Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
The Evolution of the Unix Time-sharing System. Dennis M. Ritchie.
DTrace: The Reverse Engineer’s Unexpected Swiss Army Knife. Tiller Beauchamp, David Weston.
Fingerprinting Passports. Henning Richter, Wojciech Mostowski, and Erik Poll.
The Google File System. Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung.
Bigtable: A Distributed Storage System for Structured Data. Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Gruber.
0-Day Patch Exposing Vendors (In)security Performance. Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner.
Cryptanalytic Attacks on Pseudorandom Number Generators. J. Kelsey, B. Schneier, D. Wagner, and C. Hall.