March 2025 – Communications of the ACM

-
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
An investigation of vulnerabilities within the TCP/IP protocol suite that can be exploited by forged ICMP errors.
-
New Spectral Algorithms for Refuting Smoothed k-SAT
Our methods yield new algorithms for smoothed k-SAT instances with guarantees that match those for the significantly simpler and well-studied model of random formulas.
-
Technical Perspective: The Surprising Power of Spectral Refutation
Could an algorithm that seems unrelated to SAT serve as a reliable refutation heuristic? Perhaps surprisingly, the answer is yes.
-
Artificial Intelligence as Catalyst for Biodiversity Understanding
AI should be a bridge rather than a barrier to the biological sciences' pursuit of understanding and preserving the natural world.
-
Putting the Smarts into Robot Bodies
Delving into the key tradeoffs of building foundation models for embodied AI systems.