http://users.ece.cmu.edu/~aavgerin/papers/mayhem-oakland-12.pdf http://users.ece.cmu.edu/~ejschwar/papers/usenix11.pdf http://moflow.org/ref/A%20New%20Model%20of%20Program%20Dependences%20for%20Reverse%20Engineering.pdf http://moflow.org/ref/A%20Semantics-Based%20Approach%20to%20Malware%20Detection.pdf http://moflow.org/ref/A%20Smart%20Fuzzer%20for%20x86%20Executables.pdf http://moflow.org/ref/A%20Survey%20of%20Program%20Slicing%20Techniques.pdf http://moflow.org/ref/Analysis%20and%20Defense%20of%20Vulnerabilities%20in%20Binary%20Code.pdf http://moflow.org/ref/Automated%20Synthesis%20of%20Symbolic%20Instruction%20Encodings%20from%20IO%20Samples.pdf http://moflow.org/ref/Automated%20Whitebox%20Fuzz%20Testing.pdf http://moflow.org/ref/Automatic%20Generation%20of%20Control%20Flow%20Hijacking%20Exploits%20for%20Software%20Vulnerabilities.pdf http://moflow.org/ref/Automatic%20Partial%20Loop%20Summarization%20in%20Dynamic%20Test%20Generation.pdf http://moflow.org/ref/Automatic%20Patch-Based%20Exploit%20Generation%20is%20Possible%20-%20Techniques%20and%20Implications.pdf http://moflow.org/ref/Automatic%20Reverse%20Engineering%20of%20Data%20Structures%20from%20Binary%20Execution.pdf http://moflow.org/ref/Binary%20Rewriting%20without%20Relocation%20Information.pdf http://moflow.org/ref/Bootkit%20Threats%20-%20In%20Depth%20Reverse%20Engineering%20and%20Defense.pdf http://moflow.org/ref/Chopping%20-%20A%20Generalization%20of%20Slicing.pdf http://moflow.org/ref/Code-Reuse%20Attacks%20-%20New%20Frontiers%20and%20Defenses%20[bletsch].pdf http://moflow.org/ref/Creating%20Vulnerability%20Signatures%20Using%20Weakest%20Preconditions.pdf http://moflow.org/ref/DART%20-%20Directed%20Automated%20Random%20Testing.pdf http://moflow.org/ref/Dealing%20with%20next-generation%20malware.pdf http://moflow.org/ref/Debugging%20Tech%20Guide%20Dev.pdf http://moflow.org/ref/Deriving%20Input%20Syntactic%20Structure%20From%20Execution.pdf http://moflow.org/ref/Developing%20Applications%20With%20Objective%20Caml.pdf http://moflow.org/ref/Dynamic%20Taint%20Analysis%20and%20Forward%20Symbolic%20Execution.pdf http://moflow.org/ref/Dynamic%20Taint%20Analysis%20for%20Automatic%20Detection,%20Analysis,%20and%20Signature%20Generation%20of%20Exploits%20on%20Commodity%20Software.pdf http://moflow.org/ref/Dynamic%20Test%20Generation%20for%20Large%20Binary%20Programs.pdf http://moflow.org/ref/Dytan%20-%20A%20Generic%20Dynamic%20Taint%20Analysis%20Framework.pdf http://moflow.org/ref/EXE%20-%20A%20System%20for%20Automatically%20Generating%20Inputs%20of%20Death%20Using%20Symbolic%20Execution.pdf http://moflow.org/ref/Enabling%20Sophisticated%20Analyses%20of%20x86%20Binaries%20with%20RevGen.pdf http://moflow.org/ref/Experiences%20with%20Model%20Inference%20Assisted%20Fuzzing.pdf http://moflow.org/ref/Flayer%20-%20Exposing%20Application%20Internals.pdf http://moflow.org/ref/Following%20the%20White%20Rabbit%20-%20Software%20attacks%20against%20Intel%20VT-d%20technology.pdf http://moflow.org/ref/Generating%20Test%20Data%20with%20Enhanced%20Context%20Free%20Grammars.pdf http://moflow.org/ref/Grammar-Based%20Specification%20and%20Parsing%20of%20Binary%20File%20Formats.pdf http://moflow.org/ref/Grammar-based%20Whitebox%20Fuzzing.pdf http://moflow.org/ref/IDA%20PLUG-IN%20WRITING%20IN%20C%20and%20C++.pdf http://moflow.org/ref/IDA_Pro_Shortcuts.pdf http://moflow.org/ref/IntScope%20-%20Automatically%20Detecting%20Integer%20Overflow%20Vulnerability%20in%20X86%20Binary%20Using%20Symbolic%20Execution.pdf http://moflow.org/ref/Introduction%20to%20OCaml.pdf http://moflow.org/ref/Jump-Oriented%20Programming%20-%20A%20New%20Class%20of%20Code-Reuse%20Attack.pdf http://moflow.org/ref/LZfuzz%20-%20a%20fast%20compression-based%20fuzzer%20for%20poorly%20documentd%20protocols.pdf http://moflow.org/ref/Metsploit%20Unleashed.pdf http://moflow.org/ref/Packed,%20Printable,%20and%20Polymorphic%20Return-Oriented%20Programming.pdf http://moflow.org/ref/Polyglot%20-%20Automatic%20Extraction%20of%20Protocol%20Message%20Format%20using%20Dynamic%20Binary%20Analysis.pdf http://moflow.org/ref/Prospex%20-%20Protocol%20Specification%20Extraction.pdf http://moflow.org/ref/Python%20arsenal%20for%20RE.pdf http://moflow.org/ref/Q%20-%20Exploit%20Hardening%20Made%20Easy.pdf http://moflow.org/ref/REIL%20-%20A%20platform-independent%20intermediate%20representation%20of%20disassembled%20code%20for%20static%20code%20analysis.pdf http://moflow.org/ref/RWset%20-%20Attacking%20Path%20Explosion%20in%20Constraint-Based%20Test%20Generation.pdf http://moflow.org/ref/Renovo%20-%20A%20Hidden%20Code%20Extractor%20for%20Packed%20Executables.pdf http://moflow.org/ref/Retrofitting%20Security%20in%20COTS%20Software%20with%20Binary%20Rewriting.pdf http://moflow.org/ref/Return-Oriented%20Programming%20without%20Returns.pdf http://moflow.org/ref/Smashing%20the%20Gadgets%20-%20Hindering%20Return-Oriented%20Programming%20Using%20In-Place%20Code%20Randomization.pdf http://moflow.org/ref/SplitScreen%20-%20Enabling%20Efficient,%20Distributed%20Malware%20Detection.pdf http://moflow.org/ref/String%20Oriented%20Programming.pdf http://moflow.org/ref/Symbolic%20Execution%20Algorithms%20for%20Test%20Generation.pdf http://moflow.org/ref/Symbolic%20Execution%20for%20Software%20Testing%20in%20Practice%20-%20Preliminary%20Assessment.pdf http://moflow.org/ref/TIE%20-%20Principled%20Reverse%20Engineering%20of%20Types%20in%20Binary%20Programs.pdf http://moflow.org/ref/The%20CLASP%20Application%20Security%20Process.pdf http://moflow.org/ref/Theory%20and%20Techniques%20for%20Automatic%20Generation%20of%20Vulnerability-Based%20Signatures.pdf http://moflow.org/ref/Undangle%20-%20Early%20Detection%20of%20Dangling%20Pointers%20in%20Use-After-Free.pdf http://static.usenix.org/event/vee06/full_papers/p154-bhansali.pdf http://pintool.org/ http://www.utdallas.edu/~zhiqiang.lin/ http://www.utdallas.edu/~zhiqiang.lin/file/LibsafeXP.tar.gz http://eprint.iacr.org/curr/ http://en.wikipedia.org/wiki/Degree_of_anonymity http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf http://cryptome.org/2013/12/Full-Disclosure.pdf https://www.thc.org/papers/ffp.html http://okturtles.com/other/dnsnmc_okturtles_overview.pdf http://cyberside.net.ee/docs/Cryptanalysis%20of%20the%20Random%20Number%20Generator%20of%20the%20Windows%20Operating%20System.pdf https://bitmessage.org/bitmessage.pdf http://www.bus.iastate.edu/nilakant/MIS539/Greenstadt2004.pdf http://coitweb.uncc.edu/~yonwang/papers/ldpcsss.pdf http://virtualhost.cs.columbia.edu/~danr/courses/6772/Fall06/papers/sybil.pdf http://air.unimi.it/bitstream/2434/147773/2/passat2010.pdf http://ilpubs.stanford.edu:8090/1046/1/VLDB_SDM_CameraReady.pdf http://cypherspace.org/adam/pubs/traffic.pdf http://zeroknowledge.com/ http://math.ucr.edu/~mike/zipattacks.pdf http://illmatics.com/remote%20attack%20surfaces.pdf http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf https://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf http://bojinov.org/professional/usenixsec2012-rubberhose.pdf https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-bonneau.pdf http://cr.yp.to/talks/2014.10.18/slides-djb-20141018-a4.pdf http://eprint.iacr.org/2011/497.pdf https://factorable.net/weakkeys12.extended.pdf http://www.cis.upenn.edu/~stevez/papers/ZNMZ12.pdf http://www.freehaven.net/anonbib/cache/sassaman:wpes2005.pdf http://bunniefoo.com/nostarch/HackingTheXbox_Free.pdf https://www.usenix.org/legacy/events/sec08/tech/full_papers/adida/adida.pdf http://www.nosuchcon.org/talks/2014/D1_01_Rolf_Rolles_Program_Synthesis_in_reverse_Engineering.pdf http://www.ece.vt.edu/chaowang/pubDOC/EldibW14CAV.pdf http://www.cs.columbia.edu/~mikepo/papers/gpukeylogger.eurosec13.pdf https://ritter.vg/p/AAM-defcon13.pdf http://eprint.iacr.org/2016/253.pdf http://www.cs.rice.edu/~dwallach/pub/crosby-timing2009.pdf http://www.weboftrust.info/downloads/dpki.pdf http://cyber.bgu.ac.il/t/USBee.pdf https://www.icann.org/en/system/files/files/caribnog-dnssec-design-module1-12jun12-en.pdf ftp://ftp.registro.br/pub/gter/gter30/05-DNSSEC-root-sign.pdf https://www.defcon.org/images/defcon-25/DEF%20CON%2025%20voting%20village%20report.pdf