Bibliography (248):

  1. On Seeing Through and Unseeing: The Hacker Mindset

  2. XKCD Stack

  3. MalbolgeLisp Is a LISP Interpreter Written in Malbolge. It’s (As of 2020 and 2021), the Most Advanced, Usable Malbolge Program Ever Created. It Supports Everything Lisps Generally Tend to Support (Like cond, let, lambda, Etc…).

  4. Building a Working Game of Tetris in Conway’s Game of Life

  5. The Recursive Universe

  6. Regex Chess: A 2-Ply Minimax Chess Engine in 84,688 Regular Expressions

  7. Accidentally Turing-Complete

  8. Sendmail As a Turing Machine

  9. 2006-jared-wikimediaprovesgreenspunstenthlaw.html

  10. https://willhbr.net/2024/03/15/making-a-compiler-to-prove-tmux-is-turing-complete/

  11. A Proof That Unix Utility Sed Is Turing Complete

  12. A Brainfuck Interpreter in RegEx Only (Using Find/Replace). This Demonstrates, That RegEx in Combination With Find/Replace Is Turing Complete.

  13. Krister Walfridsson’s Old Blog: More Turing-Completeness in Surprising Places

  14. One Font Vulnerability to Rule Them All #1: Introducing the BLEND Vulnerability

  15. Redux: Compromising Linux Using... SNES Ricoh 5A22 Processor Opcodes‽

  16. {0day} {exploit} Compromising a Linux Desktop Using... 6502 Processor Opcodes on the NES‽

  17. https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/

  18. https://rawgit.com/osnr/horrifying-pdf-experiments/master/breakout.pdf

  19. https://doompdf.pages.dev/doom.pdf

  20. https://codeanlabs.com/blog/research/cve-2024-4367-arbitrary-js-execution-in-pdf-js/

  21. Is the Network Turing-Complete? EPFL Technical Report 187131

  22. Using Routers to Build Logic Circuits: How Powerful Is BGP?

  23. ‘Computational Complexity of Air Travel Planning’, De Marcken 2003 [ITA Software]

  24. /// - Esolang

  25. Thue

  26. A Simple Proof for the Turing-Completeness of XSLT and XQuery

  27. Java Generics are Turing Complete

  28. An RNA-based theory of natural universal computation

  29. Perl Cannot Be Parsed: A Formal Proof

  30. Infinite Versions of Minesweeper Are Turing Complete

  31. Is Minecraft Turing-Complete?

  32. I Made Minecraft in Minecraft With Redstone!

  33. LED Counter

  34. OpenTTD Logic

  35. 2019-07-15-danielbali-citiesskylineisturingcomplete.html

  36. User:BaronW

  37. Razorlength - 1036 Early Winter by Jong89

  38. Computing in Dwarf Fortress

  39. https://dwarffortresswiki.org/index.php/v0.31:Creature_logic

  40. https://think-maths.co.uk/wp-content/uploads/2023/03/Think-Maths-Domino-Computer-Worksheets_0.pdf

  41. The 10,000 Domino Computer

  42. The Find/replace Box in Notepad++ Is Turing Complete

  43. Abstract Tile Assembly Model (ATAM)

  44. Solving NP-Complete Problems in the Tile Assembly Model

  45. Algorithmic Self-Assembly of DNA

  46. https://meatfighter.com/tetromino-computer/index.html

  47. Studying artificial life with cellular automata

  48. Complexity of Langton’s Ant

  49. Computing With Traps

  50. https://news.ycombinator.com/item?id=5261598

  51. The Page-Fault Weird Machine: Lessons in Instruction-Less Computation

  52. https://stedolan.net/research/mov.pdf

  53. Movfuscator/validation/doom at Master

  54. ByteByteJump

  55. Main Is Usually a Function: X86 Is Turing-Complete With No Registers

  56. Hovav Shacham: The Geometry of Innocent Flesh on the Bone

  57. https://pdfs.semanticscholar.org/3a34/baf9434f8d785bfe34f69c0a5e2f0b13f6c7.pdf

  58. Super Mario Bros. 3 in 3 Minutes—World Record Speedrun Explained

  59. Pokemon Yellow Total Control Hack

  60. Submission #4156: Masterjun‘s SNES Super Mario World 'Executes Arbitrary Code’ in 02:25.19

  61. Teaching Mario to Play Pong and Snake Through Innumerable Exploits

  62. SNES Code Injection—Flappy Bird in SMW

  63. Pokémon Plays Twitch: How a Robot Got IRC Running on an Unmodified SNES; Behind the Scenes With the Hackers That Crammed Web Chat through a Super Game Boy.

  64. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity

  65. HexHive/printbf: Brainfuck Interpreter inside Printf

  66. StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit

  67. Braid is undecidable

  68. Baba Is Turing Complete: A Sketch of a Proof (V2)

  69. Recursed on Steam

  70. Recursed is not Recursive: A Jarring Result

  71. Turing-Complete Chess Computation

  72. But Can DOOM Run *it*? Programming Satan's Computer

  73. Is Musical Notation Turing-Complete?

  74. Choon Programming Language

  75. Implications of the Turing completeness of reaction-diffusion models, informed by GPGPU simulations on an XBox 360: Cardiac arrhythmias, re-entry and the halting problem

  76. Tom-P-Reichel/svg-Is-Turing-Complete: An Implementation of Rule 110 in Scalable Vector Graphics

  77. 17.7.2 Raw Socket Connections

  78. A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution

  79. Magic: The Gathering is Turing Complete

  80. Magic: the Gathering is as Hard as Arithmetic

  81. Silon Is an Experiment in the True Power of CSS Selectors. Most People Would Not Expect CSS Selectors to Be Capable of Expressing Arbitrary Boolean Logic. However, thanks to the Sibling Selector (AND), the Comma Selector (OR), and the `:not()` Selector, This Is Actually Completely Possible.

  82. Experimentations With Abstract Machines

  83. CSS3 Proven to Be Turing Complete

  84. Kkuchta/css-Only-Chat: A Truly Monstrous Async Web Chat Using No JS Whatsoever on the Frontend

  85. On The Turing Completeness of MS PowerPoint

  86. On The Turing Completeness of PowerPoint

  87. https://tomwildenhain.com/PowerPointTM/PowerPointTM.pptx

  88. https://dbohdan.com/jpeg-xl

  89. find + mkdir Is Turing Complete (Retracted)

  90. Chinese Window Lattice And CSS

  91. From Brainfuck to Domino Computers: A Trip into Esoteric Languages, Turing Machines, Cellular Automata and the Nature of Computation

  92. UAX #9: Unicode Bidirectional Algorithm

  93. Case Folding - Internationalization

  94. https://www.underware.nl/fonts/liza/features/OpenType_features/

  95. Addition Font

  96. Spooky Fizz Buzz § Pg42

  97. The World’s First Code-Free Sparkline Typeface: Displaying Charts in Text without Having to Use Code

  98. Mcfnlp/ZawDecode: Zaw Decode Font သည် မြန်မာဘာသာ အပါအဝင် တိုင်းရင်းသားဘာသာများပါ ဖတ်ရှု့ရေးသားနိုင်သော ယူနီကုဒ် ဖောင့်ဖြစ်ပါသည်။ ထိုအပြင် ဇော်ဂျီဖောင့်ဖြင့်ရေးသားထားသော စာများကိုလည်း ၈၅% လောက်မှန်ကန်အောင် ဖော်ပြပေးနိုင်ပါသည်။

  99. Fontemon

  100. https://www.youtube.com/watch?v=GF2sn2DXjlA

  101. https://blog.erk.dev/posts/anifont/

  102. Harnessing Vision for Computation

  103. The complexity of N-body simulation

  104. N-Body Choreographies

  105. Mechanical Computing: The Computational Complexity of Physical Devices § Molecular and Gravitational Mechanical Systems

  106. The Count of Monte Cristo

  107. SQL 3d Engine (Interactive Preview)

  108. Using SQL’s Turing Completeness to Build Tetris

  109. https://research.google/blog/machine-learning-in-google-bigquery/

  110. High Performance SQL With PostgreSQL 8.4: Lists and Recursion and Trees, Oh My!

  111. Building a Turing Engine in Oracle SQL Using the Model Clause

  112. Language-Theoretic Security

  113. What are Weird Machines?

  114. https://langsec.org/papers/Bratus.pdf

  115. https://www.usenix.org/legacy/publications/login/2011-12/openpdfs/Sassaman.pdf

  116. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.370.5165&rep=rep1&type=pdf

  117. https://www.cs.dartmouth.edu/~sergey/wm/woot13-shapiro.pdf

  118. https://tcipg.org/sites/default/files/papers/2014_q3_tfs1.pdf

  119. https://www.ieee-security.org/TC/SPW2014/papers/5103a209.PDF

  120. https://www.syssec-project.eu/m/page-media/3/sp14_srop.pdf

  121. https://langsec.org/papers/langsec-cwes-secdev2016.pdf

  122. Weird machines, exploitability, and provable unexploitability

  123. Psychic Paper

  124. Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine

  125. Spectre is here to stay: An analysis of side-channels and speculative execution

  126. ExSpectre: Hiding Malware in Speculative Execution

  127. American Fuzzy Lop

  128. 2.2. 1 Case out of 45: Powerful Language = Exploitable Language

  129. https://news.ycombinator.com/item?id=10318729

  130. https://news.ycombinator.com/item?id=6577671

  131. https://news.ycombinator.com/item?id=22839035

  132. https://news.ycombinator.com/item?id=34014830

  133. On Having Sufficient Complexity to Allow for Arbitrary Computation

  134. Accidentally Quadratic

  135. Coding Machines

  136. To What Extent Should One Trust a Statement That a Program Is Free of Trojan Horses? Perhaps It Is More Important to Trust the People Who Wrote the Software.

  137. It’s Possible to Build a Turing Machine within Magic: The Gathering

  138. https://blog.trailofbits.com/2019/11/01/two-new-tools-that-tame-the-treachery-of-files/

  139. The Configuration Complexity Clock

  140. Your Configs Suck? Try a Real Programming Language.

  141. Life in Life

  142. Linux in a Pixel Shader - A RISC-V Emulator for VRChat

  143. VRChat Community Meetup 2021-08-15

  144. https://voltagedivide.com/2024/03/18/unconventional-uses-of-fpgas/

  145. http://weblog.raganwald.com/2004/10/beware-of-turing-tar-pit.html

  146. On Having No Head: Cognition throughout Biological Systems

  147. Book Review: Design Principles of Biological Circuits

  148. https://royalsocietypublishing.org/doi/pdf/10.1098/rsta.2014.0216

  149. Advances in Physarum Machines: Sensing and Computing with Slime Mould

  150. Brainless but Multi-Headed: Decision Making by the Acellular Slime Mould Physarum polycephalum

  151. Robust Soldier Crab Ball Gate

  152. How Many Computers Are In Your Computer?

  153. On Seeing Through and Unseeing: The Hacker Mindset

  154. Wikipedia Bibliography:

    1. Turing completeness

    2. Common Lisp

    3. Greenspun’s tenth rule

    4. Esoteric programming language

    5. FRACTRAN

    6. Collatz conjecture

    7. Malbolge

    8. Conway’s Game of Life

    9. Rule of least power

    10. Sendmail  :

    11. Morris worm  :

    12. TrueType

    13. PostScript

    14. Nintendo Entertainment System

    15. MIDI

    16. Google Chrome  :

    17. 3D modeling

    18. Cellular automaton

    19. Markov algorithm  :

    20. Lambda calculus

    21. Rewriting

    22. Apache Ant

    23. Template (C++)  :

    24. DNA computing

    25. Scripting language  :

    26. Video game modding

    27. Sandbox (computer security)  :

    28. Dwarf Fortress

    29. Domino computer  :

    30. Z3 (computer)

    31. Z3 (computer) § Z3 as a universal Turing machine  :

    32. Timing attack § Avoidance  :

    33. Peano axioms § Peano arithmetic as first-order theory  :

    34. Presburger arithmetic  :

    35. Wang tile

    36. Langton’s ant

    37. Chris Langton

    38. Memory management unit

    39. One-instruction set computer § Subtract and branch if less than or equal to zero  :

    40. X86 instruction listings § Original 8086/8088 instructions  :

    41. Transport triggered architecture  :

    42. One-instruction set computer

    43. Processor register

    44. Return-to-libc attack  :

    45. Pokémon Red, Blue, and Yellow § Pokémon Yellow  :

    46. Speedrunning

    47. Printf  :

    48. StarCraft

    49. Braid (video game)

    50. Baba Is You

    51. Doom (1993 video game)  :

    52. SVG

    53. XML  :

    54. GNOME Calculator  :

    55. European Central Bank

    56. International Monetary Fund  :

    57. Magic: The Gathering

    58. Arithmetical hierarchy  :

    59. CSS

    60. Microsoft PowerPoint

    61. Macro (computer science)

    62. VBScript  :

    63. JPEG XL  :

    64. Rule 110

    65. Unicode

    66. Turkish language  :

    67. Burmese language  :

    68. Zawgyi font  :

    69. Gamebook

    70. Adaptive immune system

    71. Innate immune system

    72. Stochastic Petri net  :

    73. Orbital mechanics  :

    74. Billiard-ball computers  :

    75. Château d'If

    76. Edmond Dantès  :

    77. Italo Calvino

    78. Row hammer

    79. Total functional programming

    80. Gödel's incompleteness theorems  :

    81. Rice's theorem

    82. Side effect (computer science)  :

    83. SQL

    84. Query optimization  :

    85. Tag system § Cyclic tag systems  :

    86. PL/SQL  :

    87. Turing tarpit

    88. Spectre (security vulnerability)

    89. Speculative execution  :

    90. Fuzzing

    91. OpenBSD

    92. Roff (software)  :

    93. Reservoir computing

    94. Inner-platform effect  :

    95. Backdoor (computing) § Compiler backdoors  :