The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 01 - January/February (vol. 16)
ISSN: 1540-7993

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 1-2

Reviewer Thanks (HTML)

pp. 3-4

Masthead (PDF)

pp. 5

Selected Papers from the 2017 IEEE Symposium on Security and Privacy (HTML)

Terry Benzel , University of Southern California Information Sciences Institute
Sean Peisert , Lawrence Berkeley National Laboratory, CENIC, and University of California, Davis
pp. 10-11

Toward Continual Measurement of Global Network-Level Censorship (Abstract)

Paul Pearce , University of California, Berkeley
Roya Ensafi , University of Michigan
Frank Li , University of California, Berkeley
Nick Feamster , Princeton University
Vern Paxson , University of California, Berkeley
pp. 24-33

Enhancing Selectivity in Big Data (Abstract)

Mathias Lecuyer , Columbia University
Riley Spahn , Columbia University
Roxana Geambasu , Columbia University
Tzu-Kuo Huang , Uber Advanced Technologies Group
Siddhartha Sen , Microsoft Research
pp. 34-42

COMPSAC 2018 (PDF)

pp. 43

Arya: Operating System Support for Securely Augmenting Reality (Abstract)

Kiron Lebeck , University of Washington
Kimberly Ruth , University of Washington
Tadayoshi Kohno , University of Washington
Franziska Roesner , University of Washington
pp. 44-53

IoT Goes Nuclear: Creating a Zigbee Chain Reaction (Abstract)

Eyal Ronen , Weizmann Institute of Science
Adi Shamir , Weizmann Institute of Science
Achi-Or Weingarten , Weizmann Institute of Science
Colin OFlynn , Dalhousie University
pp. 54-62

Dynamically Regulating Mobile Application Permissions (Abstract)

Primal Wijesekera , University of British Columbia
Arjun Baokar , University of California, Berkeley
Lynn Tsai , University of California, Berkeley
Joel Reardon , University of Calgary
Serge Egelman , University of California, Berkeley
David Wagner , University of California, Berkeley
Konstantin Beznosov , University of British Columbia
pp. 64-71

Verifiable Classroom Voting in Practice (Abstract)

Feng Hao , Newcastle University
Dylan Clarke , Newcastle University
Brian Randell , Newcastle University
Siamak F. Shahandashti , University of York
pp. 72-81

Flow-Based Compromise Detection: Lessons Learned (Abstract)

Rick Hofstede , University of Twente
Aiko Pras , University of Twente
Anna Sperotto , University of Twente
Gabi Dreo Rodosek , Universität der Bundeswehr München
pp. 82-89

myCS (PDF)

pp. 90

Prepare to Connect (PDF)

pp. 91

Defending from Stealthy Botnets Using Moving Target Defenses (Abstract)

Massimiliano Albanese , George Mason University
Sushil Jajodia , George Mason University
Sridhar Venkatesan , Vencore Labs
pp. 92-97

Hello, World!—Code Responsibly (Abstract)

Siddharth Kaza , Towson University
Blair Taylor , Towson University
Kyle Sherbert , Towson University
pp. 98-100

Freedom of Encryption (Abstract)

Aisling Connolly , École Normale Supérieure
pp. 102-103

Trading Places (HTML)

Daniel E. Geer , In-Q-Tel
pp. 104

IEEE Computer Society (PDF)

pp. c3
82 ms
(Ver 3.3 (11022016))