In absolutely no order
- Insertion Evasion and Denial of Service: Eluding Network Intrusion Detection http://users.ece.cmu.edu/~adrian/731-sp04/readings/Ptacek-Newsham-ids98.pdf
- The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) https://hovav.net/ucsd/dist/geometry.pdf
- Smashing the Stack for Fun and Profit http://www-inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf
- Exploiting the DRAM rowhammer bug to gain kernel privileges https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Understanding and Hardening Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1.pdf
- Spectre Attacks: Exploiting Speculative Execution https://meltdownattack.com/spectre.pdf
- Dolphin Emulator Internals (PPC) https://www.alchemistowl.org/pocorgtfo/pocorgtfo06.pdf
- This World of Ours https://www.usenix.org/system/files/1401_08-12_micke