Physical Key Extraction Attacks on PCs
Security and Privacy
The Solution to AI, What Real Researchers Do, and Expectations For CS Classrooms
The Risks of Self-Auditing Systems
Nine Things I Didn’t Know I Would Learn Being an Engineer Manager
Standing on Distributed Shoulders of Giants
Q&A: Finding New Directions in Cryptography
Why All Writs Is a Trojan Horse
Bringing Computer Science to U.S. Schools, State By State
Silicon Photonics: Ready to Go the Distance?
The Challenges of Partially Automated Driving
Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation
Technical Perspective: A Breakthrough in Software Obfuscation
Future Tense: Becoming a Multi-Planet Species
Beyond Blocks: Syntax and Semantics
How to Increase the Security of Smart Buildings?
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More