


default search action
IEEE Security & Privacy, Volume 19
Volume 19, Number 1, January - February 2021
- Sean Peisert

:
Reflections on the Past, Perspectives on the Future [From the Editors]. 4-7 - Sabah Mohammed, Tai-Hoon Kim, Wai-Chi Fang:

Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction]. 8-10 - David M. Nicol:

Message from IEEE S&P's Outgoing Editor in Chief. 10 - José Luis Hernández-Ramos

, Juan A. Martínez, Vincenzo Savarino, Marco Angelini
, Vincenzo Napolitano, Antonio F. Skarmeta
, Gianmarco Baldini
:
Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions. 12-23 - Binod Vaidya

, Hussein T. Mouftah:
Security for Shared Electric and Automated Mobility Services in Smart Cities. 24-33 - Lelio Campanile

, Mauro Iacono
, Alexander H. Levis, Fiammetta Marulli, Michele Mastroianni
:
Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work. 34-43 - Guy Amit

, Asaf Shabtai
, Yuval Elovici
:
A Self-Healing Mechanism for Internet of Things Devices. 44-53 - Fabio Massacci

, Chan Nam Ngo
:
Distributed Financial Exchanges: Security Challenges and Design Principles. 54-64 - Raz Ben-Netanel, Ben Nassi

, Adi Shamir
, Yuval Elovici
:
Detecting Spying Drones. 65-73 - David Mussington

:
Calculating Risks: Understanding the 2020 Election Experience and Defining the "New Normal". 74-80 - Nicola Dragoni

, Alberto Lluch-Lafuente
, Fabio Massacci
, Anders Schlichtkrull
:
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]. 81-88 - Mahmoud Said Elsayed

, Nhien-An Le-Khac
, Anca Delia Jurcut
:
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]. 90-94 - Daniel Genkin, Yuval Yarom:

Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. 95-98 - José Luis Hernández-Ramos

, Sara Nieves Matheu-García
, Antonio F. Skarmeta
:
The Challenges of Software Cybersecurity Certification [Building Security In]. 99-102 - Elisa Bertino

:
Attacks on Artificial Intelligence [Last Word]. 103-104
Volume 19, Number 2, March - April 2021
- Paul C. van Oorschot

:
Toward Unseating the Unsafe C Programming Language. 4-6 - Sean Peisert

, Bruce Schneier, Hamed Okhravi
, Fabio Massacci
, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash
, James Bret Michael:
Perspectives on the SolarWinds Incident. 7-13 - Fabio Massacci

, Trent Jaeger, Sean Peisert
:
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? 14-19 - Malhar Jere

, Tyler Farnan, Farinaz Koushanfar
:
A Taxonomy of Attacks on Federated Learning. 20-28 - Amir Herzberg

, Hemi Leibowitz
, Kent E. Seamons
, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. 29-37 - Wajeeha Ahmad

, David D. Clark:
A Systems Approach Toward Addressing Anonymous Abuses: Technical and Policy Considerations. 38-47 - Siam U. Hussain

, M. Sadegh Riazi
, Farinaz Koushanfar
:
The Fusion of Secure Function Evaluation and Logic Synthesis. 48-55 - Karen L. Sanzo

, Jay Paredes Scribner, Hongyi Wu:
Designing a K-16 Cybersecurity Collaborative: CIPHER. 56-59 - Marco Simioni

:
Investigative Techniques for the De-Anonymization of Hidden Services. 60-64 - Samuel T. King, Nolen Scaife, Patrick Traynor, Zain ul Abi Din, Christian Peeters, Hari Venugopalan:

Credit Card Fraud Is a Computer Security Problem. 65-69 - Alfred Menezes

, Douglas Stebila
:
Challenges in Cryptography. 70-73 - Jonathan M. Spring

, Eric Hatleback
, Allen D. Householder, Art Manion, Deana Shick:
Time to Change the CVSS? 74-78 - Daniel E. Geer Jr.:

Auto-Update Considered Harmful. 79-80
Volume 19, Number 3, May - June 2021
- Laurie A. Williams:

The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]. 4-7 - Hamed Okhravi

:
A Cybersecurity Moonshot. 8-16 - Sameed Ali, Prashant Anantharaman, Zephyr Lucas, Sean W. Smith

:
What We Have Here Is Failure to Validate: Summer of LangSec. 17-23 - David M. Nicol

:
The Ransomware Threat to Energy-Delivery Systems. 24-32 - Akond Rahman

, Laurie A. Williams
:
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts. 33-41 - Shuwen Deng

, Wenjie Xiong
, Jakub Szefer
:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. 42-49 - Sangchul Park

, Gina J. Choi, Haksoo Ko:
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea. 51-56 - Fabio Massacci

, Ivan Pashchenko
:
Technical Leverage: Dependencies Are a Mixed Blessing. 58-62 - Bruce Schneier:

What Will It Take? 63-64
Volume 19, Number 4, July - August 2021
- James Bret Michael

:
Security and Privacy for Edge Artificial Intelligence. 4-7 - Josh Benaloh, Kammi Foote, Philip B. Stark, Vanessa Teague, Dan S. Wallach:

VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. 8-18 - Emiliano De Cristofaro

:
A Critical Overview of Privacy in Machine Learning. 19-27 - Amy Dettmer, Hamed Okhravi

, Kevin Perry, Nabil Schear, Richard Shay, Mary Ellen Zurko, Paula J. Donovan:
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies. 28-36 - Wenqiang Ruan

, Mingxin Xu, Haoyang Jia, Zhenhuan Wu, Lushan Song, Weili Han
:
Privacy Compliance: Can Technology Come to the Rescue? 37-43 - Francois Boechat, Gabriel Ribas, Lucas Senos, Miguel Angelo Bicudo

, Mateus Schulz Nogueira
, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché
:
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores. 44-53 - Julie M. Haney

, Wayne G. Lutters, Jody L. Jacobs:
Cybersecurity Advocates: Force Multipliers in Security Behavior Change. 54-59 - Alfred Menezes

, Douglas Stebila
:
End-to-End Security: When Do We Have It? 60-64 - Pollyanna Sanderson

:
Balancing Public Health and Civil Liberties: Privacy Aspects of Contact-Tracing Technologies. 65-69 - Eric Vétillard

:
Security Certification: Is It Box Ticking? 70-74 - Steven M. Bellovin:

The Law and Lawful Hacking. 76
Volume 19, Number 5, September - October 2021
- Terry Benzel

:
Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector? 4-7 - Bob Blakley

, Lorrie Faith Cranor
:
A Discussion of Public Health, Trust, and Privacy With Susan Landau. 9-15 - Yu Tsung Lee

, Haining Chen, Trent Jaeger
:
Demystifying Android's Scoped Storage Defense. 16-25 - Ramona Trestian

, Guodong Xie, Pintu Lohar, Edoardo Celeste
, Malika Bendechache
, Rob Brennan
, Evgeniia Jayasekera, Regina Connolly, Irina Tal:
Privacy in a Time of COVID-19: How Concerned Are You? 26-35 - Florian Skopik

, Markus Wurzenberger
, Max Landauer
:
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection. 36-45 - Francesco Minna

, Agathe Blaise, Filippo Rebecchi, Balakrishnan Chandrasekaran, Fabio Massacci
:
Understanding the Security Implications of Kubernetes Networking. 46-56 - Zheng Yang

, Sridhar Adepu
, Jianying Zhou:
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography. 57-65 - Sauvik Das

, W. Keith Edwards, DeBrae Kennedy-Mayo, Peter Swire
, Yuxi Wu:
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy. 66-70 - Blair Taylor

, Sidd Kaza, Paige A. Zaleppa
:
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula. 72-76 - Katja Tuma

, Mathias Widman:
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain. 78-82 - Paul C. van Oorschot

:
Coevolution of Security's Body of Knowledge and Curricula. 83-89 - Sophie Stalla-Bourdillon

:
A Maturity Spectrum for Data Institutions. 90-94 - Elisa Bertino

:
Zero Trust Architecture: Does It Help? 95-96
Volume 19, Number 6, November - December 2021
- Trent Jaeger:

Toward Fail Safety for Security Decisions. 4-7 - Robert K. Cunningham, Anita D. Carleton, Tom Longstaff, Forrest J. Shull, Deborah A. Frincke:

A Research Road Map for Building Secure and Resilient Software-Intensive Systems. 8-14 - Bob Blakley, Lorrie Faith Cranor:

A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter. 15-22 - Danfeng Daphne Yao, Terry Benzel:

ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions. 23-24 - Dongkwan Kim

, Eunsoo Kim, Mingeun Kim, Yeongjin Jang, Yongdae Kim
:
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds. 26-35 - Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef

:
Parental Controls: Safer Internet Solutions or New Pitfalls? 36-46 - Stephan Wiefling

, Markus Dürmuth
, Luigi Lo Iacono:
Verify It's You: How Users Perceive Risk-Based Authentication. 47-57 - Carter Yagemann

, Simon Pak Ho Chung, Erkam Uzun
, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
Modeling Large-Scale Manipulation in Open Stock Markets. 58-65 - Song Liao

, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Problematic Privacy Policies of Voice Assistant Applications. 66-73 - Assane Gueye, Carlos E. C. Galhardo, Irena Bojanova, Peter Mell:

A Decade of Reoccurring Software Weaknesses. 74-82 - Cong Shi

, Yan Wang
, Yingying (Jennifer) Chen
, Nitesh Saxena:
Authentication of Voice Commands by Leveraging Vibrations in Wearables. 83-92 - David Pujol, Ashwin Machanavajjhala:

Equity and Privacy: More Than Just a Tradeoff. 93-97 - Alfred Menezes, Douglas Stebila

:
The Advanced Encryption Standard: 20 Years Later. 98-102 - Fariborz Farahmand, Jens Grossklags, Jelena Mirkovic, Bill Newhouse:

Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education. 104-110 - Emily Stark, Joe DeBlasio, Devon O'Brien, Davide Balzarotti, William Enck, Samuel King, Angelos Stavrou:

Certificate Transparency in Google Chrome: Past, Present, and Future. 112-118 - Jules Polonetsky, Tim Sparapani, Khaled El Emam:

A Review of the Privacy-Enhancing Technologies Software Market. 119-122 - Daniel E. Geer Jr.:

Convergence. 123-124

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














