Useful Papers

These papers provide a non-exhaustive list of research related to material that will be presented in class. Some of them will be explicitly presented in class, while others will provide additional concrete examples and extensions to the material in class. Further material may be be presented that is not in the list.

A paper may fall into multiple categories, but each paper is listed once.

While reading papers in this list, you may wish to focus on your paper reading methodology. [1] [2] [3] [4] [5] [6]

You might also think about writing papers of your own. [1] [2]

Further Sources

There are many conferences in jourals with related material. In particular, these conferences regularly have interesting related techniques and studies:
ASE, ASPLOS, BAR, Blackhat, CC, CCC, CCS, CGO, DSN, ESSoS, FASE, FSE, ICPC, ICSA, ICSE, ICSM, ICST, ISSTA, MSR, NDSS, OOPSLA, PLAS, PLDI, POPL, RAID, SANER, SBSE, S&P, SecDev, USENIX Security

Overview of Topics

Design

Test Process

Test Generation

Bugs and Repair

Performance

Dataflow Analysis

Abstract Interpretation

Formal Systems for Program Analysis

Concurrency and Parallelism

Interacting with Compilers

Attacking and Exploit Discovery

Defence and Automated Software Hardening

Reverse Engineering

Designing for Security

Program Synthesis