Being ignorant is not shameful, but being unwilling to learn is.

Title Author
11 Best Practices for Peer Code Review SmartBear Software
A Bird’s Eye View on the I2P Anonymous File-sharing Environment [Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor]
A genetic-algorithm approach to solving crossword puzzles  
Algorithms for Constraint- Satisfaction Problems  
All Your iFRAMEs Point to Us [Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab Fabian Monrose]
An empirical comparison of C, C++, Java, Perl, Python, Rexx, and Tcl Lutz Prechelt
An information-theoretic perspective of tf–idf measures  
An introduction to steganography methods [Masoud Nosrati, Ronak Karimi, Mehdi Hariri]
An LLVM Backend for OCaml [Colin Benner]
Anonymity Loves Company: Usability and the Network Effect [Roger Dingledine and Nick Mathewson - The Free Haven Project]
Aspects of Kanban Karl Scotland
Content and popularity analysis of Tor hidden services  
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority [David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee]
Countering Trusting Trust through Diverse Double-Compiling [David A. Wheeler]
De-anonymizing Programmers via Code Stylometry [Aylin Caliskan-Islam, Richard Harang†, Andrew Liu, Arvind Narayanan, Clare Voss†, Fabian Yamaguchi, and Rachel Greenstadt]
Deanonymisation of clients in Bitcoin P2P network [Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov]
Decentralized Anonymous Credentials [Christina Garman, Matthew Green, Ian Miers]
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet [Jem E. Berkes]
Design of a blocking-resistant anonymity system Tor Project technical report, Nov 2006 [Roger Dingledine, Nick Mathewson - The Tor Project]
Detecting Steganographic Content on the Internet [Niels Provos, Peter Honeyman]
Dr.Fill: Crosswords and an Implemented Solver for Singly Weighted CSPs  
Dynamic-Link Library Hijacking [Max “RIVAL”]
Dynamically Typed Languages Laurence Tratt
Effective Attacks and Provable Defenses for Website Fingerprinting [Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson Ian Goldberg]
Empirical Measurement and Analysis of I2P Routers [Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi]
Encrypting Virtual Memory [Niels Provos - University of Michigan]
Freenet: A Distributed Anonymous Information Storage and Retrieval System [Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong]
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking [Ralf K ̈ usters, Tomasz Truderung, Andreas Vogt]
Go To Statement Considered Harmful Edsger W. Dijkstra
How Linux Capability Works  
How to Make Your Culture Work with Agile, Kanban & Software Craftsmanship Michael Sahota
How to Prevent the next Heartbleed David A. Wheeler
IBM developerWorks: A look at aspect-oriented programming  
IBM developerWorks: Use your singletons wisely  
Idioms: Building High Performance Networking Servers using Tcl [Todd Coram]
Implementing IPsec [Angelos D. Keromytis, John Ioannidis, Jonathan M. Smith]
Kanban for Skeptics Nick Oostvogels
LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation Chris Lattner and Vikram Adve
Manufacturing Compromise: The Emergence of Exploit-as-a-Service [Niels Provos, others.]
Measuring Freenet in the Wild: Censorship-resilience under Observation [Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe]
Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering [Daniel M. Zimmerman, Joseph R. Kiniry - Galois, Inc]
Monitoring the I2P network [Juan Pablo Timpanaro, Chrisment Isabelle, Festor Olivier]
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks [Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln]
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport [Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson]
No Direction Home: The True Cost of Routing Around Decoys [Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov]
Notes on Programming in C Rob Pike
On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records [Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis]
Organizing Programs Without Classes [David Ungar, Craig Chambers, Bay-wei Chang, Urs Hölzle]
Outsmarted – Why Malware Works in face of Antivirus Software [Matthias Deeg, Sebastian Nerz, Daniel Sauder]
People Factors in Software Management: Lessons From Comparing Agile and Plan-Driven Methods  
Practical Attacks Against The I2P Network [Christoph Egger, Johannes Schlumberger,Christopher Kruegel, and Giovanni Vigna]
Preventing Privilege Escalation [Niels Provos - University of Michigan, Markus Friedl - GeNUA, Peter Honeyman - University of Michigan]
Re3 : Relay Reliability Reputation for Anonymity Systems [Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar]
Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I  
Reflections on Trusting Trust [ Ken Thompson ]
Short Paper: Challenges in protecting Tor hidden services from botnet abuse [Nicholas Hopper]
Solving Crossword Puzzles as Probabilistic Constraint Satisfaction  
Solving Crosswords with Proverb  
The Challenge of Cross-language Interoperability [David Chisnall]
The insecurity of OpenBSD  
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network [Rob Jansen, Florian Tschorsch, Aaron Johnson, Bjorn Scheuermann]
Time, Clocks, and the Ordering of Events in a Distributed System [Leslie Lamport]
Timing analysis in low-latency mix networks: attacks and defenses  
Tor: The Second-Generation Onion Router [Roger Dingledine - The Free Haven Project, Nick Mathewson - The Free Haven Project, Paul Syverson - Naval Research Lab]
The Liskov Substitution Principle  
The Power of Ten – Rules for Developing Safety Critical Code [Gerard J. Holzmann]
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization  
WebCrow : Solving Italian crosswords using the Web