"Indistinguishability Obfuscation from Well-Founded Assumptions," by Aayush Jain et al., gives a new construction of indistinguishability obfuscation that is provably...Daniel Wichs From Communications of the ACM | March 2024
We examine a formalization of the "one-way compiler" concept with the notion of indistinguishability obfuscation.
Aayush Jain, Huijia Lin, Amit Sahai From Communications of the ACM | March 2024
"Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits," by Nutan Limaye et al., achieves a landmark in the larger quest of understanding hardness,...Nitin Saxena From Communications of the ACM | February 2024
This paper discusses algorithmic priority inversion in mission-critical machine inference pipelines used in modern neural-network-based perception subsystems and...Shengzhong Liu, Shuochao Yao, Xinzhe Fu, Rohan Tabish, Simon Yu, Ayoosh Bansal, Heechul Yun, Lui Sha, Tarek Abdelzaher From Communications of the ACM | February 2024
"Boosting Fuzzer Efficiency: An Information Theoretic Perspective," by Marcel Böhme, Valentin J.M. Manès, and Sang Kil Cha, presents a novel twist to fuzzing that...Gordon Fraser From Communications of the ACM | November 2023
In this paper, we take the fundamental perspective of fuzzing as a learning process.
Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha From Communications of the ACM | November 2023
"Leveraging Social Media to Buy Fake Reviews," by Sherry He et al., represents a breakthrough in our empirical understanding of fake reviews on Amazon.
Shreyas Sekar From Communications of the ACM | October 2023
We study the market for fake product reviews on Amazon.com.
Sherry He, Brett Hollenbeck, Davide Proserpio From Communications of the ACM | October 2023
In "A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers," Salamatian et al. assemble techniques from the two broad strategies developed...Sara Alouf From Communications of the ACM | August 2023
We present a new empirical approach for elucidating connectivity in privately owned and operated backbone networks.
Loqman Salamatian, Scott Anderson, Joshua Mathews, Paul Barford, Walter Willinger, Mark Crovella From Communications of the ACM | August 2023
"Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship," by Kelly Mack et al., provides guidance on how to make remote...John Richards From Communications of the ACM | August 2023
Interns, full-time members, and affiliates of a Microsoft Research team focused on accessibility report on the experiences of virtual interns in 2020 navigating...Kelly Mack, Maitraye Das, Dhruv Jain, Danielle Bragg, John Tang, Andrew Begel, Erin Beneteau, Josh Urban Davis, Abraham Glasser, Joon Sung Park, Venkatesh Potluri From Communications of the ACM | August 2023
For a given cryptographic scheme, as perfect security is almost never achievable, one requires a computational assumption. Computational assumptions are some well...David Pointcheval From Communications of the ACM | June 2023
We reveal that in the interoperable world of OpenPGP, unforeseen cross-configuration attacks become possible.
Luca De Feo, Bertram Poettering, Alessandro Sorniotti From Communications of the ACM | June 2023
"Symbol-Synchronous Buses," by Jonathan Oostvogels et al., conceives a notion of a symbol-synchronous bus, which effectively makes a multi-hop wireless network...Luca Mottola From Communications of the ACM | April 2023
We describe a novel networking paradigm that aims to enable a new class of latency-sensitive applications by systematically breaking networking abstractions.
Jonathan Oostvogels, Fan Yang, Sam Michiels, Danny Hughes From Communications of the ACM | April 2023
"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al., addresses the challenge of processing an intractably large set of trained models...Martin Vechev From Communications of the ACM | February 2023
We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for...Samuel Drews, Aws Albarghouthi, Loris D'Antoni From Communications of the ACM | February 2023
"Actionable Auditing Revisited," by Inioluwa Deborah Raji and Joy Buolamwini, examines how companies producing commercial facial classification software responded...Vincent Conitzer, Gillian K. Hadfield, Shannon Vallor From Communications of the ACM | January 2023
This paper investigates the commercial impact of Gender Shades, the first algorithmic audit of gender- and skin-type performance disparities in commercial facial...Inioluwa Deborah Raji, Joy Buolamwini From Communications of the ACM | January 2023