acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorMIT News
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Stronger Security for Smart Devices
From ACM TechNews

Stronger Security for Smart Devices

Two new security techniques block power and electromagnetic side-channel attacks targeting analog-to-digital converters in smart devices.

A Security Technique to Fool Would-Be Cyberattackers
From ACM TechNews

A Security Technique to Fool Would-Be Cyberattackers

A new technique to prevent memory timing side-channel attacks by malware exploits memory hardware common to multiple programs running on the same computer.

Toward a Stronger Defense of Personal Data
From ACM TechNews

Toward a Stronger Defense of Personal Data

Researchers at the Massachusetts Institute of Technology have designed an integrated circuit chip that can thwart power side-channel attacks using less energy than...

Universal System Decodes Any Type of Data Sent Across a Network
From ACM TechNews

Universal System Decodes Any Type of Data Sent Across a Network

Scientists have programmed a universal algorithm to enable a silicon chip to decode any data transmitted across a network, irrespective of structure.

Study: Crowds Can Wise Up to Fake News
From ACM TechNews

Study: Crowds Can Wise Up to Fake News

Scientists suggest crowdsourced assessments from groups of normal readers can virtually match those of professional fact-checkers in vetting news stories.

AI System Could Help Counter the Spread of Disinformation
From ACM TechNews

AI System Could Help Counter the Spread of Disinformation

The Reconnaissance of Influence Operations program was developed to identify disinformation narratives and the individuals spreading them via social media.

A Better Kind of Cybersecurity Strategy
From ACM TechNews

A Better Kind of Cybersecurity Strategy

Researchers contend Russia's use of North Korean IP addresses for a 2018 cyberattack underscored the need for a new cybersecurity strategy involving selective retaliation...

Helping Companies Prioritize Their Cybersecurity Investments
From ACM TechNews

Helping Companies Prioritize Their Cybersecurity Investments

A platform developed by researchers at the Massachusetts Institute of Technology can quantify security risks for companies without requiring them to disclose sensitive...

Protecting Sensitive Metadata So It Can't be Used for Surveillance
From ACM TechNews

Protecting Sensitive Metadata So It Can't be Used for Surveillance

MIT researchers have developed a scalable metadata-protection scheme to shield the information of millions of users.

Cryptographic 'Tag of Everything' Could Protect Supply Chain
From ACM TechNews

Cryptographic 'Tag of Everything' Could Protect Supply Chain

A new cryptographic identity tag can be attached to virtually any product in order to verify its authenticity.

Better Autonomous 'Reasoning' at Tricky Intersections
From ACM TechNews

Better Autonomous 'Reasoning' at Tricky Intersections

A new model can help autonomous vehicles determine when it is safe to proceed into traffic at intersections with obstructed views.

Helping Autonomous Vehicles See Around Corners
From ACM TechNews

Helping Autonomous Vehicles See Around Corners

Massachusetts Institute of Technology engineers have created a system that perceives tiny fluctuations in ground shadows to ascertain whether an unseen object is...

Algorithm Tells Robots Where Nearby Humans are Headed
From ACM TechNews

Algorithm Tells Robots Where Nearby Humans are Headed

A new algorithm accurately aligns partial trajectories in real time, allowing motion predictors in self-driving cars to accurately anticipate the timing of a person's...

Improving Security as AI Moves to Smartphones
From ACM TechNews

Improving Security as AI Moves to Smartphones

Researchers suggest the vulnerability of compressed, or quantized, artificial intelligence models to adversarial attack could be remedied by adding a mathematical...

Novel Transmitter Protects Wireless Data From Hackers
From ACM TechNews

Novel Transmitter Protects Wireless Data From Hackers

A new transmitter can hack-proof wireless data by frequency hopping each individual 1 or 0 bit of a data packet, every microsecond.

Private Browsing Gets More Private
From ACM TechNews

Private Browsing Gets More Private

The new Veil system is designed to improve private browsing by guaranteeing that any data the browser loads into memory remains encrypted until it is displayed...

Energy-Efficient Encryption for the Internet of Things
From ACM TechNews

Energy-Efficient Encryption for the Internet of Things

A new chip performs public-key encryption while consuming only 1/400 as much power as software execution of the same protocols would.

New 3D Chip Combines Computing and Data Storage
From ACM TechNews

New 3D Chip Combines Computing and Data Storage

A new computer chip integrates carbon nanotubes and resistive random-access memory cells.

­sing Bitcoin to Prevent Identify Theft
From ACM TechNews

­sing Bitcoin to Prevent Identify Theft

A new system uses bitcoin's security mechanisms to foil online identify thieves.

Protecting Web ­sers' Privacy
From ACM TechNews

Protecting Web ­sers' Privacy

Splinter is a new encryption system that disguises users' database queries so they reveal no private information.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account