Bypassing Browser Memory Protections. Setting back browser security by 10 years. Alexander Sotirov, Mark Dowd.
The experience of the Lawrence Berkeley Laboratory in tracking an intruder suggests that any operating system is insecure when obvious security rules are ignored. How a site should respond to an intrusion, whether it is possible to trace an intruder trying to evade detection, what can be learned from tracking an intruder, what methods the intruder used, and the responsiveness of the law-enforcement community are also discussed.
pixar's research papers on graphics.
about the class dispatcher, among others
still valid, except that the dispatcher algorithm was replaced by C3 in Python 2.3
session papers of the first usenix workshop on large-scale exploits and emergent threats.
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
The Evolution of the Unix Time-sharing System. Dennis M. Ritchie.
DTrace: The Reverse Engineer’s Unexpected Swiss Army Knife. Tiller Beauchamp, David Weston.