DEPARTMENT: Departments
To celebrate the first 50 years of the A.M. Turing Award, ACM is sponsoring a yearlong series of programs, as highlighted on the Turing 50th website http://www.acm.org/turing-award-50.
Vicki L. Hanson
Page 5
"Denial-of-service" cyberattacks require us to up our technical game in Internet security and safety. They also expose the need to frame and enforce social and ethical behavior, privacy, and appropriate use in Internet environments …
Francine Berman, Vinton G. Cerf
Pages 6-7
DEPARTMENT: Letters to the editor
Adi Livnat's and Christos Papadimitriou's critique of genetic algorithms in "Sex as an Algorithm" (Nov. 2016) stands in counterpoint to a voluminous empirical record of practical successes.
CACM Staff
Pages 8-9
DEPARTMENT: Panels in print
To help celebrate 50 years of the ACM Turing Award and the visionaries who have received it, ACM has launched a campaign called "Panels in Print," which takes the form of a collection of responses from Turing laureates, ACM award …
CACM Staff
Pages 10-11
DEPARTMENT: BLOG@CACM
Janet Davis makes a plea to CS practitioners to consider even a short teaching stint.
Janet Davis
Pages 12-13
COLUMN: News
Data locking experiments provide stepping stones to a possible future in quantum cryptography.
Chris Edwards
Pages 15-17
Security researchers have identified a technique for installing a backdoor on computer chips, a security flaw that could profoundly change the computing industry.
Samuel Greengard
Pages 18-19
In risk assessment and predictive policing, biased data can yield biased results.
Keith Kirkpatrick
Pages 21-23
COLUMN: Inside risks
The IoT can become ubiquitous worldwide — if the pursuit of systemic trustworthiness can overcome the potential risks.
Ulf Lindqvist, Peter G. Neumann
Pages 26-30
COLUMN: Education
How creative thinking tools and computing can be used to support creative human endeavors.
Aman Yadav, Steve Cooper
Pages 31-33
COLUMN: Kode vicious
Tests, documentation, and code.
George V. Neville-Neil
Pages 34-36
COLUMN: Privacy and security
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
Azer Bestavros, Andrei Lapets, Mayank Varia
Pages 37-39
COLUMN: Viewpoint
Worrying about machines that are too smart distracts us from the real and present threat from machines that are too dumb.
Alan Bundy
Pages 40-42
Arguing against the arguments for the concept of the singularity.
Devdatt Dubhashi, Shalom Lappin
Pages 43-45
SECTION: Practice
An apostate's opinion.
Pat Helland
Pages 46-54
Anyone can use a load balancer. Using it properly is much more difficult.
Thomas A. Limoncelli
Pages 55-57
Measuring bottleneck bandwidth and round-trip propagation time.
Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson
Pages 58-66
SECTION: Contributed articles
Government-sanctioned and market-based anti-piracy measures can both mitigate economic harm from piracy.
Brett Danaher, Michael D. Smith, Rahul Telang
Pages 68-75
It is past time to acknowledge 400 years of European computational innovation from non-English-speaking scientists and engineers.
Herbert Bruderer
Pages 76-84
SECTION: Review articles
Model learning emerges as an effective method for black-box state machine models of hardware and software components.
Frits Vaandrager
Pages 86-95
SECTION: Research highlights
One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight. A truism of the security community is that "complexity is the enemy …
Eric Rescorla
Page 98
We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how some of these flaws lead to critical security vulnerabilities. …
Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue
Pages 99-107
We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.
Ivan Martinovic, Kasper Rasmussen, Marc Roeschlin, Gene Tsudik
Pages 108-115
COLUMN: Last byte
In a series of interactive murder mysteries, I might not have done it, but, then again, maybe I did
William Sims Bainbridge
Pages 120-ff