To celebrate the first 50 years of the A.M. Turing Award, ACM is sponsoring a yearlong series of programs, as highlighted on the Turing 50th website http://www.acm.org/turing-award-50.
Vicki L. Hanson
"Denial-of-service" cyberattacks require us to up our technical game in Internet security and safety. They also expose the need to frame and enforce social and ethical behavior, privacy, and appropriate use in Internet environments …
Francine Berman, Vinton G. Cerf
DEPARTMENT: Letters to the editor
Adi Livnat's and Christos Papadimitriou's critique of genetic algorithms in "Sex as an Algorithm" (Nov. 2016) stands in counterpoint to a voluminous empirical record of practical successes.
DEPARTMENT: Panels in print
To help celebrate 50 years of the ACM Turing Award and the visionaries who have received it, ACM has launched a campaign called "Panels in Print," which takes the form of a collection of responses from Turing laureates, ACM award …
Janet Davis makes a plea to CS practitioners to consider even a short teaching stint.
Data locking experiments provide stepping stones to a possible future in quantum cryptography.
Security researchers have identified a technique for installing a backdoor on computer chips, a security flaw that could profoundly change the computing industry.
In risk assessment and predictive policing, biased data can yield biased results.
COLUMN: Inside risks
The IoT can become ubiquitous worldwide — if the pursuit of systemic trustworthiness can overcome the potential risks.
Ulf Lindqvist, Peter G. Neumann
How creative thinking tools and computing can be used to support creative human endeavors.
Aman Yadav, Steve Cooper
COLUMN: Kode vicious
Tests, documentation, and code.
George V. Neville-Neil
COLUMN: Privacy and security
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
Azer Bestavros, Andrei Lapets, Mayank Varia
Worrying about machines that are too smart distracts us from the real and present threat from machines that are too dumb.
Arguing against the arguments for the concept of the singularity.
Devdatt Dubhashi, Shalom Lappin
An apostate's opinion.
Anyone can use a load balancer. Using it properly is much more difficult.
Thomas A. Limoncelli
Measuring bottleneck bandwidth and round-trip propagation time.
Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson
SECTION: Contributed articles
Government-sanctioned and market-based anti-piracy measures can both mitigate economic harm from piracy.
Brett Danaher, Michael D. Smith, Rahul Telang
It is past time to acknowledge 400 years of European computational innovation from non-English-speaking scientists and engineers.
SECTION: Review articles
Model learning emerges as an effective method for black-box state machine models of hardware and software components.
SECTION: Research highlights
One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight. A truism of the security community is that "complexity is the enemy …
We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how some of these flaws lead to critical security vulnerabilities. …
Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue
We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.
Ivan Martinovic, Kasper Rasmussen, Marc Roeschlin, Gene Tsudik
COLUMN: Last byte
In a series of interactive murder mysteries, I might not have done it, but, then again, maybe I did
William Sims Bainbridge