"a model of internet topology using k-shell decomposition", shai carmi, shlomo havlin, scott kirkpatrick, yuval shavitt, eran shir.
"breaking 104 bit wep in less than 60 seconds", erik tews, ralf-philipp weinmann and andrei pyshkin.
A Critique of the GNU Hurd Multi-server Operating System. Neal H. Walfield, Marcus Brinkmann.
Reprinted from: CACM 27/8, pp. 761-763 » .
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
DTrace: The Reverse Engineer’s Unexpected Swiss Army Knife. Tiller Beauchamp, David Weston.
Bypassing Browser Memory Protections. Setting back browser security by 10 years. Alexander Sotirov, Mark Dowd.
Bigtable: A Distributed Storage System for Structured Data. Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, and Robert E. Gruber.
0-Day Patch Exposing Vendors (In)security Performance. Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner.