Professional Documents
Culture Documents
DOI:10.1145/ 2980989
via a clever mix of techniques from
rticle development led by
A
queue.acm.org
compilers, systems, and language de-
sign. This focus on theory made practi-
cal is an excellent topic for RfP.
Expert-curated guides Second, Vijay Janapa Reddi and
to the best of CS research. Yuhao Zhu provide an overview of the
challenges for the future of the mobile
Research
Web. Mobile represents a major frontier
in personal computing, with extreme
growth in adoption and data volume.
Accordingly, Reddi and Zhu outline
for Practice:
three major ongoing challenges in mo-
bile Web computing: responsiveness
of resource loading, energy efficiency
of computing devices, and making effi-
cient use of data. In their citations, Red-
information flow practical is a major challenge, on the design and implementation of next-generation
data-intensive systems.
JA N UA RY 2 0 1 7 | VO L. 6 0 | N O. 1 | C OM M U N IC AT ION S OF T HE ACM 51
practice
The Hails work shows it is possible to en- ing. Illumio, vArmour, and GuardiCore major challenge is the responsiveness of
force information flow in Web applica- are three among the many startups in Web applications. It is estimated that
tions with negligible overhead, without the microsegmentation space. This evo- a one-second delay in Web page load
requiring programmers to change how lution toward finer-grained approaches time costs Amazon $1.6 billion in annual
they have been programming. shows that people are becoming more sales lost, since mobile users abandon a
open to the system re-architecting and Web service altogether if the Web page
Shifting Implementation runtime overheads that come with in- takes too long to load. Google loses eight
Burden to the Framework formation flow control approaches. As million searches from a four-tenths-of-a-
security becomes even more important second slowdown in search-results gen-
Yang, J., et al. and information flow techniques be- eration. A key bottleneck of mobile Web
Precise, dynamic information flow for come more practical, the shift toward responsiveness is resource loading. The
database-backed applications. Proceedings
of the 37th ACM SIGPLAN Conference
more adoption will continue. number of objects in today’s Web pages
on Programming Language Design and Acknowledgments. Thanks to A. Au- is already on the order of hundreds, and
Implementation, 2016, 631–647. frichtig, S. Chong, V. Iozzo, L. Meyerov- it continues to grow steadily. Future
http://dl.acm.org/citation.cfm?id=2908098 ich, and D. Stefan. mobile Web computing systems must
improve resource-loading performance,
With the previous two approaches, the References which is the focus of the first paper.
1. Balluck, K. Corporate data breaches ‘inevitable,’ expert
programmer remains burdened with says. The Hill (Nov. 30 2014); http://thehill.com/policy/ The second major challenge is energy
constructing programs correctly with cybersecurity/225550-cybersecurity-expert-data- efficiency. Mobile devices are severely
breaches-inevitable.
respect to information flow. Without 2. Cunningham, M. Facebook security flaw could leak constrained by the battery. While com-
a change in the underlying execution your personal info to criminals. Komando.com (Aug. puting capability driven by Moore’s Law
10, 2015); http://bit.ly/2fRXp8L
model, the most any framework can do 3. Information is beautiful. World’s biggest data advances approximately every two years,
is raise exceptions or silently fail when breaches, 2016; http://www.informationisbeautiful.net/ battery capacity doubles every 10 years—
visualizations/worlds-biggest-data-breaches-hacks/.
policies are violated. 4. Gellman, B. and Poitras, L. U.S., British intelligence creating a widening gap between com-
mining data from nine U.S. Internet companies in
This paper looks at what the Web broad, secret program. Washington Post (June 7,
putational horsepower and the energy
programming model might look like 2013); http://wapo.st/1LcAw6p needed to power the device. Therefore,
5. Open Web Application Security Project (OWASP).
if information flow policies could be Static code analysis, 2016; https://www.owasp.org/
future mobile Web computing must be
factored out of programs the way mem- index.php/Static_Code_Analysis. energy efficient. The second paper in our
6. Zetter, K. Hacker lexicon: What is an air gap? Wired
ory-managed languages factor out allo- (Dec. 8, 2014); http://www.wired.com/2014/12/hacker- selection proposes Web programming
cation and deallocation. The paper pres- lexicon-air-gap/. language support for energy efficiency.
ents Jacqueline, an MPVC framework The third major challenge is data us-
Jean Yang is an assistant professor in the computer
that allows programmers to specify how science department at Carnegie Mellon University.
age. A significant amount of future mo-
to compute an alternative default for In 2015 she cofounded the Cybersecurity Factory bile Web usage will come from emerging
accelerator to bridge the gap between research and
each data value; and high-level policies practice in cybersecurity.
markets in developing countries where
about when to show each value that may the cost of mobile data is prohibitively
contain database queries and/or depend large. To accelerate the Web’s growth
on sensitive values. in emerging markets, future mobile
A plausible default for a sensitive lo- Web computing infrastructure must
cation value is the corresponding city. serve data consciously. The final paper
A valid policy is allowing a viewer to see discusses how to design a practical and
the location only if the viewer is within efficient HTTP data compression proxy
some radius of the location. This paper service that operates at Google’s scale.
presents an implementation strategy The Red Future of Developers and system architects
for Jacqueline that works with existing Mobile Web Computing must optimize for RED (responsive-
SQL databases. While the paper focuses By Vijay Janapa Reddi ness, energy efficiency, and data us-
more on demonstrating feasibility than and Yuhao Zhu age), ideally together, to usher in a new
on the nuts and bolts of Web security, it The Web is on the cusp of a new evolu- generation of mobile Web computing.
de-risks the approach for practitioners tion, driven by today’s most pervasive
who may want to adopt it. personal computing platform—mobile Intelligent Resource Loading
devices. At present, there are more than For Responsiveness
Final Thoughts three billion Web-connected mobile
The past few years have seen a gradual devices. By 2020, there will be 50 billion Netravali et al.
movement toward the adoption of prac- such devices. In many markets around Polaris: Faster page loads using fine-grained
dependency tracking. Proceedings of the 13th
tical information flow: first with con- the world mobile Web traffic volume Usenix Symposium on Networked Systems
tainment, then with microcontainers exceeds desktop Web traffic, and it con- Design and Implementation, 2016.
and microsegmentation. These tech- tinues to grow in double digits. https://www.usenix.org/conference/nsdi16/
niques control which devices and ser- Three significant challenges stand in technical-sessions/presentation/netravali
vices can interact with policies for soft- the way of the future mobile Web. The
ware-defined infrastructures such as papers selected here focus on carefully A key bottleneck for mobile Web re-
iptables and software-defined network- addressing these challenges. The first sponsiveness is resource loading. The
tion, however, is largely unaccounted for er, demonstrates that while the core Copyright held by owners/authors.
in today’s Web programming languages. of the proxy server is compression, Publication rights licensed to ACM. $15.00
JA N UA RY 2 0 1 7 | VO L. 6 0 | N O. 1 | C OM M U N IC AT ION S OF T HE ACM 53