* [ ] ["Post-Spectre Web Development"](https://www.w3.org/TR/post-spectre-webdev/) * [ ] Herley and van Oorschot (2017), ["SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit"](https://ieeexplore.ieee.org/abstract/document/7958573) * [ ] Rutkowska (2015), ["State Considered Harmful"](https://blog.invisiblethings.org/papers/2015/state_harmful.pdf) * [ ] Saitta (2022), ["Security Styles"](https://www.youtube.com/watch?v=xlB8uIyQ2lY) * [ ] Wheeler (2005), ["Countering Trusting-Trust through Diverse Double-Compiling"](https://dwheeler.com/trusting-trust/wheelerd-trust.pdf) ## Code-signing - [ ] Lester et al. (2016), ["System and Method of Cryptographically Signing Web Applications"](https://patents.google.com/patent/US9906369B2) ## DNS-based command and control - [ ] Ullrich (2016), ["Command and Control Channels Using 'AAAA' DNS Records"](https://isc.sans.edu/diary/Command+and+Control+Channels+Using+AAAA+DNS+Records/21301) - [ ] Dietrich et al. (2015), ["On Botnets that use DNS for Command and Control"](https://norbert-pohlmann.com/app/uploads/2015/08/279-On-Botnets-that-use-DNS-for-Command-and-Control-Prof-Norbert-Pohlmann.pdf) - [ ] Garmiza (2022), ["DNS over HTTPS as a Covert Command and Control Channel"](https://www.varonis.com/blog/dns-over-https-as-a-covert-command-and-control-channel) - [ ] Xu et al. (2011), ["DNS for Massive-Scale Command and Control"](https://yaogroup.cs.vt.edu/papers/journal-DNS-CC.pdf) ## Network security - Pozo et al. (2008), ["AFPL, an Abstract Language Model for Firewall ACLs"](https://link.springer.com/chapter/10.1007/978-3-540-69848-7_39) - Zhang et al. (2007), ["Specifications of a High-level Conflict-Free Firewall Policy Language for Multi-domain Networks"](https://dl.acm.org/doi/10.1145/1266840.1266871) ## Side channels - [ ] Daniel et al. (2023), ["ProSpeCT: Provably Secure Speculation for the Constant-Time Policy"](https://arxiv.org/abs/2302.12108)