofs of Batch Evaluation (Ryan Williams)
  • Programming Satan's Computer (Ross Anderson and Roger Needham)
  • Quantum Physics and the Identity of Indiscernibles (Steven French and Micahel Redhead)
  • Nothingness (Stanford Encyclopedia of Philosophy)
  • The Physical Implementation of Quantum Computation (David P. DiVincenzo)
  • IP=PSPACE: Simplified Proof (A. Shen)
  • IP=PSPACE (Adi Shamir)
  • Private Coins versus Public Coins in Interactive Proof Systems (Shafi Goldwasser and Michael Sipser)
  • Algebraic Methods for Interactive Proof Systems (Carsten Lund, et al.)
  • Turing machines that take advice (Karp and Lipton)
  • Alternation (A. Chandra et al.)
  • The Spy in the Sandbox - Practical Cache Attacks in Javascript (Yossef Oren, et al.)
  • Is the security of quantum cryptography guaranteed by the laws of physics? (Daniel J. Bernstein)
  • Hacking Blind (Andrea Bittau et al.)
  • Closed timelike curves make quantum and classical computing equivalent (Scott Aaronson, John Watrous)
  • Protocol Interactions and the Chosen Protocol Attack (John Kelsey et al.)
  • ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs (Genken et al.)
  • Defining a Model for Defense-In-Depth (James Sullivan, Michael E. Locasto)
  • Causal Boxes: Quantum Information Processing Systems Closed under Composition (Christopher Portmann et al.)

2015

  • The Rise and Fall of the Operating System (Antti Kantee)
  • The Brave New World of Bodacious Assumptions in Cryptography (Neal Koblitz, Alfred Menezes)
  • A Riddle Wrapped in an Enigma (Neal Koblitz, Alfred J. Menezes)
  • Asymmetric proof-of-work based on the Generalized Birthday problem (Alex Biryukov, Dmitry Khovratovich)
  • Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (David Adrian et al.)
  • Is "the theory of everything" merely the ultimate ensemble theory? (Max Tegmark)
  • Faster Multicollisions (Jean-Philippe Aumasson)
  • On Stake and Consensus (Andrew Poelstra)
  • A history of the PCP theorem (Ryan O'Donnell)
  • Experiences Deploying a Large-Scale Emergent Network (Bryce Wilcox-O'Hearn)
  • The Bugs We Have to Kill (Sergey Bratus et al.)
  • Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard (Enes Göktaş et al.)
  • Cross-Tenant Side-Channel Attacks in PaaS Clouds (Yinqian Zhang et al.)
  • Fast Search in Hamming Space with Multi-Index Hashing (Mohammad Norouzi et al.)
  • Towards a Theory of Application Compartmentalization (Robert N.M. Watson et al.)
  • Green Lights Forever: Analyzing the Security of Traffic Infrastructure (Branden Ghena et al.)
  • Attacking The Linux PRNG on Android (David Kaplan et al.)
  • Security Implications of Memory Deduplication in a Virtualized Environment (Jidong Xiao et al.)
  • An Exploration of L2 Cache Covert Channels in Virtualized Environments (Yunjing Xu et al.)
  • Everything You've Always Wanted To Know About Certificate Validation With OpenSSL (But Were Afraid To Ask) (Alban Diquet)
  • Surreptitiously Weakening Cryptographic Systems (Bruce Schneier et al.)
  • Memory Deduplication as a Threat to the Guest OS (Kuniyasu Suzaki et al.)
  • An Experience Report on Extracting and Viewing Memory Events via Wireshark (Sarah Laing et al.)
  • Legal Issues Surrounding Monitoring During Network Research (Paul Ohm, Douglas Sicker, and Dirk Gurnwald)
  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers (Gang Wang et al.)
  • Why Is There No Science in Cyber Science? (Roy Maxion et al.)
  • Information Security: Science, Pseudoscience, and Flying Pigs (Roger Schell)
  • Heads-up limit hold'em poker is solved (Michael Bowling et al.)
  • Cache Games – Brining Access-Based Cache Attacks on AES to Practice (Endre Bangerter, David Gullasch, Stephan Krenn)

2014

  • Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage (John Demme et al.)
  • Acoustic Side-Channel Attacks on Printers (Michael Backes et al.)
  • What is Teaching? (Paul R. Halmos)
  • Beware of BGP Attacks (Ola Nordström and Constantinos Dovrolis)
  • A Pixel Is Not A Little Square (Alvy Ray Smith)
  • Security Applications of Formal Language Theory (Len Sassaman et al.)
  • The Halting Problem of Network Stack Insecurity (Len Sassaman et al.)
  • Why does cryptographic software fail? A case study and open problems (David Lazar et al.)
  • Control Flow Integrity for COTS Binaries (Mingwei Zhang and R. Sekar)
  • The Misfortunes of a Trio of Mathematicians Using Computer Algebra Systems. Can We Trust in Them? (Antonio J. Durán et al.)
  • The Web Never Forgets: Persistent Tracking Mechanisms in the Wild (Gunes Acar et al.)
  • Defeat Spyware with Anti-Screen Capture Technology Using Visual Persistence (Johnny Lim)
  • A Quick Guide to Organizing Computational Biology Projects (William Stafford Noble)
  • The Search for MH370 (Chris Ashton et al.)
  • Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation (Sergey Bratus et al.)
  • Some thoughts on security after ten years of qmail 1.0 (Daniel J. Bernstein)
  • Protection in an Information Processing Utility (Robert M. Graham)
  • Protection in Operating Systems (Harrison et al.)
  • Protection (Lampson et al.)
  • Pretending that Systems Are Secure (S. W. Smith)
  • A Geometric Review of Linear Algebra (Eero Simoncelli)
  • Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits (Mehran Bozorgi et al.)
  • We Need Assurance! (Brian Snow)
  • Allen Dulles's 73 Rules of Spycraft (James Srodes)
  • What the Tortoise Said to Achilles (Lewis Carroll)
  • Gamma error in picture scaling (Eric Brasseur)
  • Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance (Aaron Segal et al.)
  • Computational Solution to Quantum Foundational Problems (Arkady Bolotin)
  • Random-Sample Elections (David Chaum)
  • Tezos: A Self-Amending Crypto-Ledger Position Paper (L. M. Goodman)
  • (DRAFT) Avoiding a War on Unauthorized Computation: Why Exploit Regulation is the Biggest Danger to Coder Freedom and Future Security (Sergey Bratus, Anna Shubina)
  • Leibniz's Mill Argument Against Mechanical Materialism Revisted (Paul Lodge)
  • Using Clustering to Detect Chinese Censorware (Becker Polverini, William M. Pottenger)
  • The Collateral Damage of Internet Censorship by DNS Injection (Five Anonymous Authors)
  • Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations (Nicholas Aase et al.)
  • Bypassing Internet Censorship for News Broadcasters (Karl Kathuria)
  • Building web applications on top of encrypted data using Mylar (Raluca Ada Popa et al.)
  • End-To-End Arguments in System Design (J.H Saltzer et al.)
  • Bitcoin: censorship-resistant currency and domain name system to the people (Dušan Barok)
  • Framing Signals—A Return to Portable Shellcode (Erik Bosman and Herbert Bos)
  • DetecTor (Kai Engert)
  • Threema security assessment (Hristo Dimitrov et al.)
  • "Ooh Aah... Just a Little Bit" : A small amount of side channel can go a long way (Naomi Benger et al.)
  • Programming with D-Wave: Map Coloring Problem (E. D. Dahl)
  • I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis (Brad Miller et al.)
  • On Reusing Ephemeral Keys in Diffie-Hellman Key Agreement Protocols (Alfred Menezes and Berkant Ustaoglu)
  • OONI: Open Observatory of Network Interference
  • The ND2DB attack: Database content extraction using attacks on the indexing algorithms (Ariel Futoransky et al.)
  • Exposing Private Information by Timing Web Applications (Andrew Bortz et al.)
  • Cuckoo Cycle: a memory-hard proof-of-work system (John Tromp)
  • Paradigm Regained: Abstraction Mechanisms for Access Control
  • eCryptfs: An Enterprise-class Cryptographic Filesystem for Linux (Michael Austin Halcrow)
  • Cryptfs: A Stackable Vnode Level Encryption File System (Erez Zadok et al.)
  • A Personal View of Average-Case Complexity (Russell Impagliazzo)
  • Towards an Ethical Code for Information Security? (Steven J. Greenwald et al.)

2013

  • RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (Daniel Genkin et al.)
  • Subversion of Social Movements by Adversarial Agents (Eric L. Nelson)
  • Why Chosen Ciphertext Security Matters (Victor Shoup)
  • Soil Diversity and Hydration as Observed by ChemCam at Gale Crater, Mars (P. Meslin et al.)
  • A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory (Patrick Stewin)
  • An Empirical Study of Cryptographic Misuse in Android Applications (Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel)
  • Cache Attacks and Countermeasures: the Case of AES (Extended Version) (Dag Arne Osvik et al.)
  • Timing Analysis of Keystrokes and Timing Attacks on SSH (Dawn Xiaodong Song et al.)
  • Are AES x86 Cache Timing Attacks Still Feasible? (Keaton Mowery et al.)
  • A Cache Timing Attack on AES in Virtualization Environments (Michael Weiß et al.)
  • Cache Based Remote Timing Attack on the AES (Onur Aciiçmez et al.)
  • Practical Timing Side Channel Attacks Against Kernel Space ASLR (Ralf Hund et al.)
  • Cache-timing attacks on AES (Daniel J. Bernstein)
  • Implementation and Implications of a Stealth Hard-Drive Backdoor (Jonas Zaddach et al.)
  • Mitigating Code-Reuse Attacks with Control-Flow Locking (Tyler Bletsch et al.)
  • On the Possibility of Gas-Rich Dwarf Galaxies in the Lyman-Alpha Forest (Neil deGrasse Tyson)
  • Taking the example of computer systems engineering for the analysis of biological cell systems (Tessa Pronk et al.)
  • Chaff: Engineering an Efficient SAT Solver (Matthew W. Moskewicz et al.)
  • On the possibility of a major impact on Uranus in the past century (N. D. Tyson et al.)
  • Stealthy Dopant-Level Hardware Trojans (Becker et al.)
  • Universal security from bits and mips to pools, lakes - and beyond (Arjen K. Lenstra et al.)
  • Truncating TLS Connections to Violate Beliefs in Web Applications (Ben Smyth and Alfredo Pironti)
  • Multicollisions in iterated hash functions. Application to cascaded constructions. (Atoine Joux)
  • Mobile Malware: Why the Traditional AV Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines (Markus Jakobsson, Guy Stewart)
  • mov is Turing Complete (Stephen Dolan)
  • You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger (Evangelos Ladakis et al.)
  • FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack (Yuval Yarom, Katrina Falkner)
  • Structural Realism: The Best of Both Worlds? (John Worrall)
  • Explicit Authentication Response Considered Harmful (Lianying Zhao and Mohammad Mannan)
  • Cryptanalysis of the SIMON Family of Block Ciphers (Hoda A. Alkhzaimi, Martin M. Lauridsen)
  • Master-Key Cryptosystems (Matt Blaze et al.)
  • Towards Efficient Traffic-analysis Resistant Anonymity Networks (Le Blond et al.)
  • Catena: A Memory-Consuming Password Scrambler (Forler et al.)
  • A Fistful of Bitcoins: Characterizing Payments Among Men with No Names (Meiklejohn et al.)
  • How to Write Shared Libraries (Ulrich Drepper)
  • Cheating the ELF: Subversive Dynamic Linking to Libraries (the grugq)
  • Dissent in Numbers: Making Strong Anonymity Scale (Wolinsky et al.)
  • XFI: Software Guards for System Address Spaces (Erlingsson et al.)
  • Language-Independent Sandboxing of Just-In-Time Compilation and Self-Modifying Code (Jason Ansel, Petr Marchenko)
  • An Oblivious Password Cracking Server (Calvo et al.)
  • BREACH: Reviving the Crime Attack (Gluck et al.)
  • Church's thesis meets the N-body problem (Warren D. Smith)
  • On Protection by Layout Randomization (Bartin Abadi, Gordon Plotkin)
  • Security and Privacy Considerations in Digital Death (Locasto et al.)
  • The security impact of a new cryptographic library (Bernstein et al.)
  • Magazines and Vmem: Extending the Slab Allocator to Many CPUs and Arbitrary Resources (Jeff Bonwick, Jonathan Adams)
  • PEBIL: Efficient Static Binary Instrumentation for Linux (Laurenzano et al.)
  • An API for Runtime Code Patching (Bryan Buck, Jeffery K. Hollingsworth) (The DynInst API)
  • PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture (Schwarz et al.)
  • Impeding Malware Analysis Using Conditional Code Obfuscation (Sharif et al.)
  • Obfuscation of Executable Code to Improve Resistance to Static Disassembly (Cullen Linn, Saumya Debray)
  • Dissecting Android Malware: Characterization and Evolution (Yajin Zhou, Xuxian Jiang)
  • A fistful of red-pills: How to automatically generate procedures to detect CPU emulators (Paleari et al.)
  • ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection (Bangert et al.)
  • Native Client: A Sandbox for Portable, Untrusted x86 Native Code (Yee et al.)
  • Graphical Passwords: Learning from the First Twelve Years (Biddle et al.)
  • Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 (Daniel Bleichenbacher)
  • Jump-Oriented Programming: A New Class of Code-Reuse Attack (Bletsch et al.)
  • BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection (Gu et al.)
  • kBouncer: Efficient and Transparent ROP Mitigation (Vasilis Pappas)
  • Remote Timing Attacks are Practical (David Brumley, Dan Boneh)
  • Secure Execution via Program Shepherding (Kiriansky et al.)
  • QEMU, a Fast and Portable Dynamic Translator (Fabrice Bellard)
  • Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization (Pappas et al.)
  • SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms (Bratus et al.)
  • Composition Patterns of Hacking (Bratus et al.)
  • Reliable Research: Towards Experimental Standards for Computer Science (Justin Zobel)
  • Control-Flow Integrity (Abadi et al.)
  • Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns (Jonathan Pincus, Brandon Baker)
  • Return-Oriented Programming: Systems, Languages, and Applications (Roemer et al.)
  • Countering Code-Injection Attacks with Instruction-Set Randomization (Kc et al.)
  • Honeywords: Making Password-Cracking Detectable (Ari Juels, Ronald L. Rivest)
  • Vx32: Lightweight User-level Sandboxing on the x86 (Bryan Ford, Russ Cox)
  • Q: Exploit Hardening Made Easy (Schwartz et al.)
  • Non-Control-Data Attacks are Realistic Threats (Chen et al.)

Magazines, E-Zines & Other

  • Google Infrastructure Security Design Overview
  • How to write proofs: a quick guide (Eugenia Cheng)
  • Polynomial Time and Extravagant Models (Leonid Levin)
  • PHYS771 Lecture 14: Skepticism of Quantum Computing (Scott Aaronson)
  • Break a dozen secret keys, get a million more for free (Daniel J. Bernstein)
  • True Names (Vernor Vinge)
  • The Judgement of the Birds (Loren Eiseley)
  • How To Benchmark Code Execution Times on Intel IA-32 and IA-64 Instruction Set Architectures (Gabriele Paoloni)
  • Politics and the English Language (George Orwell)
  • Don't Call Yourself A Programmer, And Other Career Advice
  • Mr. X by Carl Sagan
  • 2600 Winter 2013-2014
  • National Geographic February 2014
  • JSOU Report 12-3: Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations, Chapter 3
  • Megamos Crypto, Responsible Disclosure, and the Chilling Effect of Volkswagen Aktiengesellschaft vs Garcia, et al (Robert Carolina, Kenneth G. Paterson)
  • An untitled paper from Intel on cache
  • International Journal of PoC || GTFO: Issue 0x00
  • International Journal of PoC || GTFO: Issue 0x01
  • International Journal of PoC || GTFO: Issue 0x02
  • International Journal of PoC || GTFO: Issue 0x03
  • Smashing The Stack For Fun And Profit (Aleph One)
  • The Conscience of a Hacker (Hacker's Manifesto) by The Mentor
  • Phrack Issue #1 to #5
  • Gitmo Is Killing Me (New York Times)
  • Notation Guide For Precalculus and Calculus Students (Sean Raleigh)
  • RFC 1036 - Standard for Interchange of USENET Messages
  • RFC 5869 - HMAC-based Extract-and-Expand Key Derivation Function
  • Scientific American Volume 310, Number 5
  • American Scientist
    • Volume 102 Number 2
    • Volume 102 Number 3