Sophie Chen
ResumeLinkedInGitHubBluesky
Thoughts
Thoughts
  • Thoughts
  • Reading List
  • Cybersecurity Resources
Powered by GitBook
On this page
  • Current Reading List
  • Computer Science
  • Cybersecurity
  • Technology and Society

Reading List

Last updated 15 hours ago


This list is a compilation of classic papers, my personal favorite readings, and what I am currently reading in the fields of computer science and cybersecurity.

Current Reading List

  • by Aleph One (1996)

  • by Brian Carrier (2005)

  • by Michael Sikorski and Andrew Honig (2012)

  • by Michael Hale Ligh, Andrew Case, Jamie Levy, and AAron Walters (2014)

  • by Scott J. Roberts and Rebekah Brown (2017)

Computer Science

  • by Edsger Dijkstra (1968)

  • by Dennis Ritchie and Kenneth Thompson (1974)

  • by Leslie Lamport (1978)

  • by Jerry Saltzer, David Reed, and David Clark (1984)

Cybersecurity

  • by Adi Shamir (1979)

  • by David Chaum (1981)

  • by Ken Thompson (1984)

  • by Dorothy Denning (1987)

  • by Ross Anderson (1994)

  • by Martin Abadi and Roger Needham (1996)

  • by Ross Anderson and Roger Needham (2005)

  • by Barbara Guttman and Douglas White (2022)

  • by James Lyle, Barbara Guttman, John Butler, Kelly Sauerwein, Christina Reed, and Corrine Lloyd (2022)

  • by Graeme Horsman (2024)

Technology and Society


For digital forensics readings, also check out r/computerforensics's . SWGDE also publishes for forensic practitioners.

by Phillip Rogaway (2015)

by Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell (2018)

by Pratyusha Ria Kalluri, William Agnew, Myra Cheng, Kentrell Owens, Luca Soldaini, and Abeba Birhane (2023)

⋅ ⋅

Smashing The Stack For Fun And Profit
File System Forensic Analysis
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Intelligence-Driven Incident Response: Outwitting the Adversary
Go To Statement Considered Harmful
The Unix Time-Sharing System
Time, Clocks, and the Ordering of Events in a Distributed System
End-To-End Arguments in System Design
How to Share a Secret
Security without Identification: Transaction Systems to Make Big Brother Obsolete
Reflections on trusting trust
An Intrusion-Detection Model
Why Cryptosystems Fail
Prudent Engineering Practice for Cryptographic Protocols
Programming Satan's Computer
Digital Evidence Preservation
Digital Investigation Techniques: A NIST Scientific Foundation Review
Sources of error in digital forensics
reading list
best practices
The Moral Character of Cryptographic Work
“A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology
The Surveillance AI Pipeline
Thoughts
Home
Work