Hacker News
- An Architecture for Combinator Graph Reduction (1992) https://users.ece.cmu.edu/~koopman/tigre/index.html 0 comments
- Stack Computers: the new wave (1989) [pdf] https://users.ece.cmu.edu/~koopman/stack_computers/stack_computers_book.pdf 28 comments
- Stack Computers: the new wave (1989) https://users.ece.cmu.edu/~koopman/stack_computers/index.html 48 comments
- Compilers, Hands-Off My Hands-On Optimizations (2016) [pdf] https://users.ece.cmu.edu/~franzf/papers/wpmvp16.pdf 2 comments
- Reflections on Trusting Trust (1984) [pdf] http://users.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf 21 comments
- Maximal Length LFSR Feedback Terms https://users.ece.cmu.edu/~koopman/lfsr/index.html 3 comments
- A Brief Introduction to Forth (1993) https://users.ece.cmu.edu/~koopman/forth/hopl.html 30 comments
- Stack Computers: 4.4 Architecture of the Novix NC4016 (1989) https://users.ece.cmu.edu/~koopman/stack_computers/sec4_4.html 21 comments
- CRC Polynomial Zoo https://users.ece.cmu.edu/~koopman/crc/crc32.html 2 comments
- Stack Computers: the new wave (1989) https://users.ece.cmu.edu/~koopman/stack_computers/ 28 comments
- Best Computer Architecture Course Ever http://users.ece.cmu.edu/~omutlu/lecture-videos.html 6 comments
- Flipping Bits in Memory Without Accessing Them [pdf] http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf 3 comments
- Stack Computers: the new wave (1989) http://users.ece.cmu.edu/~koopman/stack_computers/index.html 3 comments
- MAYHEM – automatically finding bugs and shell-spawning exploits in binaries [pdf] http://users.ece.cmu.edu/~sangkilc/papers/oakland12-cha.pdf 53 comments
Lobsters
- Stack Computers: The New Wave https://users.ece.cmu.edu/~koopman/stack_computers/index.html 4 comments hardware , pdf , plt
- All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (2010) https://users.ece.cmu.edu/~aavgerin/papers/Oakland10.pdf 4 comments formalmethods , pdf , programming , security
- Building Safer UGV's with Run-time, Safety Invariants (2009) http://users.ece.cmu.edu/~koopman/pubs/wagner09_safer_ugvs.pdf 3 comments pdf , programming , security , slides
- Ken Thompson: Reflections on Trusting Trust (Turing Award Lecture) https://users.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf 10 comments linux
- Ken Thompson, Reflections on Trusting Trust (Turing Award Lecture) https://users.ece.cmu.edu/%7Eganger/712.fall02/papers/p761-thompson.pdf 4 comments programming
- Compiler plugin to combat time based attacks possible? http://users.ece.cmu.edu/~jburket/compilers/final_update.pdf 3 comments rust
- Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf 18 comments programming
- A Case Study of Toyota Unintended Acceleration and Software Safety http://users.ece.cmu.edu/~koopman/pubs/koopman14_toyota_ua_slides.pdf 110 comments programming
- Unleashing MAYHEM on Binary Code - Automated hybrid binary analysis that results in shell-spawning exploits http://users.ece.cmu.edu/~sangkilc/papers/oakland12-cha.pdf 10 comments netsec
- Security tool automatically finds and exploits 1.2K bugs on Debian [scribd] http://users.ece.cmu.edu/~sangkilc/papers/oakland12-cha.pdf 50 comments linux