Papers
Being ignorant is not shameful, but being unwilling to learn is.
Title | Author |
11 Best Practices for Peer Code Review | SmartBear Software |
A Bird’s Eye View on the I2P Anonymous File-sharing Environment | [Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor] |
A genetic-algorithm approach to solving crossword puzzles | |
Algorithms for Constraint- Satisfaction Problems | |
All Your iFRAMEs Point to Us | [Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab Fabian Monrose] |
An empirical comparison of C, C++, Java, Perl, Python, Rexx, and Tcl | Lutz Prechelt |
An information-theoretic perspective of tf–idf measures | |
An introduction to steganography methods | [Masoud Nosrati, Ronak Karimi, Mehdi Hariri] |
An LLVM Backend for OCaml | [Colin Benner] |
Anonymity Loves Company: Usability and the Network Effect | [Roger Dingledine and Nick Mathewson - The Free Haven Project] |
Aspects of Kanban | Karl Scotland |
Content and popularity analysis of Tor hidden services | |
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority | [David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee] |
Countering Trusting Trust through Diverse Double-Compiling | [David A. Wheeler] |
De-anonymizing Programmers via Code Stylometry | [Aylin Caliskan-Islam, Richard Harang†, Andrew Liu, Arvind Narayanan, Clare Voss†, Fabian Yamaguchi, and Rachel Greenstadt] |
Deanonymisation of clients in Bitcoin P2P network | [Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov] |
Decentralized Anonymous Credentials | [Christina Garman, Matthew Green, Ian Miers] |
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet | [Jem E. Berkes] |
Design of a blocking-resistant anonymity system Tor Project technical report, Nov 2006 | [Roger Dingledine, Nick Mathewson - The Tor Project] |
Detecting Steganographic Content on the Internet | [Niels Provos, Peter Honeyman] |
Dr.Fill: Crosswords and an Implemented Solver for Singly Weighted CSPs | |
Dynamic-Link Library Hijacking | [Max “RIVAL”] |
Dynamically Typed Languages | Laurence Tratt |
Effective Attacks and Provable Defenses for Website Fingerprinting | [Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson Ian Goldberg] |
Empirical Measurement and Analysis of I2P Routers | [Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi] |
Encrypting Virtual Memory | [Niels Provos - University of Michigan] |
Freenet: A Distributed Anonymous Information Storage and Retrieval System | [Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong] |
Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking | [Ralf K ̈ usters, Tomasz Truderung, Andreas Vogt] |
Go To Statement Considered Harmful | Edsger W. Dijkstra |
How Linux Capability Works | |
How to Make Your Culture Work with Agile, Kanban & Software Craftsmanship | Michael Sahota |
How to Prevent the next Heartbleed | David A. Wheeler |
IBM developerWorks: A look at aspect-oriented programming | |
IBM developerWorks: Use your singletons wisely | |
Idioms: Building High Performance Networking Servers using Tcl | [Todd Coram] |
Implementing IPsec | [Angelos D. Keromytis, John Ioannidis, Jonathan M. Smith] |
Kanban for Skeptics | Nick Oostvogels |
LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation | Chris Lattner and Vikram Adve |
Manufacturing Compromise: The Emergence of Exploit-as-a-Service | [Niels Provos, others.] |
Measuring Freenet in the Wild: Censorship-resilience under Observation | [Stefanie Roos, Benjamin Schiller, Stefan Hacker, Thorsten Strufe] |
Modifying an Off-the-Shelf Wireless Router for PDF Ballot Tampering | [Daniel M. Zimmerman, Joseph R. Kiniry - Galois, Inc] |
Monitoring the I2P network | [Juan Pablo Timpanaro, Chrisment Isabelle, Festor Olivier] |
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks | [Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln] |
Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport | [Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson] |
No Direction Home: The True Cost of Routing Around Decoys | [Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov] |
Notes on Programming in C | Rob Pike |
On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records | [Sambuddho Chakravarty, Marco V. Barbera, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis] |
Organizing Programs Without Classes | [David Ungar, Craig Chambers, Bay-wei Chang, Urs Hölzle] |
Outsmarted – Why Malware Works in face of Antivirus Software | [Matthias Deeg, Sebastian Nerz, Daniel Sauder] |
People Factors in Software Management: Lessons From Comparing Agile and Plan-Driven Methods | |
Practical Attacks Against The I2P Network | [Christoph Egger, Johannes Schlumberger,Christopher Kruegel, and Giovanni Vigna] |
Preventing Privilege Escalation | [Niels Provos - University of Michigan, Markus Friedl - GeNUA, Peter Honeyman - University of Michigan] |
Re3 : Relay Reliability Reputation for Anonymity Systems | [Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar] |
Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I | |
Reflections on Trusting Trust | [ Ken Thompson ] |
Short Paper: Challenges in protecting Tor hidden services from botnet abuse | [Nicholas Hopper] |
Solving Crossword Puzzles as Probabilistic Constraint Satisfaction | |
Solving Crosswords with Proverb | |
The Challenge of Cross-language Interoperability | [David Chisnall] |
The insecurity of OpenBSD | |
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network | [Rob Jansen, Florian Tschorsch, Aaron Johnson, Bjorn Scheuermann] |
Time, Clocks, and the Ordering of Events in a Distributed System | [Leslie Lamport] |
Timing analysis in low-latency mix networks: attacks and defenses | |
Tor: The Second-Generation Onion Router | [Roger Dingledine - The Free Haven Project, Nick Mathewson - The Free Haven Project, Paul Syverson - Naval Research Lab] |
The Liskov Substitution Principle | |
The Power of Ten – Rules for Developing Safety Critical Code | [Gerard J. Holzmann] |
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization | |
WebCrow : Solving Italian crosswords using the Web |