default search action
IEEE Security & Privacy, Volume 20
Volume 20, Number 1, January - February 2022
- Sean Peisert:
Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation. 4-9 - Luca Caviglione, Steffen Wendzel, Simon Vrhovec, Aleksandra Mileva:
Security and Privacy Issues of Home Globalization. 10-11 - Yashothara Shanmugarasa, Hye-young Paik, Salil S. Kanhere, Liming Zhu:
Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores. 12-22 - Ruben Rios, Jose Antonio Onieva, Rodrigo Roman, Javier López:
Personal IoT Privacy Control at the Edge. 23-32 - Luca Ardito, Luca Barbato, Paolo Mori, Andrea Saracino:
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project. 33-44 - Daniele Bringhenti, Fulvio Valenza, Cataldo Basile:
Toward Cybersecurity Personalization in Smart Homes. 45-53 - Ying Li, Tong Xin, Mikko T. Siponen:
Citizens' Cybersecurity Behavior: Some Major Challenges. 54-61 - Anze Mihelic, Bostjan Zvanut:
(In)secure Smart Device Use Among Senior Citizens. 62-71 - Joseph Bugeja, Andreas Jacobsson, Paul Davidsson:
The Ethical Smart Home: Perspectives and Guidelines. 72-80 - Florian Alt, Stefan Schneegass:
Beyond Passwords - Challenges and Opportunities of Future Authentication. 82-86 - Lata Nautiyal, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor:
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. 87-95 - Veronica Schmitt, Pavel Gladyshev, Joshua James:
Medical Device Forensics. 96-100 - Paul C. van Oorschot:
A View of Security as 20 Subject Areas in Four Themes. 102-108 - Adam Shostack, Fabio Massacci, Eric Bodden, Antonino Sabetta:
25 Years in Application Security: Looking Back, Looking Forward. 109-112 - Adam Kardash, Suzanne Morin, Khaled El Emam:
The Practices and Challenges of Generating Nonidentifiable Data. 113-118 - Bruce Schneier:
Robot Hacking Games. 119-120
Volume 20, Number 2, March - April 2022
- Fabio Massacci:
Pseudo Ground-Truth Generators and Large-Scale Studies. 4-7 - Terry Benzel, Thorsten Holz:
Selected Papers From the 2021 IEEE Symposium on Security and Privacy. 8-9 - Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. 10-21 - Chen Ling, Gianluca Stringhini, Utkucan Balci, Jeremy Blackburn:
A First Look at Zoombombing. 22-30 - Pardis Emami Naeini, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor:
An Informative Security and Privacy "Nutrition" Label for Internet of Things Devices. 31-39 - Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use During the 2018-2019 Sudanese Revolution. 40-48 - Nicolas Huaman, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. 49-60 - Neal Mangaokar, Atul Prakash:
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection. 61-67 - Daniel W. Woods, Rainer Böhme:
Incident Response as a Lawyers' Service. 68-74 - Felix Fischer, Jens Grossklags:
Nudging Software Developers Toward Secure Code. 76-79 - Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, Paul Zimmermann:
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography. 80-86 - Elisa R. Heymann, Barton P. Miller:
Software Security for the People: Free and Open Resources for Software Security Training. 88-95 - William Enck, Laurie A. Williams:
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations. 96-100 - Fabio Massacci, Silvia Vidor:
Building Principles for Lawful Cyber Lethal Autonomous Weapons. 101-106 - Steven M. Bellovin:
Open Source and Trust. 107-108
Volume 20, Number 3, May - June 2022
- Mary Ellen Zurko:
Disinformation and Reflections From Usable Security. 4-7 - Tadayoshi Kohno:
Excerpts From the New Dictionary of Cybersecurity, 2036. 8 - Tadayoshi Kohno:
Mx. President Has a Brain. 9-11 - Bob Blakley, Lorrie Faith Cranor:
High Assurance in the Twenty-First Century With Roger Schell. 12-21 - William Martin, Patrick Lincoln, William L. Scherlis:
Formal Methods at Scale. 22-23 - David A. Basin, Cas Cremers, Jannik Dreier, Ralf Sasse:
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols. 24-32 - Gregory Malecha, Gordon Stewart, Frantisek Farka, Jasper Haag, Yoichi Hirai:
Developing With Formal Methods at BedRock Systems, Inc. 33-42 - Calvin Deutschbein, Andres Meza, Francesco Restuccia, Matthew Gregoire, Ryan Kastner, Cynthia Sturton:
Toward Hardware Security Property Generation at Scale. 43-51 - Darren D. Cofer, Isaac Amundson, Junaid Babar, David S. Hardin, Konrad Slind, Perry Alexander, John Hatcliff, Robby, Gerwin Klein, Corey Lewis, Eric Mercer, John Shackleton:
Cyberassured Systems Engineering at Scale. 52-64 - Mike Dodds:
Formally Verifying Industry Cryptography. 65-70 - Simone Raponi, Savio Sciancalepore, Gabriele Oligeri, Roberto Di Pietro:
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures. 71-79 - Florian Skopik, Max Landauer, Markus Wurzenberger:
Online Log Data Analysis With Efficient Machine Learning: A Review. 80-90 - Pietro Tedeschi, Kang Eun Jeon, James She, Simon Wong, Spiridon Bakiras, Roberto Di Pietro:
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons. 91-100 - Josiah Dykstra, Jamie Met, Nicole Backert, Rebecca Mattie, Douglas Hough:
Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response: An Argument for More Measured Incident Response. 102-106 - Elisa Bertino:
The Persistent Problem of Software Insecurity. 107-108
Volume 20, Number 4, July - August 2022
- Tadayoshi Kohno, Camille Cobb, Ada Lerner, Michelle Lin, Adam Shostack:
The Buffet Overflow Café. 4-7 - WooChul Shim, Hyejin Shin, Yong Ho Hwang:
On Data Licenses for Open Source Threat Intelligence. 8-22 - Galina S. Rusman, Yulia A. Morozova:
Measures to Ensure Cybersecurity of Industrial Enterprises: A Legal Perspective. 23-28 - Zhenpeng Shi, Kalman Graffi, David Starobinski, Nikolay Matyunin:
Threat Modeling Tools: A Taxonomy. 29-39 - Edy Kristianto, Van-Linh Nguyen, Po-Ching Lin:
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria? 40-50 - Arslan Munir, Erik Blasch, Alexander J. Aved, E. Paul Ratazzi, Joonho Kong:
Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques. 51-60 - Jan Huck, Frank Breitinger:
Wake Up Digital Forensics' Community and Help Combat Ransomware. 61-70 - Daniel E. Geer:
Identity. 71-72
Volume 20, Number 5, September - October 2022
- James Bret Michael:
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence. 4-6 - Laurie A. Williams:
Trusting Trust: Humans in the Software Supply Chain Loop. 7-10 - Nathalie Baracaldo, Alina Oprea:
Machine Learning Security and Privacy. 11-13 - Tadayoshi Kohno:
The Schuhmacher. 14-15 - Fabio Massacci, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E. Geer:
"Free" as in Freedom to Protest? 16-21 - Minsu Cho, Zahra Ghodsi, Brandon Reagen, Siddharth Garg, Chinmay Hegde:
Sphynx: A Deep Neural Network Design for Private Inference. 22-34 - Ehud Aharoni, Nir Drucker, Gilad Ezov, Hayim Shaul, Omri Soceanu:
Complex Encoded Tile Tensors: Accelerating Encrypted Analytics. 35-43 - Martin Strobel, Reza Shokri:
Data Privacy and Trustworthy Machine Learning. 44-49 - Shaofeng Li, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Suguo Du, Haojin Zhu:
Backdoors Against Natural Language Processing: A Review. 50-59 - Tina Marjanov, Ivan Pashchenko, Fabio Massacci:
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn't There Yet. 60-76 - Luca Demetrio, Battista Biggio, Fabio Roli:
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware. 77-85 - Dinil Mon Divakaran, Adam Oest:
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. 86-95 - Ben Hermann:
What Has Artifact Evaluation Ever Done for Us? 96-99 - Luca Caviglione, Wojciech Mazurczyk:
Never Mind the Malware, Here's the Stegomalware. 101-106 - Bruce Schneier:
NIST's Post-Quantum Cryptography Standards Competition. 107-108
Volume 20, Number 6, November - December 2022
- Tadayoshi Kohno:
The Our Reality Privacy Policy. 4-7 - Tadayoshi Kohno:
Welcome to the Latest "Off by One" Column. 5 - Charles Weir, Sammy Migues, Laurie A. Williams:
Exploring the Shift in Security Responsibility. 8-17 - Florian Skopik, Max Landauer, Markus Wurzenberger:
Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey. 18-26 - Charles Gouert, Nektarios Georgios Tsoutsos:
Dirty Metadata: Understanding A Threat to Online Privacy. 27-34 - Dhiah el Diehn I. Abou-Tair, Ala' F. Khalifeh:
Distributed Self-Sovereign-Based Access Control System. 35-42 - Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. 43-52 - Howard D. Grimes, Gabriela F. Ciocarlie, Bo Yu, Duminda Wijesekera, Gregory E. Shannon, Wayne Austad, Charles Fracchia, Dongyan Xu, Thomas R. Kurfess, Lisa Strama, Michael Mylrea, Bill Reid:
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing. 53-65 - Dustin Moody, Angela Robinson:
Cryptographic Standards in the Post-Quantum Era. 66-72 - Paul C. van Oorschot:
Security as an Artificial Science, System Administration, and Tools. 74-78 - Cédric Hébert:
Trust Me, I'm a Liar. 79-82 - Steven M. Bellovin:
What Do We Owe? 83-84
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.