About


The members of the Secure Systems Laboratory (SSL) have curated a list of influential and foundational security papers that we believe every current and prospective member should read. That list of papers is given below in no particular order.

Reading List

S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff, "A Sense of Self for Unix Processes", Proceedings of the IEEE Symposium on Security and Privacy, May 1996.
Roger M. Needham, Michael D. Schroeder, "Using encryption for authentication in large networks of computers", Communications of the ACM, December 1978.
R.L. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, February 1978.
W. Diffie, M. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, November 1976.
Dorothy E. Denning, "An Intrusion-Detection Model", IEEE Symposium on Security and Privacy, April 1976.
A. D. Wyner, "The Wire‚ÄźTap Channel", The Bell System Technical Journal, October 1975.
J. H. Saltzer, M. D. Schroeder, "The protection of information in computer systems", Proceedings of the IEEE, September 1975.
C. E. Shannon, "Communication theory of secrecy systems", The Bell System Technical Journal, October 1949.
C. E. Shannon, "A Mathematical Theory of Communication", The Bell System Technical Journal, July 1948.