


default search action
IEEE Security & Privacy, Volume 18
Volume 18, Number 1, January - February 2020
- David M. Nicol
:
The Value of Useless Academic Research to the Cyberdefense of Critical Infrastructures. 4-7 - Kate Charlet, Heather King:
The Future of Cybersecurity Policy. 8-10 - Andrew J. Grotto
:
Deconstructing Cyber Attribution: A Proposed Framework and Lexicon. 12-20 - Daniel W. Woods
, Tyler Moore
:
Does Insurance Have a Future in Governing Cybersecurity? 21-27 - José Luis Hernández Ramos
, Dimitris Geneiatakis, Ioannis Kounelis, Gary Steri
, Igor Nai Fovino:
Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies. 28-38 - Michael Klipstein
, Austin Minter, Jeremiah Pittman:
Understanding the Information Environment to Win the Next Conflict Without Firing a Shot. 39-45 - Pierantonia Sterlini
, Fabio Massacci
, Natalia Kadenko
, Tobias Fiebig
, Michel van Eeten
:
Governance Challenges for European Cybersecurity Policies: Stakeholder Views. 46-54 - Barry M. Horowitz
:
Cyberattack-Resilient Cyberphysical Systems. 55-60 - William Stallings
:
Handling of Personal Information and Deidentified, Aggregated, and Pseudonymized Information Under the California Consumer Privacy Act. 61-64 - James P. Howard II
, Maria E. Vachino:
Blockchain Compliance With Federal Cryptographic Information-Processing Standards. 65-70 - Bruce Schneier:
Technologists vs. Policy Makers. 72-71
Volume 18, Number 2, March - April 2020
- Paul C. van Oorschot
:
Untangling Security and Privacy. 4-6 - Fariborz Farahmand
:
Quantitative Issues in Cyberinsurance: Lessons From Behavioral Economics, Counterfactuals, and Causal Inference. 8-15 - Domhnall Carlin
, Jonah Burgess
, Philip O'Kane
, Sakir Sezer:
You Could Be Mine(d): The Rise of Cryptojacking. 16-22 - Luca Allodi
, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone
:
The Need for New Antiphishing Measures Against Spear-Phishing Attacks. 23-34 - Boubakr Nour
, Kashif Sharif
, Fan Li
, Yu Wang
:
Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks. 35-45 - Markus Jakobsson
:
Permissions and Privacy. 46-55 - Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Execution Environments: Properties, Applications, and Challenges. 56-60 - Thomas R. Souvignet
, Thibaut Heckmann, Timothy Bollé
:
From Lucky Luke to Lock Bits. 61-66 - Denny Pencheva, Joseph Hallett
, Awais Rashid
:
Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education. 68-74 - Steven M. Bellovin:
Policies on Privacy. 76
Volume 18, Number 3, May - June 2020
- David M. Nicol
:
In the Petri Dish: Cybersecurity Pushed to the Edge. 4-5 - Terry Benzel
, Frank Stajano:
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps. 6-7 - Stefano Calzavara
, Mauro Conti
, Riccardo Focardi
, Alvise Rabitti, Gabriele Tolomei
:
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery. 8-16 - Fan Zhang
, Warren He, Raymond Cheng, Jernej Kos, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. 17-27 - Guoxing Chen
, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. 28-37 - Yuan Tian
, Cormac Herley
, Stuart E. Schechter:
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing. 38-47 - Erik van der Kouwe
, Gernot Heiser
, Dennis Andriesse, Herbert Bos
, Cristiano Giuffrida
:
Benchmarking Flaws Undermine Security Research. 48-57 - Kavita M. Berger
:
Addressing Cyber Threats in Biology. 58-61 - Alexander Kott, Paul Théron:
Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber Resilience. 62-66 - Elisa Bertino:
The Quest for Data Transparency. 67-68
Volume 18, Number 4, July - August 2020
- Sean Peisert
:
Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19. 4-7 - Hamed Okhravi
, Nathan Burow, Richard Skowyra, Bryan C. Ward, Samuel Jero, Roger Khazan, Howard E. Shrobe:
One Giant Leap for Computer Security. 8-19 - Marietheres Dietz
, Günther Pernul:
Unleashing the Digital Twin's Potential for ICS Security. 20-27 - L. Jean Camp, Ryan Henry
, Tadayoshi Kohno
, Shrirang Mare
, Steven A. Myers, Shwetak N. Patel
, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. 28-37 - Behnood Momenzadeh
, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp:
Best Practices Would Make Things Better in the IoT. 38-47 - Inger Anne Tøndel
, Martin Gilje Jaatun, Daniela Soares Cruzes:
IT Security Is From Mars, Software Security Is From Venus. 48-54 - Khaled El Emam
:
Seven Ways to Evaluate the Utility of Synthetic Data. 56-59 - Dan Shoemaker, Nancy R. Mead
, Anne Kohnke:
Teaching Secure Acquisition in Higher Education. 60-66 - Eric Osterweil
:
A Cybersecurity Terminarch: Use It Before We Lose It. 67-70 - Holger Mack
, Tom Schroer:
Security Midlife Crisis: Building Security in a New World. 72-74 - Daniel E. Geer Jr.:
Security Theater, the Beat Goes On. 75-76
Volume 18, Number 5, September - October 2020
- Paul C. van Oorschot
:
Blockchains and Stealth Tactics for Teaching Security. 3-5 - Mohammad Mannan, N. Asokan
:
Confronting the Limitations of Hardware-Assisted Security. 6-7 - Lianying Zhao
, David Lie:
Is Hardware More Secure Than Software? 8-17 - Michael Schwarz, Daniel Gruss
:
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks. 18-27 - Kit Murdock
, David F. Oswald
, Flavio D. Garcia, Jo Van Bulck
, Frank Piessens
, Daniel Gruss
:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. 28-37 - Kari Kostiainen
, Aritra Dhar
, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. 38-46 - David Kohlbrenner, Shweta Shinde
, Dayeol Lee, Krste Asanovic, Dawn Song:
Building Open Trusted Execution Environments. 47-56 - Ghada Dessouky
, Tommaso Frassetto, Patrick Jauernig
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security. 57-66 - Randy Borum
, Ron Sanders:
Preparing America's Cyber Intelligence Workforce. 67-73 - Kenneth G. Crowther
, Brian Rust:
Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company. 74-79 - Bruce Schneier:
Hacking the Tax Code. 79-80
Volume 18, Number 6, November - December 2020
- Phyllis A. Schneck:
Cybersecurity During COVID-19. 4-5 - Feng Hao
, Shen Wang, Samiran Bag
, Rob Procter, Siamak F. Shahandashti
, Maryam Mehrnezhad, Ehsan Toreini
, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. 6-13 - Chuadhry Mujeeb Ahmed
, Jianying Zhou
:
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective. 14-22 - Rafael Padilha, Caroline Mazini Rodrigues
, Fernanda A. Andaló
, Gabriel Bertocco, Zanoni Dias
, Anderson Rocha
:
Forensic Event Analysis: From Seemingly Unrelated Data to Understanding. 23-32 - Roy A. Maxion
:
Reproducibility: Buy Low, Sell High. 33-41 - Qiu-Hong Wang
, Steven M. Miller
, Robert H. Deng
:
Driving Cybersecurity Policy Insights From Information on the Internet. 42-50 - Rock Stevens
, Josiah Dykstra, Wendy Knox Everette, Michelle L. Mazurek:
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs. 51-58 - Julianna Rodríguez
, Benjamin J. Allison, Christopher Apsey, Todd Boudreau:
Courseware as Code: Instituting Agile Courseware Collaboration. 59-62 - Steven M. Bellovin:
Security, Privacy, and Scale. 63-64

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.