Cybersecurity vendors are using AI-enabled products to keep a leg up on hackers and "threat actors" who have also added AI to their arsenals.
Security and Privacy
Notice and Choice Cannot Stand Alone
If bolstered by appropriate laws, standards, and easy-to-use interfaces, the notice and choice concept could be a useful tool in our future privacy toolbox.
Belt and Braces: When Federated Learning Meets Differential Privacy
An overview of differential privacy-enabled federated learning with a focus on utility optimization techniques.
Confidential Computing or Cryptographic Computing?
Trade-offs between secure computation via cryptography and hardware enclaves.
The Gift That Keeps on Giving to Apple and Google
Technical arguments for keeping or upending the current Apple and Google mobile app store systems.
‘Cheat Engines’ and Copyright in Video Games in the EU
The Court of Justice of the EU finds it permissible to observe, study, and test a program to reveal the ideas and principles underlying its operation and reproduce the results of its execution.
Strengthening Security with Attack Surface Management
The ASM approach is built upon a network infrastructure graph developed by engineers for investigative purposes.
Pitfalls in Machine Learning for Computer Security
Generic pitfalls related to machine learning affect all security domains and can affect the entire machine learning workflow, weakening assumptions, conclusions, and lessons learned.
Technical Perspective: Machine Learning in Computer Security is Difficult to Fix
The study points out some common issues hindering the design of ML models for computer security and how to overcome them.
Human-Centered Cybersecurity Revisited: From Enemies to Partners
It is time to reconsider how we deal with the human factor in cybersecurity.
LLMs represent an emerging battleground for misuse and abuse that aims to sway public opinion and mislead the masses.
Dark Patterned Voices Manipulate Users
The vocal cues of voice user interfaces can be subtly manipulated to influence users' opinions.
The Future of Misuse Detection
A sequence of interrelated SRI projects are representative examples of the body of earlier work in the field of misuse detection.
mCaptcha: Replacing Captchas with Rate Limiters to Improve Security and Accessibility
An overview of mCaptcha, a variable-difficulty-based proof-of-work captcha system that addresses the security, usability, and privacy issues with other captchas.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
A firmware change to Bluetooth chip sets makes the unwelcome tracking of a device by stalkers, hackers, and others impractical.
Fort Knox Your Data: A Guide to Access Controls
Regular audits and continuous monitoring are critical for identifying and addressing potential security vulnerabilities.
There is a critical need for better software design, development, test, and propagation processes.
Cybersecurity in Industrial IoT: Protecting Critical Infrastructure
Today's IIoT environments demand sophisticated, multi-layered security strategies.
How CrowdStrike Stopped Everything
The CrowdStrike global IT outage put millions of systems and their data out of reach.
Partnering to Protect the Power
As the informational needs of the power grid become more complex and the connected “smart grid” expands, so too do the cybersecurity needs of grid operators.
A Security Model for Web-Based Communication
We propose an algorithmic security model based on the widely deployed technologies DNSSEC and Web PKI to cover the dimensions of identification, resolution, and transaction.
Technical Perspective: Revealing the Cracks in AA Services
"A Security Model for Web-Based Communication," by Pouyan Fotouhi Tehrani et al., presents a new study of alerting authorities and their cybersafety measures.
The Vulnerability-Adaptive Protection Paradigm
Resiliency solutions for autonomous machines make trade-offs between resiliency and cost.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More