"Spectre Attacks: Exploiting Speculative Execution," by Paul Kocher, et al., reviews how speculative execution and caches can be exploited, presents specific exploits...Mark D. Hill From Communications of the ACM | July 2020
This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-oriented programming that can read arbitrary...Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom From Communications of the ACM | July 2020
"Data-Driven Algorithm Design," by Rishi Gupta and Tim Roughgarden, addresses the issue that the best algorithm to use for many problems depends on what the input...Avrim Blum From Communications of the ACM | June 2020
"Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks," by Shehroze Farooqi et al., explores a social-networking reputation manipulation ecosystem...Geoffrey M. Voelker From Communications of the ACM | May 2020
We carried out a comprehensive measurement study to understand how collusion networks exploited popular third-party Facebook applications with weak security settings...Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq From Communications of the ACM | May 2020
The envy-free cake-cutting problem stood its ground for two decades, until it was cracked by Aziz and Mackenzie. Their solution is presented in "A Bounded and Envy...Ariel D. Procaccia From Communications of the ACM | April 2020
We report on our algorithm that resolved the well-studied cake cutting problem in which the goal is to find an envy-free allocation of a divisible resource based...Haris Aziz, Simon Mackenzie From Communications of the ACM | April 2020
Instead of handing trace records off to a collector for long-term storage and future processing, the system described in "Pivot Tracing: Dynamic Causal Monitoring...Rebecca Isaacs From Communications of the ACM | March 2020
This paper presents Pivot Tracing, a monitoring framework for distributed systems, which addresses the limitations of today's monitoring and diagnosis tools by...Jonathan Mace, Ryan Roelke, Rodrigo Fonseca From Communications of the ACM | March 2020
"Automating Visual Privacy Protection Using a Smart LED," presents a new technique to address the issue of cameras capturing proprietary or private information—it...Marco Gruteser From Communications of the ACM | February 2020
We introduce LiShield, which automatically protects a physical scene against photographing, by illuminating it with smart LEDs flickering in specialized waveforms...Shilin Zhu, Chi Zhang, Xinyu Zhang From Communications of the ACM | February 2020
"Evidence that Computer Science Grades Are Not Bimodal" uses empirical methods to determine if belief in innate differences may explain why CS teachers see a bimodality...Mark Guzdial From Communications of the ACM | January 2020
There is a common belief that grades in computer science courses are bimodal. We devised a psychology experiment to understand why CS educators hold this belief...Elizabeth Patitsas, Jesse Berlin, Michelle Craig, Steve Easterbrook From Communications of the ACM | January 2020
OpenPiton research is one of the watershed moments in the fundamental shift toward the construction of an open source ecosystem for implementing prototype chips...Michael B. Taylor From Communications of the ACM | December 2019
We present OpenPiton, an open source framework for building scalable architecture research prototypes from one core to 500 million cores.
Jonathan Balkind, Michael McKeown, Yaosheng Fu, Tri Nguyen, Yanqi Zhou, Alexey Lavrov, Mohammad Shahrad, Adi Fuchs, Samuel Payne, Xiaohua Liang, Matthew Matl, David Wentzlaff From Communications of the ACM | December 2019
DeepXplore brings a software testing perspective to deep neural networks and, in doing so, creates the opportunity for enormous amounts of follow-on work in several...David G. Andersen From Communications of the ACM | November 2019
We design, implement, and evaluate DeepXplore, the first white-box framework for systematically testing real-world deep learning systems.
Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana From Communications of the ACM | November 2019
The authors of "Building Certified Concurrent OS Kernels" illustrate that formal verification can scale up to a moderate-size program (6,500 lines of C) that has...Andrew W. Appel From Communications of the ACM | October 2019
In this work, we present CertiKOS, a novel compositional framework for building verified concurrent OS kernels.
Ronghui Gu, Zhong Shao, Hao Chen, Jieung Kim, Jérémie Koenig, Xiongnan (Newman) Wu, Vilhelm Sjöberg, David Costanzo From Communications of the ACM | October 2019