acm-header
Sign In

Communications of the ACM

Latest Research



Goldilocks: A Race-Aware Java Runtime
From Communications of the ACM

Goldilocks: A Race-Aware Java Runtime

GOLDILOCKS is a Java runtime that monitors program executions and throws a DataRaceException when a data race...

From Communications of the ACM

Technical Perspective: Data Races Are Evil with No Exceptions

Exploiting parallelism has become the primary means to higher performance. Shared memory is a pervasively used programming...

Difference Engine: Harnessing Memory Redundancy in Virtual Machines
From Communications of the ACM

Difference Engine: Harnessing Memory Redundancy in Virtual Machines

Virtual machine monitors are a popular platform for Internet hosting centers and cloud-based compute services. But main memory is not amenable to multiplexed hardware...

From Communications of the ACM

Technical Perspective: A VM 'Engine' That Makes a Difference

The past decade has witnessed a renaissance in server virtualization. Diwaker Gupta et al. present a novel approach for significantly improving the efficiency of...

Reasoning About the Unknown in Static Analysis
From Communications of the ACM

Reasoning About the Unknown in Static Analysis

Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis...

From Communications of the ACM

Technical Persepctive: Large-Scale Sound and Precise Program Analysis

You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of...

The Emergence of Cross Channel Scripting
From Communications of the ACM

The Emergence of Cross Channel Scripting

Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...

From Communications of the ACM

Technical Persepctive: Attacks Target Web Server Logic and Prey on XCS Weaknesses

A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...

Phase Change Memory Architecture and the Quest For Scalability
From Communications of the ACM

Phase Change Memory Architecture and the Quest For Scalability

Memory scaling is in jeopardy as charge storage and sensing mechanisms become less reliable for prevalent memory technologies. In contrast, phase change memory...

From Communications of the ACM

Technical Perspective: Technology Scaling Redirects Main Memories

As predicted by Intel's Gordon Moore in 1965, the number of transistors that can be integrated on one die continues to double approximately...

X86-TSO: A Rigorous and Usable Programmer's Model For X86 Multiprocessors
From Communications of the ACM

X86-TSO: A Rigorous and Usable Programmer's Model For X86 Multiprocessors

Exploiting the multiprocessors that have recently become ubiquitous requires high-performance and reliable concurrent systems code. However, concurrent programming...

From Communications of the ACM

Technical Perspective: A Solid Foundation For X86 Shared Memory

Multithreaded programs that communicate through shared memory are pervasive. Today they are the most obvious...

seL4: Formal Verification of an Operating-System Kernel
From Communications of the ACM

seL4: Formal Verification of an Operating-System Kernel

We report on the formal, machine-checked verification of the seL4 microkernel from an abstract specification down to its C implementation. We assume correctness...

From Communications of the ACM

Technical Perspective: Learning To Do Program Verification

When you decide to use a piece of software, how do you know it will do what you need it to do? Will it be safe to run? Will it interfere...

Asserting and Checking Determinism For Multithreaded Programs
From Communications of the ACM

Asserting and Checking Determinism For Multithreaded Programs

The trend towards processors with more and more parallel cores is increasing the need for software that can take advantage of...

From Communications of the ACM

Technical Perspective: Building Confidence in Multicore Software

Surprises may be fun in real life, but not so in software. One approach to avoiding surprises in software is to establish its...

Automatic Program Repair With Evolutionary Computation
From Communications of the ACM

Automatic Program Repair With Evolutionary Computation

There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. Recent...

From Communications of the ACM

Technical Perspective: Automated Patching Techniques: The Fix Is In

Finding bugs is technically demanding and yet economically vital. How much more difficult yet valuable would it be to...

Computing Arbitrary Functions of Encrypted Data
From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...

From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account