"Boosting Fuzzer Efficiency: An Information Theoretic Perspective," by Marcel Böhme, Valentin J.M. Manès, and Sang Kil Cha, presents a novel twist to fuzzing that...Gordon Fraser From Communications of the ACM | November 2023
In this paper, we take the fundamental perspective of fuzzing as a learning process.
Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha From Communications of the ACM | November 2023
"Locating Everyday Objects Using NFC Textiles," by Jingxian Wang et al., describes the potential of Near-Field Communication for advanced home automation.
Polly Huang From Communications of the ACM | October 2023
This paper builds a Near-Field Communication-based localization system that allows ordinary surfaces to locate surrounding objects with high accuracy in the near...Jingxian Wang, Junbo Zhang, Ke Li, Chengfeng Pan, Carmel Majidi, Swarun Kumar From Communications of the ACM | October 2023
"Leveraging Social Media to Buy Fake Reviews," by Sherry He et al., represents a breakthrough in our empirical understanding of fake reviews on Amazon.
Shreyas Sekar From Communications of the ACM | October 2023
We study the market for fake product reviews on Amazon.com.
Sherry He, Brett Hollenbeck, Davide Proserpio From Communications of the ACM | October 2023
"Model Counting Meets Distinct Elements," by A. Pavan et al., gives a surprising connection between model counting and streaming, providing a generic transformation...David P. Woodruff From Communications of the ACM | September 2023
In this work, we seek to investigate whether bridging the seeming communication gap between two different domains of computer science may pave the way to richer...A. Pavan, N. V. Vinodchandran, Arnab Bhattacharyya, Kuldeep S. Meel From Communications of the ACM | September 2023
In "A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers," Salamatian et al. assemble techniques from the two broad strategies developed...Sara Alouf From Communications of the ACM | August 2023
We present a new empirical approach for elucidating connectivity in privately owned and operated backbone networks.
Loqman Salamatian, Scott Anderson, Joshua Mathews, Paul Barford, Walter Willinger, Mark Crovella From Communications of the ACM | August 2023
"Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship," by Kelly Mack et al., provides guidance on how to make remote...John Richards From Communications of the ACM | August 2023
Interns, full-time members, and affiliates of a Microsoft Research team focused on accessibility report on the experiences of virtual interns in 2020 navigating...Kelly Mack, Maitraye Das, Dhruv Jain, Danielle Bragg, John Tang, Andrew Begel, Erin Beneteau, Josh Urban Davis, Abraham Glasser, Joon Sung Park, Venkatesh Potluri From Communications of the ACM | August 2023
The authors of "Offline and Online Algorithms for SSD Management" propose a more accurate theoretical model of flash-based SSDs that views each page as containing...Ramesh K. Sitaraman From Communications of the ACM | July 2023
We explore the problem of reducing high internal overhead of flash media which is referred to as write amplification from an algorithmic perspective, considering...Tomer Lange, Joseph (Seffi) Naor, Gala Yadgar From Communications of the ACM | July 2023
FoundationDB, as explored in "FoundationDB: A Distributed Key-Value Store," by Jingyu Zhou et al., pioneered the development of a scalable distributed key-value...Alfons Kemper From Communications of the ACM | June 2023
FoundationDB, an open-source transactional key-value store, is one of the first systems to combine the flexibility and scalability of NoSQL architectures with the...Jingyu Zhou, Meng Xu, Alexander Shraer, Bala Namasivayam, Alex Miller, Evan Tschannen, Steve Atherton, Andrew J. Beamon, Rusty Sears, John Leach, Dave Rosenthal, Xin Dong, Will Wilson, Ben Collins, David Scherer, Alec Grieser, Yang Liu, Alvin Moore, Bhaskar Muppana, Xiaoge Su, Vishesh Yadav From Communications of the ACM | June 2023
For a given cryptographic scheme, as perfect security is almost never achievable, one requires a computational assumption. Computational assumptions are some well...David Pointcheval From Communications of the ACM | June 2023
We reveal that in the interoperable world of OpenPGP, unforeseen cross-configuration attacks become possible.
Luca De Feo, Bertram Poettering, Alessandro Sorniotti From Communications of the ACM | June 2023
"Toward Basing Cryptography on the Hardness of EXP," by Yanyi Liu and Rafael Pass, establishes surprisingly tight bidirectional connections between one-way functions...Gil Segev From Communications of the ACM | May 2023
We show that the only "gap" toward getting (infinitely-often) OWFs from the assumption that EXP ≠ BPP is the seemingly "minor" technical gap between two-sided error...Yanyi Liu, Rafael Pass From Communications of the ACM | May 2023