communications and privacy under surveillance 14 25 34 · hassan metwalley, stefano traverso, and...

2
MARCH 2016 FEATURES 14 Insecure Surveillance: Technical Issues with Remote Computer Searches STEVEN M. BELLOVIN, MATT BLAZE, AND SUSAN LANDAU 25 Insecure by Design: Protocols for Encrypted Phone Calls STEVEN J. MURDOCH 34 Requirements Analysis Required— Otherwise Targeted Monitoring Enables Pervasive Monitoring STEPHEN FARRELL 10 GUEST EDITORS’ INTRODUCTION Communications and Privacy under Surveillance YING-DAR LIN, JEFFREY VOAS, ANTONIO PESCAPÈ, AND PETER MUELLER

Upload: hoangcong

Post on 09-Dec-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

MARCH 2016

FEATURES 14Insecure

Surveillance: Technical Issues

with Remote Computer Searches

STEVEN M. BELLOVIN, MATT BLAZE, AND SUSAN LANDAU

25Insecure by

Design: Protocols for Encrypted

Phone CallsSTEVEN J. MURDOCH

34Requirements

Analysis Required—Otherwise

Targeted Monitoring Enables Pervasive

MonitoringSTEPHEN FARRELL

10GUEST EDITORS’ INTRODUCTIONCommunications and Privacy under SurveillanceYING-DAR LIN, JEFFREY VOAS, ANTONIO PESCAPÈ, AND PETER MUELLER

MARCH 2016

CONTENTS

FEATURES CONTINUED

42 How Anonymous Is the Tor Network? A Long-Term Black-Box InvestigationROBERT KOCH, MARIO GOLLING, AND GABI DREO RODOSEK

50 Using Passive Measurements to Demystify Online TrackersHASSAN METWALLEY, STEFANO TRAVERSO, AND MARCO MELLIA

RESEARCH FEATURES

56 Mitigating Cross-Site Scripting Attacks with a Content Security PolicyIMRAN YUSOF AND AL-SAKIB KHAN PATHAN

64 Semantic, Cognitive, and Perceptual Computing: Paradigms That Shape Human ExperienceAMIT SHETH, PRAMOD ANANTHARAM, CORY HENSON

COLUMNS

8 32 & 16 YEARS AGOComputer, March 1984 and 2000NEVILLE HOLMES

73 OUT OF BANDNet Neutrality vs. Net NeuteringHAL BERGHEL

78 CLOUD COVER Trustworthy Digital Forensics in the CloudSHAMS ZAWOAD AND RAGIB HASAN

82 AFTERSHOCKThe STEM Anxiety BusinessROBERT N. CHARETTE

88 COMPUTING EDUCATIONThe IEEE Computer Society and ACM’s Collaboration on Computing Education CHARLENE “CHUCK” WALRAD

92 STANDARDS Practical Insights from the Peculiar World of StandardsKAREN BARTLESON

96 SOCIAL COMPUTINGHow Socially Aware Are Social Media Privacy Controls?GAURAV MISRA AND JOSE M. SUCH

100 STUDENT DESIGN SHOWCASEImmortal Bits: Managing Our Digital LegaciesGREG BYRD

104 CYBERTRUSTOn the Move: Evading Distributed Denial-of-Service AttacksANGELOS STAVROU, DANIEL FLECK, AND CONSTANTINOS KOLIAS

128 THE ERRANT HASHTAG Go, Stop, Go, Stop DAVID ALAN GRIER

Membership News

3 70th Anniversary Milestones ANDY CHEN AND LORI CAMERON

70 IEEE Computer Society Information

108 Call and Calendar

Departments

5 Spotlight on Transactions LEILA DE FLORIANI

6 Elsewhere in the CS

114 Career Opportunities

ABOUT THIS ISSUE Surveillance of our electronic communications—thanks to continuing technological breakthroughs and despite ongoing legal challenges— is a fact of modern life.

See www.computer.org/computer -multimedia for multimedia content related to the features in this issue

For more information on computing topics, visit the Computer Society Digital Library at www.computer.org/csdl.