This paper seeks to make progress on the prevalence of popular security practices and their relationship to security outcomes via the longitudinal empirical measurement…
Geoffrey M. Voelker
Author Archives
Technical Perspective: Fake ‘Likes’ and Targeting Collusion Networks
"Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks," by Shehroze Farooqi et al., explores a social-networking reputation manipulation…
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique…
Privacy-Preserving Network Forensics
Privacy-preserving attribution of IP packets can help balance forensics with an individual's right to privacy.
Sora: High-Performance Software Radio Using General-Purpose Multi-Core Processors
Sora, a fully programmable software radio platform on commodity PC architectures, combines the performance and fidelity of hardware software-defined radio platforms with…
Difference Engine: Harnessing Memory Redundancy in Virtual Machines
Virtual machine monitors are a popular platform for Internet hosting centers and cloud-based compute services. But main memory is not amenable to multiplexed hardware…
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness…
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved