I really like to read... here's a list of almost everything I've read since I started tracking in April 2025. :)
2026
May
- paper Conditional Memory via Scalable Lookup: A New Axis of Sparsity for Large Language Models
- paper MLIR: Scaling Compiler Infrastructure for Domain Specific Computation
- article Version-controlled databases using Prolly trees
- book Database System Concepts, 7th Edition — Chapter 24
- article State of RL for reasoning LLMs
- paper Memory Is All You Need: An Overview of Compute-in-Memory Architectures for Accelerating Large Language Model Inference
- paper A Mathematical Framework for Transformer Circuits
- paper Guided Flow Policy: Learning from High-Value Actions in Offline Reinforcement Learning
- article On pages and folios
- paper CudaDMA: Optimizing GPU Memory Bandwidth via Warp Specialization
- paper Shared Memory Consistency Models: A Tutorial
- paper Efficient Online Reinforcement Learning with Offline Data
April
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Chapter 7
- paper SIEVE is Simpler than LRU: an Efficient Turn-Key Eviction Algorithm for Web Caches
- paper Efficient Gossip Protocols for Verifying the Consistency of Certificate Logs
- paper Q-Learning with Adjoint Matching
- book Database Internals — Chapter 14
- book Deep Learning: Foundations and Concepts — Chapter 11
- paper Dissecting and Modeling the Architecture of Modern GPU Cores
- paper Binary Rewriting without Control Flow Recovery
- article MoQ: Refactoring the Internet's real-time media stack
- paper Deep Residual Learning for Image Recognition
- paper (State of) The Art of War: Offensive Techniques in Binary Analysis
- book Database System Concepts, 7th Edition — Chapter 23
- article π0.7: a Steerable Model with Emergent Capabilities
- book Deep Learning: Foundations and Concepts — Chapter 12
- article Protecting against TPM interposer attacks
- article What is Dragonfly+ Network Topology & Why It Matters for Large‑Scale AI Data Centers
- article Cybersecurity Looks Like Proof of Work Now
- paper A Software-defined Tensor Streaming Multiprocessor for Large-scale Machine Learning
- book Database Internals — Chapter 13
- paper Simba: Scaling Deep-Learning Inference with Chiplet-Based Architecture
- paper BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware
- paper Reinforcement Learning and Control as Probabilistic Inference: Tutorial and Review
- paper Adversaries Can Misuse Combinations of Safe Models
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Chapter 6
- book Database System Concepts, 7th Edition — Chapter 22
- book Database Internals — Chapter 12
- paper Improving Alignment and Robustness with Circuit Breakers
- book Deep Learning: Foundations and Concepts — Chapter 10
- article YOLO: Algorithm for Object Detection Explained [+Examples]
- paper Scaling Monosemanticity: Extracting Interpretable Features from Claude 3 Sonnet
- article Assessing Claude Mythos Preview’s cybersecurity capabilities
- paper AI+HW 2035: Shaping the Next Decade
- paper Cilk: An Efficient Multithreaded Runtime System
- paper Measuring Security Practices and How They Impact Security
- paper So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users
- article Project Glasswing
- book Database System Concepts, 7th Edition — Chapter 21
- book Deep Learning: Foundations and Concepts — Chapter 9
- book Database Internals — Chapter 11
- article Zoom In: An Introduction to Circuits
- paper A Practical and Secure Byzantine Robust Aggregator
- paper Emotion Concepts and their Function in a Large Language Model
- paper Rethinking Web Cache Design for the AI Era
- article Why we're rethinking cache for the AI era
- paper Sever: A Robust Meta-Algorithm for Stochastic Optimization
- paper Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Chapter 5
- article On the Effectiveness of Mutational Grammar Fuzzing
- article Vulnerability Research Is Cooked
March
- article Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly
- paper Goal Misgeneralization in Deep Reinforcement Learning
- book Digital Design with Chisel — Chapter 10
- book Database System Concepts, 7th Edition — Chapter 20
- book Database System Concepts, 7th Edition — Chapter 19
- article Deriving Muon
- paper Joe-E: A Security-Oriented Subset of Java
- article Quantile & Expectile Regression
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Appendix G
- article TurboQuant: Redefining AI efficiency with extreme compression
- article Practical uses for a null filesystem
- article More timing side-channels for the page cache
- article A safer kmalloc() for 7.0
- paper MONA: Myopic Optimization with Non-myopic Approval Can Mitigate Multi-step Reward Hacking
- article Retries: An interactive study of common retry methods
- article Prompt caching: 10x cheaper LLM tokens, but how?
- article The Q, K, V Matrices
- article Reservoir Sampling
- paper Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis
- article What is δ, and what δifference does it make?
- article the broken economics of databases
- paper Telex: Anticensorship in the Network Infrastructure
- book Deep Learning: Foundations and Concepts — Chapter 8
- paper QEMU, a Fast and Portable Dynamic Translator
- paper Firecracker: Lightweight Virtualization for Serverless Applications
- paper Monitoring Reasoning Models for Misbehavior and the Risks of Promoting Obfuscation
- book Database Internals — Chapter 10
- book Database Internals — Chapter 9
- article Reverse Engineering Claude Desktop's Cowork Mode: A Deep Dive into VM Isolation and Linux Possibilities
- paper SoK: DARPA’s AI Cyber Challenge (AIxCC): Competition Design, Architectures, and Lessons Learned
- book Digital Design with Chisel — Chapter 9
- paper A Survey on the Memory Mechanism of Large Language Model based Agents
- book Digital Design with Chisel — Chapter 8
- paper General Agentic Memory Via Deep Research
- article Reconsidering the multi-generational LRU
- book Deep Learning: Foundations and Concepts — Chapter 6
- paper A preliminary architecture for a basic data-flow processor
- article Vector Clocks
- paper Time, Clocks, and the Ordering of Events in a Distributed System
- book Database System Concepts, 7th Edition — Chapter 18
- book Database Internals — Chapter 8
- paper StruQ: Defending Against Prompt Injection with Structured Queries
- paper The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against LLM Jailbreaks and Prompt Injections
- paper Meta SecAlign: A Secure Foundation LLM Against Prompt Injection Attacks
- article Tutorial: The Kalman Filter
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 9
- article Technology preview: Private contact discovery for Signal
- book Digital Design with Chisel — Chapter 7
- book Digital Design with Chisel — Chapter 6
- paper Universal and Transferable Adversarial Attacks on Aligned Language Models
- article A Unix Manifesto for the Age of AI
- book Distributed Systems for Fun and Profit — Chapter 5
- book Distributed Systems for Fun and Profit — Chapter 4
- book Database System Concepts, 7th Edition — Chapter 17
- book Deep Learning: Foundations and Concepts — Chapter 15
- paper SK2Decompile: LLM-based Two-Phase Binary Decompilation from Skeleton to Skin
- paper A Look Back at “Security Problems in the TCP/IP Protocol Suite”
- book Distributed Systems for Fun and Profit — Chapter 3
- book Distributed Systems for Fun and Profit — Chapter 2
- book Distributed Systems for Fun and Profit — Chapter 1
- book Distributed Systems for Fun and Profit — Introduction
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Chapter 4
- book Database Internals — Chapter 7
- article Count-Min Sketch: The Art and Science of Estimating Stuff
- paper A Performance Counter Architecture for Computing Accurate CPI Components
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 8
- article Ready, Set, Go — Golang Internals and Symbol Recovery
- paper LLM4Decompile: Decompiling Binary Code with Large Language Models
- paper Opaque: An Oblivious and Encrypted Distributed Analytics Platform
- article Open-source Discord alternatives
- paper Roofline: An Insightful Visual Performance Model for Floating-Point Programs and Multicore Architectures
- book Deep Learning: Foundations and Concepts — Chapter 7
- book Database System Concepts, 7th Edition — Chapter 16
- article Variational Inference Part 1: Introduction and Coordinate Ascent
- paper Direct Preference Optimization: Your Language Model is Secretly a Reward Model
- article The Reparameterization Trick
- article Dataflow CPUs
- book Database System Concepts, 7th Edition — Chapter 15
- paper Shielding Applications from an Untrusted Cloud with Haven
- paper Training language models to follow instructions with human feedback
- book Database System Concepts, 7th Edition — Chapter 2
- article The Bw-Tree
- book Database Internals — Chapter 6
- paper Tree Indexing on Flash Disks
- book Digital Design with Chisel — Chapter 5
- book Digital Design with Chisel — Chapter 4
- paper Chatbot Arena: An Open Platform for Evaluating LLMs by Human Preference
- book Database System Concepts, 7th Edition — Chapter 1
- article Nobody ever got fired for using a struct
- paper Spectre Attacks: Exploiting Speculative Execution
- paper Phantom: Exploiting Decoder-detectable Mispredictions
- article Reinforcement Learning for LLMs
February
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 7
- paper FlashAttention: Fast and Memory-Efficient Exact Attention with IO-Awareness
- article What is the KV cache?
- article Seq2Seq models and the Attention mechanism
- article Block-sparse Attention: A Comprehensive Guide for 2025
- paper Measuring AI Ability to Complete Long Tasks
- paper Remote Timing Attacks are Practical
- paper Decoupled Access/Execute Computer Architectures
- article Can you reverse engineer our neural network?
- book Deep Learning: Foundations and Concepts — Chapter 4
- article More accurate congestion notification for TCP
- article Does Your Reasoning Model Implicitly Know When to Stop Thinking?
- paper An O(1) algorithm for implementing the LFU cache eviction scheme
- paper TinyLFU: A Highly Efficient Cache Admission Policy
- article Extending that XOR Trick to Billions of Rows - an Introduction to Invertible Bloom Filters
- article That XOR Trick
- article How Variable-Increment Counting Bloom Filters Work
- book Database Internals — Chapter 5
- article Bloom Filters Explained
- paper Privacy Integrated Queries
- paper RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
- article The ABCs of Differential Privacy
- article Detecting and preventing distillation attacks
- article The First Fully General Computer Action Model
- article How does rejection sampling work?
- paper GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 6
- article Magic-trace: Diagnosing tricky performance issues easily with Intel Processor Trace
- article Modernizing swapping: the end of the swap map
- article Evolving Git for the next decade
- article Switching from Git to Jujutsu
- paper A stateless, content-directed data prefetching mechanism
- paper HBM (High Bandwidth Memory) DRAM Technology and Architecture
- paper LoRA: Low-Rank Adaptation of Large Language Models
- paper Attention Is All You Need
- article How the Bitcoin protocol actually works
- paper Bitcoin: A Peer-to-Peer Electronic Cash System
- paper Decoupled Vector Runahead
- book Digital Design with Chisel — Chapter 2
- book Database Internals — Chapter 4
- paper CONIKS: Bringing Key Transparency to End Users
- book Introduction to Modern Cryptography — Chapter 3
- paper Providing Authentication and Integrity in Outsourced Databases using Merkle Hash Tree’s
- paper The ZCache: Decoupling Ways and Associativity
- article Slabs, sheaves, and barns
- paper An Overview of Cuckoo Hashing
- article Designing AI-resistant technical evaluations
- article Modernizing swapping: introducing the swap table
- article Compiling Rust to readable C with Eurydice
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 5
- book Deep Learning: Foundations and Concepts — Chapter 4
- book Deep Learning: Foundations and Concepts — Chapter 3
- book Database Internals — Chapter 3
- book Database Internals — Chapter 2
- paper The Alignment Problem from a Deep Learning Perspective
- paper RL Is a Hammer and LLMs are Nails: a Simple Reinforcement Learning Recipe for Strong Prompt Injection
- article A vision researcher’s guide to some RL stuff: PPO & GRPO
- paper Defeating Prompt Injections by Design
- article Core Views on AI Safety: When, Why, What, and How
- paper The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions
- paper Vector Runahead
- paper Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
- book Deep Learning: Foundations and Concepts — Chapter 2
- article Linux Kernel Runtime Guard reaches its 1.0 release
- article Filesystem medley: EROFS, NTFS, and XFS
- article The GNU C Library version 2.43 is now available
- article Model Quantization: Concepts, Methods, and Why It Matters
- paper AI and Memory Wall
- paper Hitting the Memory Wall: Implications of the Obvious
- paper Evaluating SFI for a CISC Architecture
- book Foundations of Cryptography, Volume 1: Basic Tools — Chapter 3
- book Database Internals — Chapter 1
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 4
- article Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit
- paper Preventing Privilege Escalation
- paper Formally Verified Worst-Case Execution Time Analysis of Distributed Lingua Franca Systems via GameTime
- book Deep Learning: Foundations and Concepts — Chapter 1
January
- paper Cramming More Components onto Integrated Circuits
- paper Conservation Cores: Reducing the Energy of Mature Computations
- paper Fuzzing Intro
- article Responses to gpg.fail
- article LWN Brief 1/29/2026
- article Anthropic is Winning by Trying to Lose
- paper Dark Silicon and the End of Multicore Scaling
- article Why Behavioral Cloning?
- article Slotted Pages
- book learncpp.com — Chapter 28
- paper Symbolic Execution for Software Testing: Three Decades Later
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 3
- book learncpp.com — Chapter 27
- paper Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors
- paper Hacking Blind
- paper Framing Dependencies Introduced by Underground Commoditization
- book learncpp.com — Chapter 26
- paper Click Trajectories: End-to-End Analysis of the Spam Value Chain
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 2
- article Microcode
- book learncpp.com — Chapter 25
- paper Spamalytics: An Empirical Analysis of Spam Marketing Conversion
- book learncpp.com — Chapter 24
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Chapter 3
- book Reinforcement Learning: An Introduction, 2nd Edition — Chapter 1
- book learncpp.com — Chapter 23
- book learncpp.com — Chapter 22
- article Clang Hardening Cheat Sheet - Ten Years Later
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Appendix C
- book learncpp.com — Chapter 21
- article Introduction to the Zettelkasten Method
- article Put an io_uring on it - Exploiting the Linux Kernel
- article Predictions for the new year
- article 2025 Linux and free software timeline
- article The difficulty of safe path traversal
- book learncpp.com — Chapter 20
- book learncpp.com — Chapter 19
- book learncpp.com — Chapter 18
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Chapter 2
- book learncpp.com — Chapter 17
- book Deep Learning — Chapter 12
- book Computer Architecture, A Quantitative Approach, Sixth Edition — Chapter 1
- book learncpp.com — Chapter 16
- paper NEURAL MACHINE TRANSLATION BY JOINTLY LEARNING TO ALIGN AND TRANSLATE
- book Deep Learning — Chapter 11
- book Deep Learning — Chapter 10
- article Kernel bugs hide for 2 years on average. Some hide for 20.
- book learncpp.com — Chapter 15
- book learncpp.com — Chapter 14
- book Deep Learning — Chapter 9
- article Zen and the Art of Microcode Hacking
- paper Mooncake: Trading More Storage for Less Computation — A KVCache-centric Architecture for Serving LLM Chatbot
- book learncpp.com — Chapter 13
- article A Fuzzy Escape - A tale of vulnerability research on hypervisors
- book Deep Learning — Chapter 8
- book learncpp.com — Chapter 12
- book learncpp.com — Chapter F
- book learncpp.com — Chapter 11
- book Deep Learning — Chapter 7
- book Quant Bible - MIT
- book Deep Learning — Chapter 6
2025
December
- book learncpp.com — Chapter 10
- book learncpp.com — Chapter 9
- book learncpp.com — Chapter 8
- book Deep Learning — Chapter 5
- book learncpp.com — Chapter 7
- book learncpp.com — Chapter O
- book learncpp.com — Chapter 6
- book Deep Learning — Chapter 4
- book learncpp.com — Chapter 5
- paper RIDL: Rogue In-Flight Data Load
- paper FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
- book learncpp.com — Chapter 4
- book Deep Learning — Chapter 3
- book Deep Learning — Chapter 2
- book Deep Learning — Chapter 1
- book learncpp.com — Chapter 3
- article Google's Commitment to a Quantum-Safe Future: Why PQC is Google's Path forward and not QKD
- article Project Rain:L1TF
- paper SkyPilot: An Intercloud Broker for Sky Computing
- article Thinking Outside The Box
- article Defeating KASLR by Doing Nothing at All
- article Just: a command runner
- article Checked-size array parameters in C
- article Zig's new plan for asynchronous programs
- article Optimization Countermeasures
- article A Gentle Introduction to LLVM IR
- article Hot-page migration and specific-purpose NUMA nodes
- paper Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing
November
- article Vulnerabilities in LUKS2 disk encryption for confidential VMs
- article The cryptography behind electronic passports
- article Toward fast, containerized, user-space filesystems
- article Protecting privacy with Tails
- article Why SSA?
- paper Glia: A Human-Inspired AI for Automated Systems Design and Optimization
- book Operating Systems: Principles and Practice — Chapter 14
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 8
- book Operating Systems: Principles and Practice — Chapter 13
- book Linux Kernel Development, 3rd Edition — Chapter 17
- book Linux Kernel Development, 3rd Edition — Chapter 14
- book Linux Kernel Development, 3rd Edition — Chapter 13
- article Safer speculation-free user-space access
- article Fil-C: A memory-safe C implementation
- article Enhancing FineIBT
- article Introducing Aardvark: OpenAI’s agentic security researcher
- article Introducing CodeMender: an AI agent for code security
- book Operating Systems: Principles and Practice — Chapter 12
- book Linux Kernel Development, 3rd Edition — Chapter 16
- book Linux Kernel Development, 3rd Edition — Chapter 15
- article UNIX Recovery Legend
- book Operating Systems: Principles and Practice — Chapter 11
- paper Forecasting GPU Performance for Deep Learning Training and Inference
- paper Concorde: Fast and Accurate CPU Performance Modeling with Compositional Analytical-ML Fusion
October
- book Operating Systems: Principles and Practice — Chapter 10
- paper NanoFlow: Towards Optimal Large Language Model Serving Throughput
- article Implementing a NFA - Building a Regex Engine Part 2
- article NFA vs DFA - Building a Regex Engine Part 10
- paper Monotasks: Architecting for Performance Clarity in Data Analytics Frameworks
- article The RubyGems.org takeover
- article Upcoming Rust language features for kernel development
- book Algorithms (DPV) — Chapter 8
- book Operating Systems: Principles and Practice — Chapter 9
- paper LinnOS: Predictability on Unpredictable Flash Storage with a Light Neural Network
- article TCMalloc Design
- book Linux Kernel Development, 3rd Edition — Chapter 12
- paper Contention-Aware Lock Scheduling for Transactional Databases
- article Lingua-Franca
- book Linux Kernel Development, 3rd Edition — Chapter 11
- book Operating Systems: Principles and Practice — Chapter 8
- paper A Top-Down Approach to Achieving Performance Predictability in Database Systems
- book Algorithms (DPV) — Chapter 7
- book Android Hackers Handbook — Chapter 2
- book Android Hackers Handbook — Chapter 1
- article UIUCTF 2025: "Bootkit"
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 7
- book Linux Kernel Development, 3rd Edition — Chapter 8
- paper Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters
- book Operating Systems: Principles and Practice — Chapter 7
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 6
- article What is RCU? -- “Read, Copy, Update”
- book Operating Systems: Principles and Practice — Chapter 6
- book Algorithms (DPV) — Chapter 6
- paper Programmable Packet Scheduling at Line Rate
- article CHERI with a Linux on top
- paper Universal Packet Scheduling
September
- book Linux Kernel Development, 3rd Edition — Chapter 7
- book Linux Kernel Development, 3rd Edition — Chapter 10
- book Linux Kernel Development, 3rd Edition — Chapter 9
- paper Designing a Predictable Internet Backbone with Valiant Load-Balancing
- article An EEVDF CPU scheduler for Linux
- article Stuffing the return stack buffer
- paper Dominant Resource Fairness: Fair Allocation of Multiple Resource Types
- article Pysa: An open source static analysis tool to detect and prevent security issues in Python code
- article Zoncolan: How Facebook uses static analysis to detect and prevent security issues
- paper DistServe: Disaggregating Prefill and Decoding for Goodput-optimized Large Language Model Serving
- article Typst: a possible LaTeX replacement
- article Comparing Rust to Carbon
- book Algorithms (DPV) — Chapter 5
- article From MCP to Shell
- paper Fast Distributed Inference Serving for Large Language Models
- book Linux Kernel Development, 3rd Edition — Chapter 6
- paper Taming Throughput-Latency Tradeoff in LLM Inference with Sarathi-Serve
- book learncpp.com — Chapter 2
- book learncpp.com — Chapter 1
- article What Shapes Do Matrix Multiplications Like?
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 5
- paper Shinjuku: Preemptive Scheduling for μsecond-scale Tail Latency
- paper ZygOS: Achieving Low Tail Latency for Microsecond-scale Networked Tasks
- article A Dumb Introduction to z3
- book Algorithms (DPV) — Chapter 4
- article TCMalloc : Thread-Caching Malloc
- paper Automatic Heap Layout Manipulation for Exploitation
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 4
- book Operating Systems: Principles and Practice — Chapter 3
- paper Maglev: A Fast and Reliable Software Network Load Balancer
- article Mooncake: a real-time storage engine for Apache Iceberg
- paper Load is not what you should balance: Introducing Prequal
- article Tracking trust with Rust in the kernel
- article The challenge of maintaining curl
- article Memory Integrity Enforcement: A complete vision for memory safety in Apple devices
- article Test driving “power of two random choices” load balancing
- article The power of two random choices
- book Algorithms (DPV) — Chapter 3
- book Linux Kernel Development, 3rd Edition — Chapter 4
- book Operating Systems: Principles and Practice — Chapter 4
- paper Applying Deep Learning to the Cache Replacement Problem
- article Multiple memory classes for address-space isolation
- article Another try for address-space isolation
- paper Caching with Delayed Hits
- article The Git Parable
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 3
- paper FIFO Queues are All You Need for Cache Eviction
- article Shadow-stack control in clone3()
- article Ringing in a new asynchronous I/O API
August
- book Algorithms (DPV) — Chapter 2
- paper ARC: A Self-Tuning, Low Overhead Replacement Cache
- article What is RCU, Fundamentally?
- book Linux Kernel Development, 3rd Edition — Chapter 3
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 2
- article Simpler management of the huge zero folio
- article Lucky 13: a look at Debian trixie
- article The Koka programming language
- book OCaml Programming: Correct + Efficient + Beautiful — Chapter 1
- book Linux Kernel Development, 3rd Edition — Chapter 2
- book Linux Kernel Development, 3rd Edition — Chapter 1
- article House of Orange
- article Tcache House of Spirit
- article House of Spirit
- article House of Force
- book The Manga Guide to Cryptography
- book Operating Systems: Principles and Practice — Chapter 1
- book System Design Interview: An Insider's Guide — Chapter 11
- paper Thirty Years Later: Lessons from the Multics Security Evaluation
- article Phrack: A Hacker’s Introduction To CHERI
- article Phrack: Barbie Sparkles
- article Phrack Prophile on Gera
- article Phrack: Issue 0x48
- article Inside EthCC[8]: Becoming a smart contract auditor
- article Building secure messaging is hard: A nuanced take on the Bitchat security debate
- article Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel
- book System Design Interview: An Insider's Guide — Chapter 10
- article AIxCC Final and Team Atlanta
- article AIxCC finals: Tale of the tape
- article Lessons learned building an AI hacker | AI Cyber Challenge
- article AI Cyber Challenge and Theori's RoboDuck
- article CVE-2024-1086: Flipping Pages
- paper Facade: High-Precision Insider Threat Detection Using Deep Contextual Anomaly Detection
- paper MapReduce
- article What the heck are you actually using NoSQL for?
- book System Design Interview: An Insider's Guide — Chapter 9
- book System Design Interview: An Insider's Guide — Chapter 8
- article PicoCTF 2019: zero_to_hero (House of Poortho)
- book System Design Interview: An Insider's Guide — Chapter 7
- article Graphene OS: a security-enhanced Android build
- article Deep Learning 3/N: Sequence Modeling
- article Deep Learning 2/N: Convolutional Neural Networks
- article Deep Learning 1/N: First Thoughts on Deep Learning
- article What the Tmux: An Unwatched Pot Boils
- article Docker Inside Docker: The Movie
- article Volatile
- article Game Development, a.k.a. Why I Started Programming
- article Single-Threaded Concurrency: An Oxymoron?
- article Rethinking the Linux cloud stack for confidential VMs
- article Extending run-time verification for the kernel
- book System Design Interview: An Insider's Guide — Chapter 6
- book System Design Interview: An Insider's Guide — Chapter 5
- article How we built rate limiting capable of scaling to millions of domains
- article Better Rate Limiting With Redis Sorted Sets
- book System Design Interview: An Insider's Guide — Chapter 4
- article Untangling Lifetimes: The Arena Allocator
- paper AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More
- article I Write Type Safe Generic Data Structures in C
- article A Fast, Growable Array With Stable Pointers in C
- article An introduction to Data Oriented Design with Rust
- book System Design Interview: An Insider's Guide — Chapter 3
- book System Design Interview: An Insider's Guide — Chapter 2
- book System Design Interview: An Insider's Guide — Chapter 1
- article Kernel schedulers
- article QUIC for the kernel
- paper CacheOut: Leaking Data on Intel CPUs via Cache Evictions
July
- paper EntryBleed: A Universal KASLR Bypass against KPTI on Linux
- article CVE-2025-37752: Two Bytes Of Madness
- article CVE-2022-4543: EntryBleed
- article Should you use SRP?
- article PAKEs
- article Secure Remote Password Protocol
- article jemalloc Postmortem
- paper Meltdown
- article TPM Attestation: What can possibly go wrong?
- article Windows 11: TPMs and Digital Sovereignty
- article The Cells That Breathe Two Ways
- article Following up on the Python JIT
- article SFrame-based stack unwinding for the kernel
- book Competitive Programmer's Handbook — Section 3
- book Competitive Programmer's Handbook — Section 2
- book Competitive Programmer's Handbook — Section 1
- article buck-boost converter idk
- article CyberGym (me :D)
- article ZKP Illustrated Primer (part 2)
- article ZKP Illustrated Primer (part 1)
- article SLUB Overview
- article Phrack (FOP)
- article Go Register Calling
- article Ahoi Attacks (SGX/AMD SEV-SNP)
- article SLAB Allocator
- article SLUB Allocator
June
- book Galois Theory, 4th Edition — Chapter 25
- book Galois Theory, 4th Edition — Chapter 24
- book Galois Theory, 4th Edition — Chapter 23
- book Galois Theory, 4th Edition — Chapter 22
- article Differential Cryptanalysis
- book Galois Theory, 4th Edition — Chapter 21
- article m0leC0n Finals 2023: kEASY
- article SLUB allocator + kmalloc() deep dive
- article D^3 CTF 2023: d3kcache
- article Page UAF for priv esc (phrack)
- article modprobe_path (kernel pwn)
- book Galois Theory, 4th Edition — Chapter 20
- book Galois Theory, 4th Edition — Chapter 19
- book Galois Theory, 4th Edition — Chapter 18
- book Galois Theory, 4th Edition — Chapter 17
- article Confidential Computing 101 (very long, ~10-20 hours of reading)
- article zkVM (part 1)
- article Cache Line Bouncing
- article Meltdown/Spectre
- article Google Project Zero: Meltdown & Spectre
- book Galois Theory, 4th Edition — Chapter 16
- paper Integrating Intel SGX Remote Attestation with Transport Layer Security
- article Interrupts and Exceptions
- article Oblivious HTTP
- paper Private Processing for WhatsApp Overview
- article Hypervisors for Hijacking VM Control Flow
- article Linux Page Allocator
- article Why does calloc exist
- article Berke1337 Network Lab
- book Galois Theory, 4th Edition — Chapter 15
- article FHE, MPC, and other ways of securing ML
- article Intel SGX (a lot)
- article More Differential Privacy
- article Differential Privacy (part 3)
- article Differential Privacy (part 2)
- article Differential Privacy (part 1)
- article Rootkits (phrack)
- book Galois Theory, 4th Edition — Chapter 14
- book Galois Theory, 4th Edition — Chapter 13
- book Galois Theory, 4th Edition — Chapter 12
- article AMD SEV-SNP Secure Boot (Confidential Computing)
- book Galois Theory, 4th Edition — Chapter 11
- book Galois Theory, 4th Edition — Chapter 10
- book Galois Theory, 4th Edition — Chapter 9
- article Unbalanced Oil and Vinegar Scheme (UOV)
- book Galois Theory, 4th Edition — Chapter 8
- book Galois Theory, 4th Edition — Chapter 7
- book Galois Theory, 4th Edition — Chapter 6
- book Galois Theory, 4th Edition — Chapter 5
- book Galois Theory, 4th Edition — Chapter 4
- book Galois Theory, 4th Edition — Chapter 3
May
- book Galois Theory, 4th Edition — Chapter 2
- book Galois Theory, 4th Edition — Chapter 1
- article Target Triples
- article Elliptic Curve Isogenies
- article Kernel heap pwn
- article CVE-2025-21756: Attack of the Vsock (kernel pwn)
- paper The Linux Slab Allocator
- paper The Slab Allocator: An Object-Caching Kernel Memory Allocator
- article House of Muney
- article Passkey Cryptography
- article Detailed Explanation of Heap Internals
April
- book Rational Points on Elliptic Curves — Chapter 2
- article AES-GCM and nonce reuse
- article Breaking KASLR Using Memory Deduplication in Virtualized Environments
- article Memory Deduplication Attacks
- article Paging
- book Rational Points on Elliptic Curves — Chapter A
- article Thread Local Storage (TLS)
- paper intro to p-adic numbers
- book Rational Points on Elliptic Curves — Chapter 1
- article Heaven's Gate deep dive
- article Calling All Hackers, Phrack -cts
- article CodeQL Supply Chain Attack
- article MCPs again
- article MCPs
- article Heaven's Gate (64-bit instrs in 32-bit arch)
- article Malware Loader news
- 12 ch Database System Concepts, 7th Edition Mar '26 → May '26
- 9 ch Computer Architecture, A Quantitative Approach, Sixth Edition Jan '26 → Apr '26
- 14 ch Database Internals Feb '26 → Apr '26
- 13 ch Deep Learning: Foundations and Concepts Feb '26 → Apr '26
- 8 ch Digital Design with Chisel Feb '26 → Mar '26
- 9 ch Reinforcement Learning: An Introduction, 2nd Edition Jan '26 → Mar '26
- 6 ch Distributed Systems for Fun and Profit Mar '26
- 1 ch Foundations of Cryptography, Volume 1: Basic Tools Feb '26
- 1 ch Introduction to Modern Cryptography Feb '26
- 12 ch Deep Learning Dec '25 → Jan '26
- 1 ch Quant Bible - MIT Jan '26
- 30 ch learncpp.com Sep '25 → Jan '26
- 12 ch Operating Systems: Principles and Practice Aug '25 → Nov '25
- 16 ch Linux Kernel Development, 3rd Edition Aug '25 → Nov '25
- 8 ch OCaml Programming: Correct + Efficient + Beautiful Aug '25 → Nov '25
- 7 ch Algorithms (DPV) Aug '25 → Oct '25
- 2 ch Android Hackers Handbook Oct '25
- 11 ch System Design Interview: An Insider's Guide Aug '25
- 1 ch The Manga Guide to Cryptography Aug '25
- 3 ch Competitive Programmer's Handbook Jul '25
- 25 ch Galois Theory, 4th Edition May '25 → Jun '25
- 3 ch Rational Points on Elliptic Curves Apr '25