default search action
IEEE Security & Privacy, Volume 22
Volume 22, Number 1, January - February 2024
- Fabio Massacci:
The Holy Grail of Vulnerability Predictions. 4-6 - Franziska Roesner, Tadayoshi Kohno:
Security and Privacy in the Metaverse. 7-9 - Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. 10-23 - Vivek Nair, Louis B. Rosenberg, James F. O'Brien, Dawn Song:
Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data. 24-32 - Matthew Corbett, Brendan David-John, Jiacheng Shang, Y. Charlie Hu, Bo Ji:
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience. 33-42 - Abraham H. Mhaidli, Shwetha Rajaram, Selin Fidan, Gina Herakovic, Florian Schaub:
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences. 43-52 - Karoline Brehm, Yan Shvartzshnaider:
Understanding Privacy in Virtual Reality Classrooms: A Contextual Integrity Perspective. 53-62 - Joseph O'Hagan, Jan Gugenheimer, Florian Mathis, Jolie Bonner, Richard Jones, Mark McGill:
A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights. 64-68 - Eric Bodden, Jens Pottebaum, Markus Fockel, Iris Gräßler:
Evaluating Security Through Isolation and Defense in Depth. 69-72 - Elissa M. Redmiles:
Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening. 76-75
Volume 22, Number 2, March - April 2024
- Laurie A. Williams:
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough. 4-7 - Samuel Aiello, Bhaskar Prasad Rimal:
Secure Access Service Edge Convergence: Recent Progress and Open Issues. 8-16 - Vaughn Hamilton, Gabriel Kaptchuk, Allison McDonald, Elissa M. Redmiles:
Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda. 17-28 - Gregory Lyon:
Trust in Data Security Protocols and Knowledge of Privacy and Security Technology. 29-37 - Winnie Mbaka, Katja Tuma:
Role of Gender in the Evaluation of Security Decisions. 38-48 - Antonino Sabetta, Serena Elisa Ponta, Rocío Cabrera Lozoya, Michele Bezzi, Tommaso Sacchetti, Matteo Greco, Gergö Balogh, Péter Hegedüs, Rudolf Ferenc, Ranindya Paramitha, Ivan Pashchenko, Aurora Papotti, Ákos Milánkovich, Fabio Massacci:
Known Vulnerabilities of Open Source Projects: Where Are the Fixes? 49-59 - Michele Bezzi:
Large Language Models and Security. 60-68 - Matilda Backendal, Miro Haller, Kenny Paterson:
End-to-End Encrypted Cloud Storage. 69-74 - Frank Piessens, Paul C. van Oorschot:
Side-Channel Attacks: A Short Tour. 75-80 - Alice Hutchings:
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression. 81-84 - Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-Robert Ulbricht, Isabel Wagner, Kim Wuyts, Christian Zimmermann:
Privacy Engineering From Principles to Practice: A Roadmap. 86-92 - Helen Nissenbaum:
AI Safety: A Poisoned Chalice? 94-96
Volume 22, Number 3, May - June 2024
- Nele Mentens:
Hardware Security in the Era of Emerging Device and System Technologies. 4-6 - Daniel Moreira, Sébastien Marcel, Anderson Rocha:
Synthetic Realities and Artificial Intelligence-Generated Contents. 7-10 - Yeali S. Sun, Zhi-Kang Chen, Yi-Ting Huang, Meng Chang Chen:
Unleashing Malware Analysis and Understanding With Generative AI. 12-23 - Javier Pastor-Galindo, Pantaleone Nespoli, José A. Ruipérez-Valiente:
Large-Language-Model-Powered Agent-Based Framework for Misinformation and Disinformation Research: Opportunities and Open Challenges. 24-36 - Diangarti Tariang, Riccardo Corvi, Davide Cozzolino, Giovanni Poggi, Koki Nagano, Luisa Verdoliva:
Synthetic Image Verification in the Era of Generative Artificial Intelligence: What Works and What Isn't There yet. 37-49 - Can Yavuz:
A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle. 50-61 - Emiliano De Cristofaro:
Synthetic Data: Methods, Use Cases, and Risks. 62-67 - Meike Ramon, Matthew J. Vowels, Matthew Groh:
Deepfake Detection in Super-Recognizers and Police Officers. 68-76 - Luca Maiano, Alexandra Benova, Lorenzo Papa, Mara Stockner, Michela Marchetti, Gianmarco Convertino, Giuliana Mazzoni, Irene Amerini:
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images. 77-86 - Steven M. Bellovin:
Degenerative AI? 88
Volume 22, Number 4, July - August 2024
- Jianying Zhou:
The Need of Testbeds for Cyberphysical System Security. 4-6 - Tadayoshi Kohno:
The Task Piper. 7-12 - Hamed Okhravi:
Memory Safety. 13-15 - Dan S. Wallach, Bob Lord:
A Viewpoint: A Memory Safety Manifesto. 18-21 - Per Larsen:
Migrating C to Rust for Memory Safety. 22-29 - Santosh Nagarakatte:
Full Spatial and Temporal Memory Safety for C. 30-39 - Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety. 40-49 - Robert N. M. Watson, David Chisnall, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore, Peter G. Neumann, Alexander Richardson, Peter Sewell, Konrad Witaszczyk, Jonathan Woodruff:
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale. 50-61 - William K. Robertson, Manuel Egele:
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives. 62-65 - André Rösti, Alexios Voulimeneas, Michael Franz:
The Astonishing Evolution of Probabilistic Memory Safety: From Basic Heap-Data Attack Detection Toward Fully Survivable Multivariant Execution. 66-75 - Mohamadreza Rostami, Chen Chen, Rahul Kande, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi:
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety. 76-86 - Tobias Cloosters, Oussama Draissi, Johannes Willbold, Thorsten Holz, Lucas Davi:
Memory Corruption at the Border of Trusted Execution. 87-96 - Hans Liljestrand, Jan-Erik Ekberg:
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts. 97-100 - Daniel Moreira, Sébastien Marcel, Anderson Rocha:
Synthetic Realities and Artificial Intelligence-Generated Contents. 101-102 - Zander W. Blasingame, Chen Liu:
Fast-DiM: Towards Fast Diffusion Morphs. 103-114 - Prakash Laxman Kharvi:
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media. 115-122 - Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko T. Siponen, Pavel Gladyshev:
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates. 124-128 - Roberto Baldoni:
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments? 130-132 - Daniel E. Geer:
What I've Learned. 135-136
Volume 22, Number 5, September - October 2024
- Trent Jaeger:
Has Access Control Become the Weak Link? 4-7 - Apu Kapadia, Yang Wang:
Inclusive Privacy and Security. 10-12 - Partha Das Chowdhury, Karen Renaud:
Advocating a Policy Push Toward Inclusive and Secure "Digital-First" Societies. 23-31 - Kopo M. Ramokapane, Maria Sameen, Zaina Dkaidek:
Inclusive Internet of Things Privacy Labels. 32-39 - Chen Zhong, J. B. (Joo Baek) Kim, Hong Liu:
The Art of Inclusive Gamification in Cybersecurity Training. 40-51 - Jinkyung Katie Park, Mamtaj Akter, Pamela J. Wisniewski, Karla Badillo-Urquiola:
It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience. 52-62 - João Janeiro, Sérgio Alves, Tiago João Guerreiro, Florian Alt, Verena Distler:
Understanding Phishing Experiences of Screen Reader Users. 63-72 - Roberto Natella, Pietro Liguori, Cristina Improta, Bojan Cukic, Domenico Cotroneo:
AI Code Generators for Security: Friend or Foe? 73-81 - Liliana Pasquale, Kushal Ramkumar, Wanling Cai, John McCarthy, Gavin Doherty, Bashar Nuseibeh:
The Rocky Road to Sustainable Security. 82-86 - Zaina Dkaidek, Awais Rashid:
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study. 88-95 - Kenneth G. Crowther:
Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things. 96-102
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.