Upload
hoangcong
View
213
Download
0
Embed Size (px)
Citation preview
MARCH 2016
FEATURES 14Insecure
Surveillance: Technical Issues
with Remote Computer Searches
STEVEN M. BELLOVIN, MATT BLAZE, AND SUSAN LANDAU
25Insecure by
Design: Protocols for Encrypted
Phone CallsSTEVEN J. MURDOCH
34Requirements
Analysis Required—Otherwise
Targeted Monitoring Enables Pervasive
MonitoringSTEPHEN FARRELL
10GUEST EDITORS’ INTRODUCTIONCommunications and Privacy under SurveillanceYING-DAR LIN, JEFFREY VOAS, ANTONIO PESCAPÈ, AND PETER MUELLER
MARCH 2016
CONTENTS
FEATURES CONTINUED
42 How Anonymous Is the Tor Network? A Long-Term Black-Box InvestigationROBERT KOCH, MARIO GOLLING, AND GABI DREO RODOSEK
50 Using Passive Measurements to Demystify Online TrackersHASSAN METWALLEY, STEFANO TRAVERSO, AND MARCO MELLIA
RESEARCH FEATURES
56 Mitigating Cross-Site Scripting Attacks with a Content Security PolicyIMRAN YUSOF AND AL-SAKIB KHAN PATHAN
64 Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human ExperienceAMIT SHETH, PRAMOD ANANTHARAM, CORY HENSON
COLUMNS
8 32 & 16 YEARS AGOComputer, March 1984 and 2000NEVILLE HOLMES
73 OUT OF BANDNet Neutrality vs. Net NeuteringHAL BERGHEL
78 CLOUD COVER Trustworthy Digital Forensics in the CloudSHAMS ZAWOAD AND RAGIB HASAN
82 AFTERSHOCKThe STEM Anxiety BusinessROBERT N. CHARETTE
88 COMPUTING EDUCATIONThe IEEE Computer Society and ACM’s Collaboration on Computing Education CHARLENE “CHUCK” WALRAD
92 STANDARDS Practical Insights from the Peculiar World of StandardsKAREN BARTLESON
96 SOCIAL COMPUTINGHow Socially Aware Are Social Media Privacy Controls?GAURAV MISRA AND JOSE M. SUCH
100 STUDENT DESIGN SHOWCASEImmortal Bits: Managing Our Digital LegaciesGREG BYRD
104 CYBERTRUSTOn the Move: Evading Distributed Denial-of-Service AttacksANGELOS STAVROU, DANIEL FLECK, AND CONSTANTINOS KOLIAS
128 THE ERRANT HASHTAG Go, Stop, Go, Stop DAVID ALAN GRIER
Membership News
3 70th Anniversary Milestones ANDY CHEN AND LORI CAMERON
70 IEEE Computer Society Information
108 Call and Calendar
Departments
5 Spotlight on Transactions LEILA DE FLORIANI
6 Elsewhere in the CS
114 Career Opportunities
ABOUT THIS ISSUE Surveillance of our electronic communications—thanks to continuing technological breakthroughs and despite ongoing legal challenges— is a fact of modern life.
See www.computer.org/computer -multimedia for multimedia content related to the features in this issue
For more information on computing topics, visit the Computer Society Digital Library at www.computer.org/csdl.