"Measuring Security Practices," by Louis F. DeKoven et al., provide a unique perspective into how users choose to implement common security advice in practice.
...Nicolas Christin From Communications of the ACM | September 2022
This paper seeks to make progress on the prevalence of popular security practices and their relationship to security outcomes via the longitudinal empirical measurement...Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage From Communications of the ACM | September 2022
"Polymorphic Wireless Receivers," by Francesco Restuccia and Tommaso Melodia, tackles the problem of physical layer resilience in wireless systems from a completely...Falko Dressler From Communications of the ACM | September 2022
We introduce PolymoRF, a deep learning-based polymorphic receiver able to reconfigure itself in real time based on the inferred waveform parameters.
Francesco Restuccia, Tommaso Melodia From Communications of the ACM | September 2022
"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...Robin Burke From Communications of the ACM | February 2022
We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...Noemi Mauro, Liliana Ardissono, Federica Cena From Communications of the ACM | February 2022
"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...Timothy Sherwood From Communications of the ACM | December 2021
This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.
Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher From Communications of the ACM | December 2021
"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.
Dorit Aharonov, Michael Chapman From Communications of the ACM | November 2021
In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.
Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, Henry Yuen From Communications of the ACM | November 2021
"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts...Ahmad-Reza Sadeghi From Communications of the ACM | October 2021
We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available...Jihoon Lee, Gyuhong Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, Sangtae Ha From Communications of the ACM | October 2021
"A Year in Lockdown," by Anja Feldmann, et al., offers a detailed look at how Internet traffic changed during the COVID-19 pandemic.
Jennifer Rexford From Communications of the ACM | July 2021
We review the impact of the first year of the COVID-19 pandemic on Internet traffic in order to analyze its performance.
Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis From Communications of the ACM | July 2021
"Deriving Equations from Sensor Data Using Dimensional Function Synthesis," by Vasileios Tsoutsouras, et al., addresses the key problem of discovering relationships...Sriram Sankaranarayanan From Communications of the ACM | July 2021
We present a new method, which we call dimensional function synthesis, for deriving functions that model the relationship between multiple signals in a physical...Vasileios Tsoutsouras, Sam Willis, Phillip Stanley-Marbell From Communications of the ACM | July 2021
"In-Sensor Classification With Boosted Race Trees," by Georgios Tzimpragos, et al., proposes a surprising, novel, and creative approach to post-Moore's Law computing...Abhishek Bhattacharjee From Communications of the ACM | June 2021
We demonstrate the potential of a novel form of encoding, race logic, in which information is represented as the delay in the arrival of a signal.
Georgios Tzimpragos, Advait Madhavan, Dilip Vasudevan, Dmitri Strukov, Timothy Sherwood From Communications of the ACM | June 2021
"3D Localization for Subcentimeter-Sized Devices," by Iyer, et al., neatly separates and solves the problems of robotic locomotion, sensing, localization, and communications...Prabal Dutta From Communications of the ACM | March 2021
We present the first localization system that consumes microwatts of power at a mobile device and can be localized across multiple rooms in settings such as homes...Rajalakshmi Nandakumar, Vikram Iyer, Shyamnath Gollakota From Communications of the ACM | March 2021