Strengthening Security Throughout the ML/AI Lifecycle
Automation, audits, and access control are some of the ways to enhance security in ML systems.
Strengthening Security Throughout the ML/AI Lifecycle
Automation, audits, and access control are some of the ways to enhance security in ML systems.
Zero-Trust Security in Software Development
The zero-trust security model is a proactive approach to overcoming potential threats and enhancing application security.
It’s Another Attack on the U.S. Capitol
Using the same password for business and personal accounts is a common but risky practice that creates vulnerabilities.
Aides or staffers registered official email addresses and passwords on vulnerable third-party sites, putting those credentials at risk.
The EU AI Act and the Wager on Trustworthy AI
The EU AI Act serves as a reminder for developers to always prioritize the well being of individuals and society as a whole.
Computing with Time: Microarchitectural Weird Machines
Demonstrating the practicallity of μWMs by creating a microarchitecture-sensitive logic bomb.
Technical Perspective: How Exploits Impact Computer Science Theory
The term “weird machines” reflects the shift in the understanding of exploitability’s root cause.
Detecting/Explaining Industrial Hacks
XAI provides clear descriptions of Industrial Control System anomalies in accessible terms.
Cybersecurity vendors are using AI-enabled products to keep a leg up on hackers and "threat actors" who have also added AI to their arsenals.
Notice and Choice Cannot Stand Alone
If bolstered by appropriate laws, standards, and easy-to-use interfaces, the notice and choice concept could be a useful tool in our future privacy toolbox.
Belt and Braces: When Federated Learning Meets Differential Privacy
An overview of differential privacy-enabled federated learning with a focus on utility optimization techniques.
Confidential Computing or Cryptographic Computing?
Trade-offs between secure computation via cryptography and hardware enclaves.
The Gift That Keeps on Giving to Apple and Google
Technical arguments for keeping or upending the current Apple and Google mobile app store systems.
‘Cheat Engines’ and Copyright in Video Games in the EU
The Court of Justice of the EU finds it permissible to observe, study, and test a program to reveal the ideas and principles underlying its operation and reproduce the results of its execution.
Strengthening Security with Attack Surface Management
The ASM approach is built upon a network infrastructure graph developed by engineers for investigative purposes.
Pitfalls in Machine Learning for Computer Security
Generic pitfalls related to machine learning affect all security domains and can affect the entire machine learning workflow, weakening assumptions, conclusions, and lessons learned.
Technical Perspective: Machine Learning in Computer Security is Difficult to Fix
The study points out some common issues hindering the design of ML models for computer security and how to overcome them.
Human-Centered Cybersecurity Revisited: From Enemies to Partners
It is time to reconsider how we deal with the human factor in cybersecurity.
LLMs represent an emerging battleground for misuse and abuse that aims to sway public opinion and mislead the masses.
Dark Patterned Voices Manipulate Users
The vocal cues of voice user interfaces can be subtly manipulated to influence users' opinions.
The Future of Misuse Detection
A sequence of interrelated SRI projects are representative examples of the body of earlier work in the field of misuse detection.
mCaptcha: Replacing Captchas with Rate Limiters to Improve Security and Accessibility
An overview of mCaptcha, a variable-difficulty-based proof-of-work captcha system that addresses the security, usability, and privacy issues with other captchas.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More