acm-header
Sign In

Communications of the ACM

Latest Practice



The Software Industry Is <i>Still</i> the Problem
From Communications of the ACM

The Software Industry Is Still the Problem

The time is (also) way overdue for IT professional liability.

Lamboozling Attackers
From Communications of the ACM

Lamboozling Attackers: A New Generation of Deception

Software engineering teams can exploit attackers' human nature by building deception environments.

Federated Learning and Privacy
From Communications of the ACM

Federated Learning and Privacy

Building privacy-preserving systems for machine learning and data science on decentralized data.

Static Analysis at GitHub
From Communications of the ACM

Static Analysis at GitHub

An experience report.

Designing UIs for Static-Analysis Tools
From Communications of the ACM

Designing UIs for Static-Analysis Tools

Evaluating tool design guidelines with SWAN.

The Complex Path to Quantum Resistance
From Communications of the ACM

The Complex Path to Quantum Resistance

Is your organization prepared?

Quantum-Safe Trust for Vehicles
From Communications of the ACM

Quantum-Safe Trust for Vehicles: The Race Is Already On

A discussion of concerns on quantum vulnerability for the automobile industry.

WebRTC
From Communications of the ACM

WebRTC: Real-Time Communication for the Open Web Platform

What was once a way to bring audio and video to the Web has expanded into more use cases than we could ever imagine.

Application Frameworks
From Communications of the ACM

Application Frameworks

While powerful, frameworks are not for everyone.

The SPACE of Developer Productivity
From Communications of the ACM

The SPACE of Developer Productivity

There's more to it than you think.

Toward Confidential Cloud Computing
From Communications of the ACM

Toward Confidential Cloud Computing

Extending hardware-enforced cryptographic protection to data while in use.

Enclaves in the Clouds
From Communications of the ACM

Enclaves in the Clouds

Legal considerations and broader implications

Battery Day
From Communications of the ACM

Battery Day

A closer look at the technology that makes portable electronics possible.

Everything VPN Is New Again
From Communications of the ACM

Everything VPN Is New Again

The 24-year-old security model has found a second wind.

Out-of-This-World Additive Manufacturing
From Communications of the ACM

Out-of-This-World Additive Manufacturing

From thingamabobs to rockets, 3D printing takes many forms.

Differential Privacy
From Communications of the ACM

Differential Privacy: The Pursuit of Protections by Default

A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta

The Identity in Everyone's Pocket
From Communications of the ACM

The Identity in Everyone's Pocket

Keeping users secure through their smartphones.

The Die is Cast
From Communications of the ACM

The Die is Cast

Hardware security is not assured.

Security Analysis of SMS as a Second Factor of Authentication
From Communications of the ACM

Security Analysis of SMS as a Second Factor of Authentication

The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.

The Life of a Data Byte
From Communications of the ACM

The Life of a Data Byte

Be kind and rewind.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account