


default search action
IEEE Security & Privacy, Volume 21
Volume 21, Number 1, January - February 2023
- Terry Benzel

:
Security and Privacy Research Artifacts: Are We Making Progress? 4-6 - Mary Ellen Zurko, Julie M. Haney

:
Usable Security and Privacy for Security and Privacy Workers. 8-10 - Bob Blakley, Lorrie Cranor:

Katie Moussouris: Vulnerability Disclosure and Security Workforce Development. 11-18 - Peter Leo Gorski

, Luigi Lo Iacono
, Matthew Smith:
Eight Lightweight Usable Security Principles for Developers. 20-26 - Charles Weir

, Anna Dyson
, Daniel Prince
:
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices. 27-36 - Mohamad Fazelnia

, Ahmet Okutan
, Mehdi Mirakhorli
:
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework. 37-48 - Mohammad Tahaei

, Kami Vaniea
, Awais Rashid
:
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions. 49-57 - Nathan Malkin

:
Contextual Integrity, Explained: A More Usable Privacy Definition. 58-65 - Francesco Ciclosi

, Fabio Massacci
:
The Data Protection Officer: A Ubiquitous Role That No One Really Knows. 66-77 - Adam Shostack:

Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption. 78-83 - Sungmi Park

, Douglas Stebila:
The Future of Digital Investigation: Automated Legal Inference. 84-90 - Elisa Bertino

:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. 91-92
Volume 21, Number 2, March - April 2023
- Sean Peisert

:
The First 20 Years of IEEE Security & Privacy. 4-6 - Tadayoshi Kohno

:
{In Earth} Until (Ready). 7-8 - Bob Blakley, Lorrie Cranor:

A 20th Anniversary Episode Chat With S&P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert. 9-16 - Crispin Cowan

:
Open and Closed Software Security Redux. 18-23 - Steve Lipner

, Michael Howard:
Inside the Windows Security Push: A Twenty-Year Retrospective. 24-31 - Carl E. Landwehr

, Michael K. Reiter
, Laurie A. Williams
, Gene Tsudik
, Trent Jaeger
, Tadayoshi Kohno
, Apu Kapadia
:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. 32-42 - Terry Benzel

, Hilarie Orman
:
IEEE Security and Privacy Symposium in the Year 2003. 43-47 - Elissa M. Redmiles

, Mia M. Bennett, Tadayoshi Kohno
:
Power in Computer Security and Privacy: A Critical Lens. 48-52 - Lorenzo Cavallaro

, Johannes Kinder
, Feargus Pendlebury
, Fabio Pierazzi
:
Are Machine Learning Models for Malware Detection Ready for Prime Time? 53-56 - Christopher A. Wood

:
Hot Topics in Security and Privacy Standardization at the IETF and Beyond. 57-62 - John True

, Navid Asadizanjani:
Physical Inspection and Attacks on Electronics: An Academic Course for the Hardware Cybersecurity Workforce. 63-69 - Paul C. van Oorschot

:
Memory Errors and Memory Safety: C as a Case Study. 70-76 - Arvind Narayanan

, Kevin Lee
:
Security Policy Audits: Why and How. 77-81 - Nusrat Zahan

, Elizabeth Lin
, Mahzabin Tamanna, William Enck
, Laurie A. Williams
:
Software Bills of Materials Are Required. Are We There Yet? 82-88 - Daniel E. Geer

:
Whither Software? 89-90
Volume 21, Number 3, May - June 2023
- Trent Jaeger

:
On Bridges and Software. 4-5 - Trent Jaeger

, Brent ByungHoon Kang
, Nele Mentens
, Cynthia Sturton
:
Impact of Emerging Hardware on Security and Privacy. 6-7 - Soyeon Park

, Sangho Lee
, Taesoo Kim
:
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions. 8-15 - Vikram Narayanan

, Anton Burtsev
:
The Opportunities and Limitations of Extended Page Table Switching for Fine-Grained Isolation. 16-26 - Andres Meza

, Francesco Restuccia
, Jason Oberg
, Dominic Rizzo
, Ryan Kastner
:
Security Verification of the OpenTitan Hardware Root of Trust. 27-36 - Marc Lacoste

, Vincent Lefebvre
:
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats. 37-46 - Adam Brian Turner

, Stephen McCombie
, Allon J. Uhlmann
:
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression. 47-57 - Kacper T. Gradon

:
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT. 58-61 - Paul C. van Oorschot

:
Memory Errors and Memory Safety: A Look at Java and Rust. 62-68
Volume 21, Number 4, July - August 2023
- Sean Peisert

:
On Software Infrastructure: Develop, Prove, Profit? 4-8 - Gabriela F. Ciocarlie

, Jianying Zhou
:
Securing Critical Infrastructure Across Cyber and Physical Dimensions. 9 - Adeen Ayub

, Wooyeon Jo
, Syed Ali Qasim
, Irfan Ahmed
:
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers. 10-19 - Luis Burbano

, Kunal Garg
, Santiago J. Leudo
, Alvaro A. Cárdenas
, Ricardo G. Sanfelice
:
Online Attack Recovery in Cyberphysical Systems. 20-28 - Rodrigo Roman, Cristina Alcaraz

, Javier López, Kouichi Sakurai
:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. 29-38 - Constantine Doumanidis

, Yongyu Xie
, Prashant Hari Narayan Rajput
, Ryan Pickren
, Burak Sahin
, Saman A. Zonouz
, Michail Maniatakos
:
Dissecting the Industrial Control Systems Software Supply Chain. 39-50 - Aditya P. Mathur

:
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure. 51-60 - Martin Strohmeier

, Mauro Leonardi
, Sergei Markochev, Fabio Ricciato
, Matthias Schäfer, Vincent Lenders
:
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach. 61-73 - Khaled Sarieddine

, Mohammad Ali Sayed
, Danial Jafarigiv
, Ribal Atallah, Mourad Debbabi
, Chadi Assi
:
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security. 74-83 - David M. Nicol

, Gregory Shannon
, Monika Akbar
, Matt Bishop
, Michael M. Chaney, Matthew E. Luallen:
Toward Common Weakness Enumerations in Industrial Control Systems. 84-93 - Nigel P. Smart

:
Computing on Encrypted Data. 94-98 - Steven M. Bellovin

:
Is Cybersecurity Liability a Liability? 99-100
Volume 21, Number 5, September - October 2023
- Tadayoshi Kohno

:
In Your Eyes. 4-5 - Jingwei Wu, Wanxi Mao, Yuxin Deng, Jinghong Xu

:
Child Safety and Data Privacy in Smart Homes With Speakers: Comparison of Privacy Policies in the United States and China. 6-17 - Abdul Majeed

, Seong Oun Hwang
:
Rectification of Syntactic and Semantic Privacy Mechanisms. 18-32 - Priyanka Nanayakkara

, Jessica Hullman
:
What's Driving Conflicts Around Differential Privacy for the U.S. Census. 33-42 - Sebastian Obermeier

, Thomas Jösler
, Stephan Renggli
, Maurus Unternährer
, Bernhard M. Hämmerli
:
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures. 43-54 - Eric Ruzomberka

, David J. Love
, Christopher G. Brinton
, Arpit Gupta, Chih-Chun Wang
, H. Vincent Poor
:
Challenges and Opportunities for Beyond-5G Wireless Security. 55-66 - Padmanabhan Krishnan

, Cristina Cifuentes, Li Li
, Tegawendé F. Bissyandé
, Jacques Klein
:
Why Is Static Application Security Testing Hard to Learn? 68-72 - Daniel Arp

, Erwin Quiring
, Feargus Pendlebury
, Alexander Warnecke
, Fabio Pierazzi
, Christian Wressnegger
, Lorenzo Cavallaro
, Konrad Rieck
:
Lessons Learned on Machine Learning for Computer Security. 72-77 - Frank Piessens

:
Transient Execution Attacks. 79-84 - Konstantinos Adamos

, Fabio Di Franco
, Athanasios Vasileios Grammatopoulos
:
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD. 85-94 - Daniel E. Geer

:
Convergence: Ongoing. 95-96
Volume 21, Number 6, November - December 2023
- Mary Ellen Zurko:

Unusable Security for Attackers [From the Editors]. 4-7 - Fabio Massacci

, Laurie A. Williams:
Software Supply Chain Security [Guest Editors' Introduction]. 8-10 - Musard Balliu

, Benoit Baudry
, Sofia Bobadilla
, Mathias Ekstedt
, Martin Monperrus
, Javier Ron Arteaga
, Aman Sharma
, Gabriel Skoglund
, César Soto-Valero
, Martin Wittlinger
:
Challenges of Producing Software Bill of Materials for Java. 12-23 - Ákos Milánkovich

, Katja Tuma
:
Delta Security Certification for Software Supply Chains. 24-33 - Piergiorgio Ladisa

, Serena Elisa Ponta
, Antonino Sabetta
, Matias Martinez
, Olivier Barais
:
Journey to the Center of Software Supply Chain Attacks. 34-49 - Santiago Torres-Arias

, Daniel E. Geer
, John Speed Meyers
:
A Viewpoint on Knowing Software: Bill of Materials Quality When You See It. 50-54 - Marcela S. Melara

, Santiago Torres-Arias
:
A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation? 55-58 - Marcel Fourné

, Dominik Wermke
, Sascha Fahl
, Yasemin Acar
:
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. 59-63 - Matthias Eckhart

, Andreas Ekelhart
, David Allison
, Magnus Almgren
, Katharina Ceesay-Seitz
, Helge Janicke
, Simin Nadjm-Tehrani
, Awais Rashid
, Mark Yampolskiy
:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. 64-75 - Nusrat Zahan

, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan
, Laurie A. Williams
:
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics. 76-88 - Florian Kerschbaum

, Nils Lukas
:
Privacy-Preserving Machine Learning [Cryptography]. 90-94 - Bruce Schneier:

Trustworthy AI Means Public AI [Last Word]. 95-96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














