Fifty Years of Open Source Software Supply-Chain Security
Problems with software supply-chain security are fundamental and have no easy answers.
Fifty Years of Open Source Software Supply-Chain Security
Problems with software supply-chain security are fundamental and have no easy answers.
Strengthening Enterprise Quantum Security
The clock isn’t ready to strike midnight on outdated encryption, but it’s ticking louder every day.
Cybersecurity in The Arab World: Technological and Socio-Political Dimensions
A cooperative strategy could position the Arab World as an influential contributor to global cybersecurity and AI development.
The Pros and Cons of Zero Trust
Implementations are complex, resource-intensive, and involve high costs.
Illusions provide a way to study compositional generation and understand how machine learning models generate images.
AI is the ultimate force multiplier for cybercriminals, making scams cheaper, faster, and more convincing.
Spotting Scams Based on Fake Profiles
A lack of awareness of how scammers operate keeps them just a click away, ready to steal your money, identity, and sensitive information.
Socioeconomic Threats of Deepfakes and the Role of Cyber-Wellness Education in Defense
Malicious actors appear to be a step ahead of policymakers and educational institutions developing cyber-wellness education and enforcement programs.
The Power of Digital Twins in Cybersecurity
The convergence of IT and OT systems has introduced cybersecurity risks where a single weak spot can render an entire network vulnerable.
A historical perspective on tackling new cyber challenges and securing the future of the computing infrastructure.
NeuroRadar: A Neuromorphic Radar Sensor for Low-Power IoT Systems
NeuroRadar provides a unique and innovative solution for radar sensing in energy-constrained IoT devices.
AI and the Democratization of Cybercrime
Offensive AI should be regulated like a controlled substance.
Deconstructing the Take It Down Act
It is easy to imagine the FTC weaponizing its newfound Take It Down Act authority as a tool of censorship and extortion.
Stop Using Vulnerability Counts to Measure Software Security
A project with a history of vulnerability fixes doesn't mean it is less secure.
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets
Showing the effectiveness of a voltage-based attack that snapshots SRAM, without exposing an SoC to low temperature.
Technical Perspective: Defending Data from SRAM-Based Attacks
SRAM-based attacks include recovering portions of memory from internal caches, internal RAM, and some CPU registers; attaching voltage probes that can keep SRAM powered on SoCs.
Internal Chat Logs of Ransomware Group Leaked
Security Principles for Designing an Unhackable Crypto Wallet
Resilience requires formal rigor, verification tools, and zero-trust assumptions.
Two Types of Data Privacy Controls
Precise, sensible, and easy to use terms to differentiate the two intrinsic types of privacy controls will positively impact the accuracy of privacy research and discussions.
Balancing Secrecy and Transparency in Bug Bounty Programs
Embracing transparency while balancing temporary secrecy can lead to a more resilient and accountable software ecosystem.
AI Empowers Novices to Launch Cyberattacks
AI-powered turnkey tools turn those with little technical expertise into cyber monsters.
Beyond Downtime: Architectural Resilience on Hyperscalers
Essential considerations for building durable systems in the cloud era.
The Real, Significant Threat of Shadow AI
Unsanctioned AI tools are a growing risk for organizations, especially those in highly regulated industries where security, compliance, and data integrity are critical.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More