BERserk attack: http://www.intelsecurity.com/advanced-threat-research/berserk.html https://github.com/FiloSottile/BERserk http://www.ioactive.com/pdfs/PKILayerCake.pdf https://securewww.esat.kuleuven.be/cosic/publications/article-1432.pdf At http://langsec.org/ : "Towards a formal theory of computer insecurity: a language-theoretic approach" Len Sassaman, Meredith L. Patterson, Invited Lecture at Dartmouth College (March 2011), [video] "Exploiting the Forest with Trees", Len Sassaman, Meredith L. Patterson, BlackHat USA, August 2010, [video]