acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Hiding Secrets in Programs
From Communications of the ACM

Technical Perspective: Hiding Secrets in Programs

"Indistinguishability Obfuscation from Well-Founded Assumptions," by Aayush Jain et al., gives a new construction of indistinguishability obfuscation that is provably...

Indistinguishability Obfuscation from Well-Founded Assumptions
From Communications of the ACM

Indistinguishability Obfuscation from Well-Founded Assumptions

We examine a formalization of the "one-way compiler" concept with the notion of indistinguishability obfuscation.

Technical Perspective: How Easy Is It to Describe Hard Polynomials?
From Communications of the ACM

Technical Perspective: How Easy Is It to Describe Hard Polynomials?

"Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits," by Nutan Limaye et al., achieves a landmark in the larger quest of understanding hardness,...

Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines
From Communications of the ACM

Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines

This paper discusses algorithmic priority inversion in mission-critical machine inference pipelines used in modern neural-network-based perception subsystems and...

Technical Perspective: What's All the Fuss about Fuzzing?
From Communications of the ACM

Technical Perspective: What's All the Fuss about Fuzzing?

"Boosting Fuzzer Efficiency: An Information Theoretic Perspective," by Marcel Böhme, Valentin J.M. Manès, and Sang Kil Cha, presents a novel twist to fuzzing that...

Boosting Fuzzer Efficiency: An Information Theoretic Perspective
From Communications of the ACM

Boosting Fuzzer Efficiency: An Information Theoretic Perspective

In this paper, we take the fundamental perspective of fuzzing as a learning process.

Technical Perspective: A Rare Glimpse of Tracking Fake Reviews
From Communications of the ACM

Technical Perspective: A Rare Glimpse of Tracking Fake Reviews

"Leveraging Social Media to Buy Fake Reviews," by Sherry He et al., represents a breakthrough in our empirical understanding of fake reviews on Amazon.

Leveraging Social Media to Buy Fake Reviews
From Communications of the ACM

Leveraging Social Media to Buy Fake Reviews

We study the market for fake product reviews on Amazon.com.

Technical Perspective: Can We Uncover Private Backbone Infrastructures?
From Communications of the ACM

Technical Perspective: Can We Uncover Private Backbone Infrastructures?

In "A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers," Salamatian et al. assemble techniques from the two broad strategies developed...

A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers
From Communications of the ACM

A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers

We present a new empirical approach for elucidating connectivity in privately owned and operated backbone networks.

Technical Perspective: Pandemics, Remote Work, and Accessibility
From Communications of the ACM

Technical Perspective: Pandemics, Remote Work, and Accessibility

"Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship," by Kelly Mack et al., provides guidance on how to make remote...

Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship
From Communications of the ACM

Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship

Interns, full-time members, and affiliates of a Microsoft Research team focused on accessibility report on the experiences of virtual interns in 2020 navigating...

Technical Perspective: What Does Provable Security Mean for Cryptographic Schemes?
From Communications of the ACM

Technical Perspective: What Does Provable Security Mean for Cryptographic Schemes?

For a given cryptographic scheme, as perfect security is almost never achievable, one requires a computational assumption. Computational assumptions are some well...

On the (In)Security of ElGamal in OpenPGP
From Communications of the ACM

On the (In)Security of ElGamal in OpenPGP

We reveal that in the interoperable world of OpenPGP, unforeseen cross-configuration attacks become possible.

Technical Perspective: On Abstractions and Embedded Networks
From Communications of the ACM

Technical Perspective: On Abstractions and Embedded Networks

"Symbol-Synchronous Buses," by Jonathan Oostvogels et al., conceives a notion of a symbol-synchronous bus, which effectively makes a multi-hop wireless network...

Symbol-Synchronous Buses: Deterministic, Low-Latency Wireless Mesh Networking with LEDs
From Communications of the ACM

Symbol-Synchronous Buses: Deterministic, Low-Latency Wireless Mesh Networking with LEDs

We describe a novel networking paradigm that aims to enable a new class of latency-sensitive applications by systematically breaking networking abstractions.

Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning
From Communications of the ACM

Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning

"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al., addresses the challenge of processing an intractably large set of trained models...

Proving Data-Poisoning Robustness in Decision Trees
From Communications of the ACM

Proving Data-Poisoning Robustness in Decision Trees

We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for...

Technical Perspective: The Impact of Auditing for Algorithmic Bias
From Communications of the ACM

Technical Perspective: The Impact of Auditing for Algorithmic Bias

"Actionable Auditing Revisited," by Inioluwa Deborah Raji and Joy Buolamwini, examines how companies producing commercial facial classification software responded...

Actionable Auditing Revisited
From Communications of the ACM

Actionable Auditing Revisited: Investigating the Impact of Publicly Naming Biased Performance Results of Commercial AI Products

This paper investigates the commercial impact of Gender Shades, the first algorithmic audit of gender- and skin-type performance disparities in commercial facial...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account