Category Archives: links

Assorted Links (Computer Security)

    1. Security Engineering — The Book: the updated Ross Anderson’s masterpiece, for free again!
    2. The Fundamental Goal of “Provable Security”: Dan Bernstein’s insights on the whole provable security trend.
    3. Lucky Thirteen — Breaking the TLS and DTLS Record Protocols: yet another breach in the wall of the messy SSL/TLS protocol suite.
    4. Inception: a cheaper way to obtain passwords from RAM than Elcomsoft Forensic Disk Decryptor.
    5. 7 Codes You’ll Never Ever Break: classic ciphers that never die.

Assorted Links (Economics)

    1. Ad-valorem Platform Fees and Efficient Price Discrimination:  fees that increase in proportion to the sale price of the trades, enhance social welfare.
    2. USA DoD software development data over 2000 projects: a detailed review
    3. The Use of Natural Experiments in Merger Analysis: predicting the outcome of almost 23 of FTC merger challenge decisions
    4. Financial intermediaries and the Cross-Section of Asset Returns: broker-dealers as the wheels of financial markets
    5. Frédéric Bastiat’s What is Seen and What is Not Seen

Assorted Links (Finance)

    1. Exploratory trading: explaining the use of small trades to test and prove the market
    2. Damodaran’s series on Acquisition: Winners & Losers, Big Deal or Good Deal?, Over-confident CEOs and Compliant Boards, Accretive (Dilutive) Deals can be Bad (Good) Deals
    3. Predictable Growth Decay in SaaS Companies: next year’s growth rate is likely to be 85% of this year’s growth rate.
    4. Making CrunchBase Computable with Wolfram|Alpha
    5. Does Academic Research Destroy Stock Return Predictability? Not as much as you think, publishing results only makes returns fall by a third.

Assorted Links (Math)

Some links about the uses of mathematics in everyday life:
  1. The Mathematics of RAID6: another remark that RAID5 is considered harmful
  2. The maths that made the Voyager possible: “Using a solution to the three-body problem, a single mission, launching from Earth in 1977, could sling a spacecraft past all four planets within 12 years. Such an opportunity would not present itself again for another 176 years.”
  3. Speeding GPS calculations by shrinking data
  4. Coded-TCP: replacing packets with algebraic equations to improve wireless bandwidth in the presence of errors
  5. Voice Recognition using MATLAB: easy and fun to experiment with

Assorted Links (Architecture)

    1. The Architecture of Open Source Applications:  wonderful resource to learn more about the internals of some of the greatest programs of history. I love the chapter about LLVM, a perfect complement to this post about the life of an instruction in LLVM
    2. Secret Servers and Data Centers: best special report from Wired in a very long time, full of previously unpublished information about the biggest data centers in the world
    3. Understanding Cloud Failures: useful infographic on the perils of Cloud Computing
    4. One in Six Active US Patents Pertain to the Smartphone: such a little device, such a complicated legal maze
    5. The Licensing of Mobile Bands in CEPT: complete list on the distribution of mobile spectrum in Europe
    6. Kernel Drivers Compiled to Javascript and Run in Browser: a simple hack to turn upside down completely opposite software layers

Assorted Links (CompSec)

    1. The most dangerous code in the world: validating SSL certificates in non-browser software. Yet another round of broken implementations of the SSL protocol.
    2. Cross-VM Side Channels and Their Use to Extract Private Keys: first practical proof that we shall not run SSL servers or any cryptographic software in a public cloud.
    3. Short keys used on DKIM: the strange case of the race to use the shortest RSA keys.
    4. How to Garble RAM Programs: Yao’s garbled circuits may turn to be practical.
    5. Apache Accumulo: NSA’s secure BigTable.