The Dynamite of Next Generation (Y) Attack
Comprehensive Journey of a Hacker 2012
Manipulating memory for fun and profit
Finding Malware on a Web Scale Ben Livshits Microsoft Research Redmond, WA.