Communications of the ACM Security The latest news, opinion and research in security, from Communications online.
- Questioning the Criteria for Evaluating Non-Cryptographic Hash Functionsby Catherine Hayes on January 15, 2025 at 3:14 pm
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
- Building on Shaky Groundby George V. Neville-Neil on January 13, 2025 at 8:49 pm
It simply is not appropriate to write code that will be connected to the Internet in an unsafe language such as C.
- How Software Bugs led to ‘One of the Greatest Miscarriages of Justice’ in British Historyby Mark Halper on January 8, 2025 at 5:57 pm
Bad coding and bad testing characterize the software that led to wrongful convictions, financial ruin, and four suicides.
- Strengthening Security Throughout the ML/AI Lifecycleby Alex Vakulov on December 20, 2024 at 3:43 pm
Automation, audits, and access control are some of the ways to enhance security in ML systems.
- Zero-Trust Security in Software Developmentby Harikrishna Kundariya on December 17, 2024 at 8:11 pm
The zero-trust security model is a proactive approach to overcoming potential threats and enhancing application security.
- It’s Another Attack on the U.S. Capitolby R. Colin Johnson on December 11, 2024 at 5:29 pm
Using the same password for business and personal accounts is a common but risky practice that creates vulnerabilities.
- Email Insecurityby David Geer on November 25, 2024 at 2:00 pm
Aides or staffers registered official email addresses and passwords on vulnerable third-party sites, putting those credentials at risk.
- The EU AI Act and the Wager on Trustworthy AIby Alejandro Bellogín on November 22, 2024 at 4:53 pm
The EU AI Act serves as a reminder for developers to always prioritize the well being of individuals and society as a whole.
- Computing with Time: Microarchitectural Weird Machinesby Thomas S. Benjamin on November 22, 2024 at 4:50 pm
Demonstrating the practicallity of μWMs by creating a microarchitecture-sensitive logic bomb.
- Technical Perspective: How Exploits Impact Computer Science Theoryby Sergey Bratus on November 22, 2024 at 4:49 pm
The term “weird machines” reflects the shift in the understanding of exploitability’s root cause.