* [ ] ["Post-Spectre Web Development"](https://www.w3.org/TR/post-spectre-webdev/)
* [ ] Herley and van Oorschot (2017), ["SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit"](https://ieeexplore.ieee.org/abstract/document/7958573)
* [ ] Rutkowska (2015), ["State Considered Harmful"](https://blog.invisiblethings.org/papers/2015/state_harmful.pdf)
* [ ] Saitta (2022), ["Security Styles"](https://www.youtube.com/watch?v=xlB8uIyQ2lY)
* [ ] Wheeler (2005), ["Countering Trusting-Trust through Diverse Double-Compiling"](https://dwheeler.com/trusting-trust/wheelerd-trust.pdf)
## Code-signing
- [ ] Lester et al. (2016), ["System and Method of Cryptographically Signing Web Applications"](https://patents.google.com/patent/US9906369B2)
## DNS-based command and control
- [ ] Ullrich (2016), ["Command and Control Channels Using 'AAAA' DNS Records"](https://isc.sans.edu/diary/Command+and+Control+Channels+Using+AAAA+DNS+Records/21301)
- [ ] Dietrich et al. (2015), ["On Botnets that use DNS for Command and Control"](https://norbert-pohlmann.com/app/uploads/2015/08/279-On-Botnets-that-use-DNS-for-Command-and-Control-Prof-Norbert-Pohlmann.pdf)
- [ ] Garmiza (2022), ["DNS over HTTPS as a Covert Command and Control Channel"](https://www.varonis.com/blog/dns-over-https-as-a-covert-command-and-control-channel)
- [ ] Xu et al. (2011), ["DNS for Massive-Scale Command and Control"](https://yaogroup.cs.vt.edu/papers/journal-DNS-CC.pdf)
## Network security
- Pozo et al. (2008), ["AFPL, an Abstract Language Model for Firewall ACLs"](https://link.springer.com/chapter/10.1007/978-3-540-69848-7_39)
- Zhang et al. (2007), ["Specifications of a High-level Conflict-Free Firewall Policy Language for Multi-domain Networks"](https://dl.acm.org/doi/10.1145/1266840.1266871)
## Side channels
- [ ] Daniel et al. (2023), ["ProSpeCT: Provably Secure Speculation for the Constant-Time Policy"](https://arxiv.org/abs/2302.12108)