Developer Ecosystems for Software Safety
Security and Privacy
Perspectives on AI from Around the Globe
In Memoriam: Ross Anderson, 1956-2024
The Risks of Source Code Breaches
The Return of Age Verification Laws
Will generative artificial intelligence accelerate the growth of made-for-advertising sites?
Device Onboarding Using FDO and the Untrusted Installer Model
The Science of Detecting LLM-Generated Text
A technical introduction to LLM-generated text detection methods.
Indistinguishability Obfuscation from Well-Founded Assumptions
We examine a formalization of the “one-way compiler" concept with the notion of indistinguishability obfuscation.
Technical Perspective: Hiding Secrets in Programs
"Indistinguishability Obfuscation from Well-Founded Assumptions," by Aayush Jain et al., gives a new construction of indistinguishability obfuscation that is provably secure.
Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective
Internet of Things Security and Privacy Labels Should Empower Consumers
Validating Factual Personal Information
Unlocking the Potential of Zero-Knowledge Proofs in Blockchain
Protecting Life-Saving Medical Devices From Cyberattack
Creating the First Confidential GPUs
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More