Trustworthy AI Using Confidential Federated Learning
Classic federated learning emphasizes security and privacy, at the cost of transparency and accountability. Confidential Federated Learning addresses this gap.
Trustworthy AI Using Confidential Federated Learning
Classic federated learning emphasizes security and privacy, at the cost of transparency and accountability. Confidential Federated Learning addresses this gap.
Improving Privacy and Security of Telehealth
Concerns for security call for the development of secure, usable, and privacy-preserving tools for telehealth services.
Global Auto Dealer Management Systems Hacked
Lawsuits claim the attacks exposed consumers' personal information and stopped dealerships' sales, financing, servicing, and payroll operations.
The Digital Degree Certification Revolution in Brazil and Beyond
The issuance and validation of paper-based degree certificates in Brazil presents a significant hurdle.
The U.K. Post Office Scandal: Software Malpractice At Scale
Accounting software should be predictable and boring, not falsely send people to prison. But that's what it did.
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil
The evolution and misuse of public groups on the WhatsApp prompted modifications to the platform’s architecture.
Gradual Differentially Private Programming
The adoption of type systems in recent years has been facilitated by gradual typing.
Ensuring application security from design to operation with DevSecOps.
Data Breach Prevention: Strategies For Proactive Cyber Defense
Data breach prevention techniques help businesses reduce existing threats or recognize potential risks before they result in a breach.
Zero-Knowledge Proofs and Their Role within the Blockchain
An examination of the intricate world of zero-knowledge proofs and how they may be used to enhance blockchain security and privacy.
Security Challenges of Intent-Based Networking
Intent-based networking allows operators to describe the high-level intent of what they want a network to do.
Age Verification Systems Will Be a Personal Identifiable Information Nightmare
Online age verification requirements for websites are a disaster for privacy, and pose a cybersecurity risk.
From Open Access to Guarded Trust
Engineers stand at a unique confluence, where the exhilarating promise of innovation meets the sobering responsibility of trust stewardship.
Technical Perspective: Tracing the Network Traffic Fingerprinting Techniques of OpenVPN
"OpenVPN is Open to VPN Fingerprinting," by Diwen Xue et al., investigates network traffic fingerprinting of a very popular privacy technique—OpenVPN.
OpenVPN Is Open to VPN Fingerprinting
Lattice-Based Cryptosystems and Quantum Cryptanalysis
LLM Hallucinations: A Bug or A Feature?
On the Difference between Security and Safety
Safe networking requires us to be skeptical of messages that try to stampede us into action without enough forethought.
LLMs’ Data-Control Path Insecurity
We need to think carefully about using LLMs in potentially adversarial situations . . . like on the Internet.
The Dangers of Digitization, and The Importance of Data Backup
Maximizing Power Grid Security
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More