acm-header
Sign In

Communications of the ACM

Latest Research



Reasoning About the Unknown in Static Analysis
From Communications of the ACM

Reasoning About the Unknown in Static Analysis

Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis...

From Communications of the ACM

Technical Persepctive: Large-Scale Sound and Precise Program Analysis

You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of...

The Emergence of Cross Channel Scripting
From Communications of the ACM

The Emergence of Cross Channel Scripting

Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...

From Communications of the ACM

Technical Persepctive: Attacks Target Web Server Logic and Prey on XCS Weaknesses

A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...

Phase Change Memory Architecture and the Quest For Scalability
From Communications of the ACM

Phase Change Memory Architecture and the Quest For Scalability

Memory scaling is in jeopardy as charge storage and sensing mechanisms become less reliable for prevalent memory technologies. In contrast, phase change memory...

From Communications of the ACM

Technical Perspective: Technology Scaling Redirects Main Memories

As predicted by Intel's Gordon Moore in 1965, the number of transistors that can be integrated on one die continues to double approximately...

X86-TSO: A Rigorous and Usable Programmer's Model For X86 Multiprocessors
From Communications of the ACM

X86-TSO: A Rigorous and Usable Programmer's Model For X86 Multiprocessors

Exploiting the multiprocessors that have recently become ubiquitous requires high-performance and reliable concurrent systems code. However, concurrent programming...

From Communications of the ACM

Technical Perspective: A Solid Foundation For X86 Shared Memory

Multithreaded programs that communicate through shared memory are pervasive. Today they are the most obvious...

seL4: Formal Verification of an Operating-System Kernel
From Communications of the ACM

seL4: Formal Verification of an Operating-System Kernel

We report on the formal, machine-checked verification of the seL4 microkernel from an abstract specification down to its C implementation. We assume correctness...

From Communications of the ACM

Technical Perspective: Learning To Do Program Verification

When you decide to use a piece of software, how do you know it will do what you need it to do? Will it be safe to run? Will it interfere...

Asserting and Checking Determinism For Multithreaded Programs
From Communications of the ACM

Asserting and Checking Determinism For Multithreaded Programs

The trend towards processors with more and more parallel cores is increasing the need for software that can take advantage of...

From Communications of the ACM

Technical Perspective: Building Confidence in Multicore Software

Surprises may be fun in real life, but not so in software. One approach to avoiding surprises in software is to establish its...

Automatic Program Repair With Evolutionary Computation
From Communications of the ACM

Automatic Program Repair With Evolutionary Computation

There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. Recent...

From Communications of the ACM

Technical Perspective: Automated Patching Techniques: The Fix Is In

Finding bugs is technically demanding and yet economically vital. How much more difficult yet valuable would it be to...

Computing Arbitrary Functions of Encrypted Data
From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...

From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...

Post-Silicon Bug Localization For Processors Using IFRA
From Communications of the ACM

Post-Silicon Bug Localization For Processors Using IFRA

IFRA overcomes major challenges associated with a very expensive step in post-silicon validation of processors — pinpointing a bug location and the instruction...

From Communications of the ACM

Technical Perspective: Want to Be a Bug Buster?

Microprocessor performance has increased exponentially. These chips with ever increasing complexity are not always fully functional on...

Native Client: A Sandbox For Portable, -Untrusted X86 Native Code
From Communications of the ACM

Native Client: A Sandbox For Portable, -Untrusted X86 Native Code

Native Client is a sandbox for untrusted x86 native code. It aims to give browser-based applications the computational performance of native applications without...

From Communications of the ACM

Technical Perspective: Native Client: A Clever Alternative

Google's Native Client is an intriguing new system that allows untrusted x86 binaries to run safely on bare metal.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account