Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: The Interplay of Neuroscience and Cryptography

An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is...

Neuroscience Meets Cryptography
From Communications of the ACM

Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks

We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow...

From Communications of the ACM

Technical Perspective: The Realities of Home Broadband

Buying residential broadband services seems relatively simple: pick among a small number of plans, and then compare similar plans by price. Unfortunately, reality...

Measuring Home Broadband Performance
From Communications of the ACM

Measuring Home Broadband Performance

We present the results from the first study of Internet access link performance measured directly from home routers. Our findings provide a snapshot of access network...

From Communications of the ACM

Technical Perspective: Making Browser Extensions Secure

Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security...

Vetting Browser Extensions for Security Vulnerabilities with VEX
From Communications of the ACM

Vetting Browser Extensions for Security Vulnerabilities with VEX

The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that...

Difference Engine: Harnessing Memory Redundancy in Virtual Machines
From Communications of the ACM

Difference Engine: Harnessing Memory Redundancy in Virtual Machines

Virtual machine monitors are a popular platform for Internet hosting centers and cloud-based compute services. But main memory is not amenable to multiplexed hardware...

From Communications of the ACM

Technical Perspective: A VM 'Engine' That Makes a Difference

The past decade has witnessed a renaissance in server virtualization. Diwaker Gupta et al. present a novel approach for...

The Emergence of Cross Channel Scripting
From Communications of the ACM

The Emergence of Cross Channel Scripting

Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...

From Communications of the ACM

Technical Persepctive: Attacks Target Web Server Logic and Prey on XCS Weaknesses

A system is secure only if the entire system is secure. While this may sound obvious, achieving total security...

Does Distributed Development Affect Software Quality?
From Communications of the ACM

Does Distributed Development Affect Software Quality?: An Empirical Case Study of Windows Vista

Existing literature on distributed development in software engineering and other fields discusses various challenges,...

From Communications of the ACM

Technical Perspective: Maintaining Quality in the Face of Distributed Development

It was a problem that should not have taken three weeks to solve. The documentation claimed that if a function was called...

Securing Frame Communication in Browsers
From Communications of the ACM

Securing Frame Communication in Browsers

Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient...

From Communications of the ACM

Technical Perspective: Reframing Security for the Web

The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've...

Lest We Remember
From Communications of the ACM

Lest We Remember: Cold-Boot Attacks on Encryption Keys

DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and...

From Communications of the ACM

Technical Perspective: A Chilly Sense of Security

Many systems rely on keeping a master key secret. But technological progress can undermine old assumptions.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo