462

Reading List

This is a mostly-complete list of things that I have (partially) read. The goal is for this to act as a "bibliography" citing the sources of some of my knowledge. It might also be useful if you're looking for something interesting to read. My favorites are highlighted in bold text.

2021

2020

2019

  • Why Buddhism Is True (Robert Wright)
  • Why Evolution Is True (Jerry A. Coyne)
  • The Theoretical Minimum (Leonard Susskind and George Hrabovsky)
  • Every Tool's a Hammer (Adam Savage)
  • The Internet of Money Volume One (Andreas M. Antonopoulos)
  • The Meaning of It All (Richard P. Feynman)
  • Musicophilia: Tales of Music and the Brain (Oliver Sacks)
  • A Scientist's Guide to Talking With The Media (Richard Hayes and Daniel Grossman)
  • To Engineer Is Human: The Role of Failure in Successful Design (Henry Petroski)
  • How To Change Your Mind (Michael Pollan)
  • Unauthorized Access: Physical Penetration Testing for IT Security Teams (Will Allsopp)
  • The Lost Art of High-Performance Driving (Ross Bentley)
  • Harmony for Computer Musicians; Ch. 1-11 (Michael Hewitt)

2018

  • Click Here to Kill Everybody (Bruce Schneier)
  • The Psychology of Music (Elizabeth Hellmuth Margulis)
  • Zero Trust Networks (Evan Gilman and Doug Barth)
  • Brain on Fire (Susannah Cahalan)
  • The Illustrated A Brief History of Time (Stephen Hawking)
  • Reality Is Not What It Seems (Carlo Rovelli)
  • The Fabric of Reality (David Deutsch)
  • Astrophysics for People in a Hurry (Neil deGrasse Tyson)
  • Composition for Computer Musicians (Michael Hewitt)
  • Mixing Secrets for the Small Studio (Mike Senior)
  • Ableton Live 9 Reference Manual

2017

  • Making Music: 74 Creative Strategies for Electronic Music Producers (Dennis DeSantis)
  • The Man Who Mistook His Wife For a Hat (Oliver Sacks)
  • Mixing Secrets For the Small Studio (Mike Senior)
  • The Black Hole War (Stephen Hawking)
  • QED: The Strange Theory of Light and Matter (Richard Feynman)
  • Quantum Information Theory & the Foundations of Quantum Mechanics (Christopher G. Timpson)
  • Music Theory for Computer Musicians (Michael Hewitt)
  • Musimathics (Gareth Loy)
  • Dance Music Manual (Michael Hewitt)
  • Creating Mind (John E. Dowling)
  • The Quantum Age (Brian Clegg)
  • The Big Picture (Sean Carroll)
  • I Am A Strange Loop (Douglas Hofstadter)

2016

  • Computational Complexity: A Modern Approach (Arora and Barak)
  • The Architecture of Language (Noam Chomsky)
  • Meditations on First Philosophy (René Descartes)
  • Sound: A Very Short Introduction (Mike Goldsmith)
  • Chemistry Essentials for Dummies (John T. Moore)
  • In Defense of Evil: Why Good Is Bad and Bad Is Good (Terroja Kincaid)
  • Frankenstein (Mary Shelley)
  • Free Will (Sam Harris)
  • The Hidden Reality (Brian Greene)

2015

  • The Art of Strategy (Avinash K. Dixit and Barry J. Nalebuff)
  • Computing with Quantum Cats (John Gribbin)
  • Quantum Computing Since Democritus (Scott Aaronson)
  • A PhD is Not Enough (Peter J. Feibelman)
  • Our Mathematical Universe (Max Tegmark)
  • Canadian Red Cross First Aid & CPR Manual
  • Qube: Questions of Being (Unknown)
  • The Book of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto (Phil Champagne)
  • Mastering Bitcoin (Andreas M. Antonopoulos)
  • A Tour of C++ (Bjarne Stroustrup)
  • Intuition Pumps and Other Tools for Thinking (Daniel C. Dennett)
  • Metaphysics: A Very Short Introduction (Stephen Mumford)
  • Flatland: A Romance of Many Dimensions (Edwin A. Abbott)
  • Getting to Yes: Negotiating an agreement without giving in (Fisher and Ury)
  • The Unpersuadables: Adventures with the Enemies of Science (Will Storr)
  • Gray Hat Python (Justin Seitz)
  • Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (Gabriella Coleman)
  • The Climate Crisis: An Introductory Guide to Climate Change (David Archer, Stefan Rahmstorf)
  • The Martian (Andy Weir)

2014

  • You Are Here: Around the World in 92 Minutes (Chris Hadfield)
  • What the Bleep do we Know? (William Arntz et al.) (Warning: It's Bullshit)
  • Getting Started with Memcached (Ahmed Soliman)
  • Linear Algebra With Applications (Nicholson)
  • Calculus (Spivak)
  • Natural Disasters, 2nd Canadian Edition (Abbott, Samson)
  • Alice's Adventures in Wonderland (Lewis Carrol)
  • Music Theory for Dummies (Michael Pilhofer, Holly Day)
  • Out Of Their Minds (Dennis Shasha, Cathy Lazere)
  • Waking Up (Sam Harris)
  • The History of Science (Audiobook) (Peter Whitfield)
  • You've Got Some Explaining To Do (Jane Nevins)
  • Conciousness Explained (Daniel C. Dennett)
  • The Pleasure of Finding Things Out: The Best Short Works of Richard P. Feynman (Richard Feynman)
  • The Dragons of Eden: Speculations on the Evolution of Human Intelligence (Carl Sagan)
  • The Man Who Knew Too Much: Alan Turing and The Invention of the Computer (David Leavitt)
  • Distributed Systems for Fun and Profit (Mikito Takada)
  • Selected Chapters from Anton: Elementary Linear Algebra, 8th Edition (Custom print for University of Calgary)
  • Harry Potter and the Deathly Hallows (J. K. Rowling)
  • No Place to Hide (Glenn Greenwald)
  • Feynman's Tips On Physics (Richard Feynman, Michael A. Gottleib, Ralph Leighton)
  • The Art of War (Sun Tzu)
  • Death By Black Hole (Neil DeGrasse Tyson)
  • Rocks & Minerals (Dr. R. F. Symes)
  • A Universe From Nothing (Lawrence M. Krauss)
  • Feynman Lectures on Computation (Richard Feynman)

2013

  • On the Origin of Species By Means of Natural Selection (Charles Darwin)
  • Time Reborn (Lee Smolin)
  • Surely You're Joking, Mr. Feynman! (Richard Feynman)
  • The Ancestor's Tale (Richard Dawkins)
  • How to Win Friends & Influence People (Dale Carnegie)
  • Auto Fundamentals (Stockel, Stockel, and Johanson)
  • A Mathematician's Lament (Paul Lockhart)
  • The Anarchist Cookbook (William Powell)
  • A Guide To Kernel Exploitation
  • Philosophy of Science (Curd, Cover, Pincock)
  • Cypherpunks (Assange et. al.)
  • The Elements of Moral Philosophy (Rachels)
  • Computer Networking: A Top-Down Approach (Kurose, Ross)
  • Pirate Cinema (Cory Doctorow)
  • God is Not Great (Christopher Hitchens)
  • Pro Git (Scott Chacon)
  • How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace
  • JavaScript: The Good Parts
  • HTML5 Canvas
  • Gödel, Escher, Bach: An Eternal Golden Braid (Douglas Hofstadter)
  • Intel 64 and IA-32 Architectures Software Developer Manual: Volume 1

2012 and Before

  • Introduction to Algorithms (CLRS)
  • Cryptography Engineering
  • Understanding Cryptography (Paar, Pelzl)
  • Applied Cryptography (Schneier)
  • Cryptography Theory and Practice (Stinson)
  • Seven Deadliest Web Application Attacks
  • Numerical Methods Using Matlab
  • Essential PHP Security
  • Practical Lock Picking
  • Computability and Logic (Boolos)
  • Writing for Computer Science
  • Discrete Mathematics with Applications
  • The Ruby Programming Language
  • C++ For Dummies
  • Understanding the Linux Kernel
  • Hacking For Dummies
  • Networking For Dummies
  • Ghost in the wires (Mitnick)
  • The art of deception (Mitnick)
  • Peter Norton's Inside the PC
  • The C Programming Language (K&R)
  • HTML, XTHML, & CSS (Castro)
  • SPARC Architecture, Assembly Language Programming, and C
  • Statistics (Freedman, Pisani, Purves)
  • HACKING - The Art of Exploitation
  • The Standard C Library
  • The God Delusion (Dawkins)
  • The Magic Of Reality
  • Little Brother (Cory Doctorow)
  • Nineteen Eighty Four (George Orwell)
  • Quantum Computing (Reiffel, Polak) (no i don't understand this at all)
  • Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin)
  • Structured Computer Organization (Andrew S. Tanenbaum)
  • Agile Web Development With Rails (Sam Ruby, Dave Thomas, David Hansson)
  • Assembly Language for x86 Processors (Kip Irvine)
  • The Essentials of Technical Communication (Elizabeth Tebeaux, Sam Dragga)
  • Daemon (Daniel Suarez)
  • Freedom (Daniel Suarez)
  • Last Words (George Carlin)
  • When Will Jesus Bring The Porkchops (George Carlin)
  • The Black Hole War (Leonard Susskind)
  • 13 Things That Don't Make Sense (Michael Brooks)
  • Physics of the Impossible (Michio Kaku)
  • On Intelligence (Jeff Hawkins)
  • The Selfish Gene (Richard Dawkins)
  • Man of La Mancha
  • The War of the Worlds (H. G. Wells)
  • Stealing the Network: How to Own the Box
  • Stealing the Network: How to Own an Identity
  • Stealing the Network: How to Own A Continent
  • A Brief History of Time (Stephen Hawking)

Papers

2021

  • How to Find Hidden Users: A Survey of Attacks on Anonymity Networks (Esra Erdin et al.)

2020

  • PIR with compressed queries and amortized query processing (Sebastian Angel et al.)
  • Many Worlds, the Born Rule, and Self-Locating Uncertainty (Sean M. Carroll et al.)
  • Survey on anonymous communications in computer networks (Jian Ren and Jie Wu)
  • Responsible Vulnerability Disclosure in Cryptocurrencies (Rainer Böhme et al.)
  • XRD: Scalable Messaging System with Cryptographic Privacy (Albert Kwon et al.)
  • On Privacy Notions in Anonymous Communication (Christine Kuhn et al.)
  • ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments (Sajin Sasy and Ian Goldberg)
  • k-Anonymity: A Model for Protecting Privacy (Latanya Sweeney)
  • Anonymity, Unobservability, and Pseudonymity – A Proposal for Terminology (Andreas Pfitzmann and Marit Köhntopp)
  • The Basics of Brain Development (Joan Stiles and Terry L. Jernigan)
  • Struggling to be a person: Lived experience of avoidant personality disorder (Kristine D. Sorensen et al.)

2019

  • Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems (Takeshi Sugawara et al.)
  • Quantum Supremacy Using a Programmable Superconducting Processor (Eleanor G. Rieffel)
  • Exterminate All Operating System Abstractions (Dawson R. Engler and M. Frans Kaashoek)
  • A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World (Al Bessey et al.)
  • Touching The Untouchables: Dynamic Security Analysis of the LTE Control Plane (Hongil Kim et al.)
  • Deanonymization of clients in Bitcoin P2P network (Alex Biryukov et al.)
  • Survivable Key Compromise in Software Update Systems (Justin Samuel et al.)
  • A Survey on the Security of Blockchain Systems (Xiaoqi Li et al.)
  • Blockchain challenges and opportunities: a survey (Zibin Zheng et al.)
  • Coda: Decentralized cryptocurrency at scale (Izaak Meckler and Evan Shapiro)
  • Harmony Technical Whitepaper (Harmony Team)
  • The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations (Eyal Ronen et al.)
  • NetSpectre: Read Arbitrary Memory over Network (Michael Schwarz)
  • Basic Attention Token (BAT) (Brave Software)
  • Eclipse Attacks on Bitcoin's Peer-to-Peer Network (Ethan Heilman et al.)
  • SoK: Make JIT-Spray Great Again (Robert Gawlik and Thorsten Holz)
  • A Systematic Evaluation of Transient Execution Attacks and Defenses (Claudio Canella et al.)
  • Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives (Mathy Vanhoef and Frank Piessens)
  • An Empirical Analysis of Anonymity in Zcash (George Kappos et al.)
  • Why Buy When You Can Rent? Bribery Attacks on Bitcoin-Style Consensus (Joseph Bonneau)
  • Conciousness Engineered (Michael S.A. Graziano)

2018

  • Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion (Stefan Savage)
  • Proof-of-Stake (Janno Siim)
  • A Systematic Approach To Cryptocurrency Fees (Alexander Chepurnoy et al.)
  • Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) (Carlo Meijer and Bernard van Gastel)
  • Auditable, Anonymous Electronic Cash (Tomas Sander and Amnon Ta-Shma)
  • Elliptic Curve Cryptography In Practice (Joppe W. Bos et al.)
  • The Night Watch (James Mickens)
  • Spectre Attacks: Exploiting Speculative Execution (Paul Kocher et al.)
  • Meltdown (Moritz Lipp et al.)

2017

  • Relationship between Music Preference and Personality Type (Vandana Sharma)
  • Short and long-term musical preferences: what makes a favorite peice of music? (Alexandra Lamont and Rebecca Webb)
  • Automatic Genre Classification of Music Content (Nicolas Scaringella et al.)
  • Factors Influencing Pop Music Preferences of Young People (David Boyle et al.)
  • 'I love Rock 'n' Roll'--Music genre preference modulates brain responses to music (Eva Istok et al.)
  • fMRI investigation of cross-cultural music comprehension (Steven Morrison et al.)
  • Structural integration in language and music: Evidence for a shared system (Evelina Fedorenko et al.)
  • The Do Re Mi's of Everyday Life: The Structure and Personality Correlates of Music Preferences (Peter Rentfrow and Samuel Gosling)
  • Toward a better understanding of the relation between music preference, listening behavior, and personality (Peter Dunn et al.)
  • How Shared Preferences in Music Create Bonds Between People: Values as the Missing Link (Diana Boer et al.)
  • From the functions of music to music preference (Thomas Schafer and Peter Sedlmeier)
  • Mutual exposure or close peer relationships do not seem to foster increased similarity in food, music, or television program preferences (Paul Rozin et al.)
  • Music genre as cognitive schema: extramusical associations with country and hip-hop music (Mark Shevy)
  • Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Attacks (Mengjia Yan et al.)
  • Modeling Dynamic Identities and Uncertainty in Social Interactions: Bayesian Affect Control Theory (Tobias Schröder)
  • Epistemics in Conversation (John Heritage)
  • On the reception and detection of pseudo-profound bullshit (Gordon Pennycook et al.)
  • Dunning-Kruger effects in reasoning: Therotical implications of the failure to recognize incompetence (Gordon Pennycook et al.)
  • Introduction: Rhetorical Figures, Arguments, Computation (Randy Allen Harris et al.)
  • A Cognitive Ontology of Rhetorical Figures (Randy Allen Harris et al.)
  • A Large-Scale Model of the Functioning Brain (Chris Eliasmith et al.)
  • Wise deliberation sustains cooperation (Igor Grossman et al.)
  • Wisdom in Context (Igor Grossman)
  • Creative Intuition: How Eureka Results from Three Neural Mechanisms (Paul Thagard)
  • Artistic Genius and Creative Cognition (Paul Thagard)
  • A step at a time: Preliterate children's simulation of narrative movement during story comprehension (Agnieszka M. Fecica and Daniela K. O'Neill)
  • Getting Lost in a Book: The Science of Reading Comprehension (Anegla Nyhout et al.)
  • Automatic Genre Classification of Music Content (Nicholas Scaringella et al.)
  • On the reception and detection of pseudo-profound bullshit (Gordon Pennycook et al.)
  • Dunning-Kruger effects in reasoning: Theoretical implications of the failure to recognize incompetence
  • Synthbot: An Unsupervised Software Synthesizer Programmer (Matthew Yee-King and Martin Roth)
  • Perceptual Distance in Timbre Space (Hiroko Terasawa et al.)
  • The property 'instinct' (Jeffery Evans Stake)
  • Young Children's Understanding of Ownership (Shaylene E. Naneekivell et al.)
  • Creative Intuition: How Eureka Results from Three Neural Mechanisms
  • Artistic Genius and Creative Cognition (Paul Thagard)
  • Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
  • Motivated Numeracy and Enlightened Self-Government (Dan M Kahan et al.)
  • When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers (Susan E. McGregor et al.)
  • Open Problems in the Philosophy of Information (Luciano Floridi)
  • A Large-Scale Model of the Functioning Brain (Chris Eliasmith et al.)
  • Using BGP to Acquire Bogus TLS Certificates (Henry Birge-Lee et al.)
  • Information as Thing (Michael K. Buckland)
  • What is inferrentialism? (Jaroslav Peregrin)
  • Method to Protect Passwords in Databases for Web Applications (Scott Contini)
  • Music, Language, and Composition (Theodor W. Adorno)
  • Adverse Health Effects of Marijuana Use (Nora D. Volkow et al.)
  • Dose-related neurocognitive effects of marijuana use (K. I. Bolla et al.)
  • Quantum Information Processing Using Quantum Dot Spins and Cavity QED (A. Imamoglu et al.)
  • Geiger-mode avalache photodiodes, history, properties and problems (D. Renker)
  • The Case for Quantum Key Distribution (Douglas Stebila et al.)
  • Attacks on practical quantum key distribution systems (and how to prevent them) (Nitin Jain et al.)
  • Secure quantum key distribution (Hoi-Kwong Lo et al.)
  • The black paper of quantum cryptography: real implementation problems (Valerio Scarani, Christian Kurtseifer)
  • Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography (Artem Vakhitov et al.)
  • Provably secure and practical quantum key distribution over 307km of optical fibre (Boris Korzh et al.)
  • Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption (Anqi Huang et al.)
  • Random Variation of Detector Efficiency: A Countermeasure against Detector Blinding Attacks for Quantum Key Distribution (Charles Ci et al.)
  • Hacking Commercial Quantum Cryptography Systems by Tailored Bright Illumination (Lars Lydersen et al.)
  • On Procrastination (John Perry)
  • Toward a Broader View of Security Protocols (Matt Blaze)
  • Engineering Silicon-Based Photonic Crystal Cavities for NV-Center Quantum Information Processing (C. A. Foell et al.)
  • Quantum information processing through quantum dots in slow-light photonic crystal waveguides (C. W. Wong et al.)
  • Quantum Private Comparison: A Review (Wenjie Liu et al.)

2016

  • Why Philosophers Should Care About Computational Complexity (Scott Aaronson)
  • Quantum Advantage Without Entanglement (Dan Kenigsberg et al.)
  • How Quantum Computers Can Fail (Gil Kalai)
  • Are Quantum States Exponentially Long Vectors? (Scott Aaronson)
  • Multilinear Formulas and Skepticism of Quantum Computing (Scott Aaronson)
  • The Status of the P versus NP Problem (Lance Fortnow)
  • One Complexity Theoreist's View of Quantum Computing (Lance Fortnow)
  • Cryptography During the French and American Wars in Vietname (Phan Dương Hiệu and Neal Koblitz)
  • Is P Versus NP Formally Independent? (Scott Aaronson)
  • On Limited Nondeterminism and ACC Circuit Lower Bounds (Holger Spakowski)
  • Uniform Recognition for Acyclic Context-Sensitive Grammars is NP-complete (Erik Aarts)
  • Feasible Proofs and Computations: Partnership and Fusion (Alexander A. Razborov)
  • Local Reductions (Hamid Jahanjou et al.)
  • The Relative Efficiency of Propositional Proof Systems (Stephen Cook and Robert Reckhow)
  • Feasible Proofs and Computations: Partnership and Fusion (Alexandar Razborov)
  • Time-Space Lower Bounds for Satisfiability (Lance Fortnow, Richard Lipton, and Anastasios Viglas)
  • Strong ETH Breaks with Merlin and Arthur: Short Non-Interactive Proofs of Batch Evaluation (Ryan Williams)
  • Programming Satan's Computer (Ross Anderson and Roger Needham)
  • Quantum Physics and the Identity of Indiscernibles (Steven French and Micahel Redhead)
  • Nothingness (Stanford Encyclopedia of Philosophy)
  • The Physical Implementation of Quantum Computation (David P. DiVincenzo)
  • IP=PSPACE: Simplified Proof (A. Shen)
  • IP=PSPACE (Adi Shamir)
  • Private Coins versus Public Coins in Interactive Proof Systems (Shafi Goldwasser and Michael Sipser)
  • Algebraic Methods for Interactive Proof Systems (Carsten Lund, et al.)
  • Turing machines that take advice (Karp and Lipton)
  • Alternation (A. Chandra et al.)
  • The Spy in the Sandbox - Practical Cache Attacks in Javascript (Yossef Oren, et al.)
  • Is the security of quantum cryptography guaranteed by the laws of physics? (Daniel J. Bernstein)
  • Hacking Blind (Andrea Bittau et al.)
  • Closed timelike curves make quantum and classical computing equivalent (Scott Aaronson, John Watrous)
  • Protocol Interactions and the Chosen Protocol Attack (John Kelsey et al.)
  • ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs (Genken et al.)
  • Defining a Model for Defense-In-Depth (James Sullivan, Michael E. Locasto)
  • Causal Boxes: Quantum Information Processing Systems Closed under Composition (Christopher Portmann et al.)

2015

  • The Rise and Fall of the Operating System (Antti Kantee)
  • The Brave New World of Bodacious Assumptions in Cryptography (Neal Koblitz, Alfred Menezes)
  • A Riddle Wrapped in an Enigma (Neal Koblitz, Alfred J. Menezes)
  • Asymmetric proof-of-work based on the Generalized Birthday problem (Alex Biryukov, Dmitry Khovratovich)
  • Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (David Adrian et al.)
  • Is "the theory of everything" merely the ultimate ensemble theory? (Max Tegmark)
  • Faster Multicollisions (Jean-Philippe Aumasson)
  • On Stake and Consensus (Andrew Poelstra)
  • A history of the PCP theorem (Ryan O'Donnell)
  • Experiences Deploying a Large-Scale Emergent Network (Bryce Wilcox-O'Hearn)
  • The Bugs We Have to Kill (Sergey Bratus et al.)
  • Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard (Enes Göktaş et al.)
  • Cross-Tenant Side-Channel Attacks in PaaS Clouds (Yinqian Zhang et al.)
  • Fast Search in Hamming Space with Multi-Index Hashing (Mohammad Norouzi et al.)
  • Towards a Theory of Application Compartmentalization (Robert N.M. Watson et al.)
  • Green Lights Forever: Analyzing the Security of Traffic Infrastructure (Branden Ghena et al.)
  • Attacking The Linux PRNG on Android (David Kaplan et al.)
  • Security Implications of Memory Deduplication in a Virtualized Environment (Jidong Xiao et al.)
  • An Exploration of L2 Cache Covert Channels in Virtualized Environments (Yunjing Xu et al.)
  • Everything You've Always Wanted To Know About Certificate Validation With OpenSSL (But Were Afraid To Ask) (Alban Diquet)
  • Surreptitiously Weakening Cryptographic Systems (Bruce Schneier et al.)
  • Memory Deduplication as a Threat to the Guest OS (Kuniyasu Suzaki et al.)
  • An Experience Report on Extracting and Viewing Memory Events via Wireshark (Sarah Laing et al.)
  • Legal Issues Surrounding Monitoring During Network Research (Paul Ohm, Douglas Sicker, and Dirk Gurnwald)
  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers (Gang Wang et al.)
  • Why Is There No Science in Cyber Science? (Roy Maxion et al.)
  • Information Security: Science, Pseudoscience, and Flying Pigs (Roger Schell)
  • Heads-up limit hold'em poker is solved (Michael Bowling et al.)
  • Cache Games – Brining Access-Based Cache Attacks on AES to Practice (Endre Bangerter, David Gullasch, Stephan Krenn)

2014

  • Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage (John Demme et al.)
  • Acoustic Side-Channel Attacks on Printers (Michael Backes et al.)
  • What is Teaching? (Paul R. Halmos)
  • Beware of BGP Attacks (Ola Nordström and Constantinos Dovrolis)
  • A Pixel Is Not A Little Square (Alvy Ray Smith)
  • Security Applications of Formal Language Theory (Len Sassaman et al.)
  • The Halting Problem of Network Stack Insecurity (Len Sassaman et al.)
  • Why does cryptographic software fail? A case study and open problems (David Lazar et al.)
  • Control Flow Integrity for COTS Binaries (Mingwei Zhang and R. Sekar)
  • The Misfortunes of a Trio of Mathematicians Using Computer Algebra Systems. Can We Trust in Them? (Antonio J. Durán et al.)
  • The Web Never Forgets: Persistent Tracking Mechanisms in the Wild (Gunes Acar et al.)
  • Defeat Spyware with Anti-Screen Capture Technology Using Visual Persistence (Johnny Lim)
  • A Quick Guide to Organizing Computational Biology Projects (William Stafford Noble)
  • The Search for MH370 (Chris Ashton et al.)
  • Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation (Sergey Bratus et al.)
  • Some thoughts on security after ten years of qmail 1.0 (Daniel J. Bernstein)
  • Protection in an Information Processing Utility (Robert M. Graham)
  • Protection in Operating Systems (Harrison et al.)
  • Protection (Lampson et al.)
  • Pretending that Systems Are Secure (S. W. Smith)
  • A Geometric Review of Linear Algebra (Eero Simoncelli)
  • Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits (Mehran Bozorgi et al.)
  • We Need Assurance! (Brian Snow)
  • Allen Dulles's 73 Rules of Spycraft (James Srodes)
  • What the Tortoise Said to Achilles (Lewis Carroll)
  • Gamma error in picture scaling (Eric Brasseur)
  • Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance (Aaron Segal et al.)
  • Computational Solution to Quantum Foundational Problems (Arkady Bolotin)
  • Random-Sample Elections (David Chaum)
  • Tezos: A Self-Amending Crypto-Ledger Position Paper (L. M. Goodman)
  • (DRAFT) Avoiding a War on Unauthorized Computation: Why Exploit Regulation is the Biggest Danger to Coder Freedom and Future Security (Sergey Bratus, Anna Shubina)
  • Leibniz's Mill Argument Against Mechanical Materialism Revisted (Paul Lodge)
  • Using Clustering to Detect Chinese Censorware (Becker Polverini, William M. Pottenger)
  • The Collateral Damage of Internet Censorship by DNS Injection (Five Anonymous Authors)
  • Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations (Nicholas Aase et al.)
  • Bypassing Internet Censorship for News Broadcasters (Karl Kathuria)
  • Building web applications on top of encrypted data using Mylar (Raluca Ada Popa et al.)
  • End-To-End Arguments in System Design (J.H Saltzer et al.)
  • Bitcoin: censorship-resistant currency and domain name system to the people (Dušan Barok)
  • Framing Signals—A Return to Portable Shellcode (Erik Bosman and Herbert Bos)
  • DetecTor (Kai Engert)
  • Threema security assessment (Hristo Dimitrov et al.)
  • "Ooh Aah... Just a Little Bit" : A small amount of side channel can go a long way (Naomi Benger et al.)
  • Programming with D-Wave: Map Coloring Problem (E. D. Dahl)
  • I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis (Brad Miller et al.)
  • On Reusing Ephemeral Keys in Diffie-Hellman Key Agreement Protocols (Alfred Menezes and Berkant Ustaoglu)
  • OONI: Open Observatory of Network Interference
  • The ND2DB attack: Database content extraction using attacks on the indexing algorithms (Ariel Futoransky et al.)
  • Exposing Private Information by Timing Web Applications (Andrew Bortz et al.)
  • Cuckoo Cycle: a memory-hard proof-of-work system (John Tromp)
  • Paradigm Regained: Abstraction Mechanisms for Access Control
  • eCryptfs: An Enterprise-class Cryptographic Filesystem for Linux (Michael Austin Halcrow)
  • Cryptfs: A Stackable Vnode Level Encryption File System (Erez Zadok et al.)
  • A Personal View of Average-Case Complexity (Russell Impagliazzo)
  • Towards an Ethical Code for Information Security? (Steven J. Greenwald et al.)

2013

  • RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (Daniel Genkin et al.)
  • Subversion of Social Movements by Adversarial Agents (Eric L. Nelson)
  • Why Chosen Ciphertext Security Matters (Victor Shoup)
  • Soil Diversity and Hydration as Observed by ChemCam at Gale Crater, Mars (P. Meslin et al.)
  • A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory (Patrick Stewin)
  • An Empirical Study of Cryptographic Misuse in Android Applications (Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel)
  • Cache Attacks and Countermeasures: the Case of AES (Extended Version) (Dag Arne Osvik et al.)
  • Timing Analysis of Keystrokes and Timing Attacks on SSH (Dawn Xiaodong Song et al.)
  • Are AES x86 Cache Timing Attacks Still Feasible? (Keaton Mowery et al.)
  • A Cache Timing Attack on AES in Virtualization Environments (Michael Weiß et al.)
  • Cache Based Remote Timing Attack on the AES (Onur Aciiçmez et al.)
  • Practical Timing Side Channel Attacks Against Kernel Space ASLR (Ralf Hund et al.)
  • Cache-timing attacks on AES (Daniel J. Bernstein)
  • Implementation and Implications of a Stealth Hard-Drive Backdoor (Jonas Zaddach et al.)
  • Mitigating Code-Reuse Attacks with Control-Flow Locking (Tyler Bletsch et al.)
  • On the Possibility of Gas-Rich Dwarf Galaxies in the Lyman-Alpha Forest (Neil deGrasse Tyson)
  • Taking the example of computer systems engineering for the analysis of biological cell systems (Tessa Pronk et al.)
  • Chaff: Engineering an Efficient SAT Solver (Matthew W. Moskewicz et al.)
  • On the possibility of a major impact on Uranus in the past century (N. D. Tyson et al.)
  • Stealthy Dopant-Level Hardware Trojans (Becker et al.)
  • Universal security from bits and mips to pools, lakes - and beyond (Arjen K. Lenstra et al.)
  • Truncating TLS Connections to Violate Beliefs in Web Applications (Ben Smyth and Alfredo Pironti)
  • Multicollisions in iterated hash functions. Application to cascaded constructions. (Atoine Joux)
  • Mobile Malware: Why the Traditional AV Paradigm is Doomed, and How to Use Physics to Detect Undesirable Routines (Markus Jakobsson, Guy Stewart)
  • mov is Turing Complete (Stephen Dolan)
  • You Can Type, but You Can't Hide: A Stealthy GPU-based Keylogger (Evangelos Ladakis et al.)
  • FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack (Yuval Yarom, Katrina Falkner)
  • Structural Realism: The Best of Both Worlds? (John Worrall)
  • Explicit Authentication Response Considered Harmful (Lianying Zhao and Mohammad Mannan)
  • Cryptanalysis of the SIMON Family of Block Ciphers (Hoda A. Alkhzaimi, Martin M. Lauridsen)
  • Master-Key Cryptosystems (Matt Blaze et al.)
  • Towards Efficient Traffic-analysis Resistant Anonymity Networks (Le Blond et al.)
  • Catena: A Memory-Consuming Password Scrambler (Forler et al.)
  • A Fistful of Bitcoins: Characterizing Payments Among Men with No Names (Meiklejohn et al.)
  • How to Write Shared Libraries (Ulrich Drepper)
  • Cheating the ELF: Subversive Dynamic Linking to Libraries (the grugq)
  • Dissent in Numbers: Making Strong Anonymity Scale (Wolinsky et al.)
  • XFI: Software Guards for System Address Spaces (Erlingsson et al.)
  • Language-Independent Sandboxing of Just-In-Time Compilation and Self-Modifying Code (Jason Ansel, Petr Marchenko)
  • An Oblivious Password Cracking Server (Calvo et al.)
  • BREACH: Reviving the Crime Attack (Gluck et al.)
  • Church's thesis meets the N-body problem (Warren D. Smith)
  • On Protection by Layout Randomization (Bartin Abadi, Gordon Plotkin)
  • Security and Privacy Considerations in Digital Death (Locasto et al.)
  • The security impact of a new cryptographic library (Bernstein et al.)
  • Magazines and Vmem: Extending the Slab Allocator to Many CPUs and Arbitrary Resources (Jeff Bonwick, Jonathan Adams)
  • PEBIL: Efficient Static Binary Instrumentation for Linux (Laurenzano et al.)
  • An API for Runtime Code Patching (Bryan Buck, Jeffery K. Hollingsworth) (The DynInst API)
  • PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture (Schwarz et al.)
  • Impeding Malware Analysis Using Conditional Code Obfuscation (Sharif et al.)
  • Obfuscation of Executable Code to Improve Resistance to Static Disassembly (Cullen Linn, Saumya Debray)
  • Dissecting Android Malware: Characterization and Evolution (Yajin Zhou, Xuxian Jiang)
  • A fistful of red-pills: How to automatically generate procedures to detect CPU emulators (Paleari et al.)
  • ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection (Bangert et al.)
  • Native Client: A Sandbox for Portable, Untrusted x86 Native Code (Yee et al.)
  • Graphical Passwords: Learning from the First Twelve Years (Biddle et al.)
  • Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1 (Daniel Bleichenbacher)
  • Jump-Oriented Programming: A New Class of Code-Reuse Attack (Bletsch et al.)
  • BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection (Gu et al.)
  • kBouncer: Efficient and Transparent ROP Mitigation (Vasilis Pappas)
  • Remote Timing Attacks are Practical (David Brumley, Dan Boneh)
  • Secure Execution via Program Shepherding (Kiriansky et al.)
  • QEMU, a Fast and Portable Dynamic Translator (Fabrice Bellard)
  • Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization (Pappas et al.)
  • SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms (Bratus et al.)
  • Composition Patterns of Hacking (Bratus et al.)
  • Reliable Research: Towards Experimental Standards for Computer Science (Justin Zobel)
  • Control-Flow Integrity (Abadi et al.)
  • Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns (Jonathan Pincus, Brandon Baker)
  • Return-Oriented Programming: Systems, Languages, and Applications (Roemer et al.)
  • Countering Code-Injection Attacks with Instruction-Set Randomization (Kc et al.)
  • Honeywords: Making Password-Cracking Detectable (Ari Juels, Ronald L. Rivest)
  • Vx32: Lightweight User-level Sandboxing on the x86 (Bryan Ford, Russ Cox)
  • Q: Exploit Hardening Made Easy (Schwartz et al.)
  • Non-Control-Data Attacks are Realistic Threats (Chen et al.)

Magazines, E-Zines & Other

  • Google Infrastructure Security Design Overview
  • How to write proofs: a quick guide (Eugenia Cheng)
  • Polynomial Time and Extravagant Models (Leonid Levin)
  • PHYS771 Lecture 14: Skepticism of Quantum Computing (Scott Aaronson)
  • Break a dozen secret keys, get a million more for free (Daniel J. Bernstein)
  • True Names (Vernor Vinge)
  • The Judgement of the Birds (Loren Eiseley)
  • How To Benchmark Code Execution Times on Intel IA-32 and IA-64 Instruction Set Architectures (Gabriele Paoloni)
  • Politics and the English Language (George Orwell)
  • Don't Call Yourself A Programmer, And Other Career Advice
  • Mr. X by Carl Sagan
  • 2600 Winter 2013-2014
  • National Geographic February 2014
  • JSOU Report 12-3: Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations, Chapter 3
  • Megamos Crypto, Responsible Disclosure, and the Chilling Effect of Volkswagen Aktiengesellschaft vs Garcia, et al (Robert Carolina, Kenneth G. Paterson)
  • An untitled paper from Intel on cache
  • International Journal of PoC || GTFO: Issue 0x00
  • International Journal of PoC || GTFO: Issue 0x01
  • International Journal of PoC || GTFO: Issue 0x02
  • International Journal of PoC || GTFO: Issue 0x03
  • Smashing The Stack For Fun And Profit (Aleph One)
  • The Conscience of a Hacker (Hacker's Manifesto) by The Mentor
  • Phrack Issue #1 to #5
  • Gitmo Is Killing Me (New York Times)
  • Notation Guide For Precalculus and Calculus Students (Sean Raleigh)
  • RFC 1036 - Standard for Interchange of USENET Messages
  • RFC 5869 - HMAC-based Extract-and-Expand Key Derivation Function
  • Scientific American Volume 310, Number 5
  • American Scientist
    • Volume 102 Number 2
    • Volume 102 Number 3