Memory Renaming: Fast and Accurate Processing of Memory Communication (1999) [pdf]

The Power of 10: Rules for Developing Safety-Critical Code [pdf]

Implementing remote procedure calls – Birrel and Nelson (1981) [pdf]

A Decade of Lattice Cryptography

NASA JPL’s rules for safety-critical C code

Morpheus: A Vulnerability-Tolerant Secure Architecture

The Power of 10: Rules for Developing Safety-Critical Code (2006)

NDA: Preventing Speculative Execution Attacks at Their Source

Language Support for Memory Persistency

Building Consistent Transactions with Inconsistent Replication (2015)

Prof Benjamin Kuipers- No Military Funding

Alchemy: A Language and Compiler for Homomorphic Encryption Made Easy

A Decade of Lattice Cryptography (2016)

Race Detection for Event-Driven Mobile Applications (2014)

A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each (2012)

Why don't I take military funding? (2004)

ReVirt: Intrusion analysis through VM logging and replay (2002)