A deleted private key, a looming deadline, and a last chance to patch a new static root of trust into the bootloader.
Phil Vachon From Communications of the ACM | July 2022
Software engineering teams can exploit attackers' human nature by building deception environments.
Kelly Shortridge, Ryan Petrich From Communications of the ACM | June 2022
Building privacy-preserving systems for machine learning and data science on decentralized data.
Kallista Bonawitz, Peter Kairouz, Brendan Mcmahan, Daniel Ramage From Communications of the ACM | April 2022
A discussion of concerns on quantum vulnerability for the automobile industry.
Michael Gardiner, Alexander Truskovsky, George Neville-Neil, Atefeh Mashatan From Communications of the ACM | September 2021
What was once a way to bring audio and video to the Web has expanded into more use cases than we could ever imagine.
Niklas Blum, Serge Lachapelle, Harald Alvestrand From Communications of the ACM | August 2021
There's more to it than you think.
Nicole Forsgren, Margaret-Anne Storey, Chandra Maddila, Thomas Zimmermann, Brian Houck, Jenna Butler From Communications of the ACM | June 2021
Extending hardware-enforced cryptographic protection to data while in use.
Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia From Communications of the ACM | June 2021