Papers
Being ignorant is not shameful, but being unwilling to learn is.
| Title | Author |
| 11 Best Practices for Peer Code Review | SmartBear Software |
| A Bird’s Eye View on the I2P Anonymous File-sharing Environment | [Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor] |
| A genetic-algorithm approach to solving crossword puzzles | |
| Algorithms for Constraint- Satisfaction Problems | |
| All Your iFRAMEs Point to Us | [Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab Fabian Monrose] |
| An empirical comparison of C, C++, Java, Perl, Python, Rexx, and Tcl | Lutz Prechelt |
| An information-theoretic perspective of tf–idf measures | |
| An introduction to steganography methods | [Masoud Nosrati, Ronak Karimi, Mehdi Hariri] |
| An LLVM Backend for OCaml | [Colin Benner] |
| Anonymity Loves Company: Usability and the Network Effect | [Roger Dingledine and Nick Mathewson - The Free Haven Project] |
| Aspects of Kanban | Karl Scotland |
| Content and popularity analysis of Tor hidden services | |
| Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority | [David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee] |
| Countering Trusting Trust through Diverse Double-Compiling | [David A. Wheeler] |
| De-anonymizing Programmers via Code Stylometry | [Aylin Caliskan-Islam, Richard Harang†, Andrew Liu, Arvind Narayanan, Clare Voss†, Fabian Yamaguchi, and Rachel Greenstadt] |
| Deanonymisation of clients in Bitcoin P2P network | [Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov] |
| Decentralized Anonymous Credentials | [Christina Garman, Matthew Green, Ian Miers] |
| Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet | [Jem E. Berkes] |
| Design of a blocking-resistant anonymity system Tor Project technical report, Nov 2006 | [Roger Dingledine, Nick Mathewson - The Tor Project] |
| Detecting Steganographic Content on the Internet | [Niels Provos, Peter Honeyman] |
| Dr.Fill: Crosswords and an Implemented Solver for Singly Weighted CSPs | |
| Dynamic-Link Library Hijacking | [Max “RIVAL”] |
| Dynamically Typed Languages | Laurence Tratt |
| Effective Attacks and Provable Defenses for Website Fingerprinting | [Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson Ian Goldberg] |
| Empirical Measurement and Analysis of I2P Routers | [Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi] |
| Encrypting Virtual Memory | [Niels Provos - University of Michigan] |
| Freenet: A Distributed Anonymous Information Storage and Retrieval System | [Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong] |
| Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking | [Ralf K ̈ usters, Tomasz Truderung, Andreas Vogt] |
| Go To Statement Considered Harmful | Edsger W. Dijkstra |
| How Linux Capability Works | |
| How to Make Your Culture Work with Agile, Kanban & Software Craftsmanship | Michael Sahota |
| How to Prevent the next Heartbleed | David A. Wheeler |
| IBM developerWorks: A look at aspect-oriented programming | |
| IBM developerWorks: Use your singletons wisely | |
| Idioms: Building High Performance Networking Servers using Tcl | [Todd Coram] |
| Implementing IPsec | [Angelos D. Keromytis, John Ioannidis, Jonathan M. Smith] |
| Kanban for Skeptics | Nick Oostvogels |
| LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation | Chris Lattner and Vikram Adve |
| Manufacturing Compromise: The Emergence of Exploit-as-a-Service | [Niels Provos, others.] |
| Measuring Freenet in the Wild: Censorship-resilience under Observation | [Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe] |
| Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering | [Daniel M. Zimmerman, Joseph R. Kiniry - Galois, Inc] |
| Monitoring the I2P network | [Juan Pablo Timpanaro, Chrisment Isabelle, Festor Olivier] |
| Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks | [Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln] |
| Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport | [Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson] |
| No Direction Home: The True Cost of Routing Around Decoys | [Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov] |
| Notes on Programming in C | Rob Pike |
| On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records | [Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis] |
| Organizing Programs Without Classes | [David Ungar, Craig Chambers, Bay-wei Chang, Urs Hölzle] |
| Outsmarted – Why Malware Works in face of Antivirus Software | [Matthias Deeg, Sebastian Nerz, Daniel Sauder] |
| People Factors in Software Management: Lessons From Comparing Agile and Plan-Driven Methods | |
| Practical Attacks Against The I2P Network | [Christoph Egger, Johannes Schlumberger,Christopher Kruegel, and Giovanni Vigna] |
| Preventing Privilege Escalation | [Niels Provos - University of Michigan, Markus Friedl - GeNUA, Peter Honeyman - University of Michigan] |
| Re3 : Relay Reliability Reputation for Anonymity Systems | [Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar] |
| Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I | |
| Reflections on Trusting Trust | [ Ken Thompson ] |
| Short Paper: Challenges in protecting Tor hidden services from botnet abuse | [Nicholas Hopper] |
| Solving Crossword Puzzles as Probabilistic Constraint Satisfaction | |
| Solving Crosswords with Proverb | |
| The Challenge of Cross-language Interoperability | [David Chisnall] |
| The insecurity of OpenBSD | |
| The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network | [Rob Jansen, Florian Tschorsch, Aaron Johnson, Bjorn Scheuermann] |
| Time, Clocks, and the Ordering of Events in a Distributed System | [Leslie Lamport] |
| Timing analysis in low-latency mix networks: attacks and defenses | |
| Tor: The Second-Generation Onion Router | [Roger Dingledine - The Free Haven Project, Nick Mathewson - The Free Haven Project, Paul Syverson - Naval Research Lab] |
| The Liskov Substitution Principle | |
| The Power of Ten – Rules for Developing Safety Critical Code | [Gerard J. Holzmann] |
| Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization | |
| WebCrow : Solving Italian crosswords using the Web |