In absolutely no order
- Insertion Evasion and Denial of Service: Eluding Network Intrusion Detection http://users.ece.cmu.edu/~adrian/731-sp04/readings/Ptacek-Newsham-ids98.pdf
- The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) https://hovav.net/ucsd/dist/geometry.pdf
- Smashing the Stack for Fun and Profit http://www-inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf
- Exploiting the DRAM rowhammer bug to gain kernel privileges https://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Understanding and Hardening Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1.pdf
- Spectre Attacks: Exploiting Speculative Execution https://meltdownattack.com/spectre.pdf
- Dolphin Emulator Internals (PPC) https://www.alchemistowl.org/pocorgtfo/pocorgtfo06.pdf
- This World of Ours https://www.usenix.org/system/files/1401_08-12_mickens.pdf
- Pangu 9 Internals: https://www.blackhat.com/docs/us-16/materials/us-16-Wang-Pangu-9-Internals.pdf
- The Stack Clash: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
this one is itself a list of papers basically:
- History of Memory Corruption AttacksL https://media.blackhat.com/bh-us-10/whitepapers/Meer/BlackHat-USA-2010-Meer-History-of-Memory-Corruption-Attacks-wp.pdf
that's what i can think of rn. just off the top of my head