


default search action
IEEE Security & Privacy, Volume 23
Volume 23, Number 1, January - February 2025
- Fabio Massacci

:
Exploding Pagers and the Birth of State Cyberterrorism. 4-6 - David D. Clark

, Simson L. Garfinkel
, K. C. Claffy
:
Differential Privacy, Firm-Level Data, and the Binomial Pathology. 8-16 - Giuseppe Cascavilla

:
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement. 17-26 - Rachel McAmis

, F. Betül Durak
, Melissa Erin Chase
, Kim Laine
, Franziska Roesner
, Tadayoshi Kohno
:
Handling Identity and Fraud in the Metaverse. 27-37 - Sean Oesch

, Phillipe Austria
, Amul Chaulagain
, Brian Weber
, Cory L. Watson
, Matthew Dixson
, Amir Sadovnik
:
The Path to Autonomous Cyberdefense. 38-46 - Dominik Schneider

, Jannik Zeitschner
, Michael Kloos
, Kerstin Lemke-Rust
, Luigi Lo Iacono
:
Developers: Beware of Timing Side-Channels. 47-52 - Pranet Sharma

, Zhenpeng Shi
, Sevval Simsek
, David Starobinski
, David Sastre Medina:
Understanding Similarities and Differences Between Software Composition Analysis Tools. 53-63 - Mustafa Abdallah

, Saurabh Bagchi
, Shaunak D. Bopardikar
, Kevin Chan
, Xing Gao
, Murat Kantarcioglu
, Congmiao Li
, Peng Liu
, Quanyan Zhu
:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. 64-74 - Tamara Lopez

:
Securing Code: A View on the Cultural Aspects of Resilience. 76-78 - Alice Hutchings

:
Police Behaving Badly. 80-82 - Cristina Alcaraz

, Javier López
:
Digital Twin Security: A Perspective on Efforts From Standardization Bodies. 83-90 - Roberto Baldoni

, Giuseppe Antonio Di Luna:
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities. 91-96 - Daniel E. Geer

:
Data. 98-100
Volume 23, Number 2, March - April 2025
- Mary Ellen Zurko

:
Cyber Hard Problems: The Next Generation [From the Editors]. 4-9 - Tamara Lopez

, Bashar Nuseibeh
, Eric Bodden
:
Security Requirements and Secure Software Design. 10-12 - Taylor R. Schorlemmer

, Ethan H. Burmane
, Kelechi G. Kalu
, Santiago Torres-Arias
, James C. Davis
:
Establishing Provenance Before Coding: Traditional and Next-Generation Software Signing. 14-22 - Pavel Chuprikov

, Patrick Eugster
, Shamiek Mangipudi
:
Security Policy as Code. 23-31 - Avi Shaked

, Tom Melham
:
Contextualizing Formal Verification for Systems Security Engineering. 32-41 - Manuel Maarek

, Daisy Abbott
, Olga Chatzifoti
, Ryan Shah
, Sheung Chi Chan
, Hans-Wolfgang Loidl
, Robert J. Stewart
, Jamie Iona Ferguson
, Sandy Louchart
, Shenando Stals
, Lynne Baillie
:
Empower New Code Citizens to Reflect and Communicate on Code Security. 42-51 - Harun Oz

, Daniele Cono D'Elia
, Güliz Seray Tuncay
, Abbas Acar
, Riccardo Lazzeretti
, Arif Selcuk Uluagac
:
With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces. 52-60 - Shunsuke Sato

, Ryoichi Shinkuma
, Kensei Hirai
, Masataka Nakahara
, Norihiro Okui
, Ayumu Kubota
, Yasuaki Kobayashi
, Keizo Sugiyama
, Takayuki Nishio
:
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack. 61-70 - Corey M. Hartman

, Bhaskar Prasad Rimal
, Daniel Conte de Leon
, Nirmal Budhathoki
:
Cross-Architecture Binary Function Fingerprinting. 71-80 - Liliana Pasquale

, Antonino Sabetta
, Marcelo d'Amorim
, Péter Hegedüs, Mehdi Tarrit Mirakhorli, Hamed Okhravi
, Mathias Payer, Awais Rashid, Joanna C. S. Santos, Jonathan M. Spring, Lin Tan, Katja Tuma
:
Challenges to Using Large Language Models in Code Generation and Repair. 81-88 - Abdul Majeed

, Seong Oun Hwang
:
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks. 89-94 - Jessica McClearn

, Reem Talhouk
, Rikke Bjerg Jensen
:
The Everyday Security of Living With Conflict. 95-100 - Hamed Okhravi

, Nathan Burow, Fred B. Schneider
:
Software Bill of Materials as a Proactive Defense. 101-106 - Jonathan M. Spring

:
Secure by Design for Everyone. 107-108
Volume 23, Number 3, May - June 2025
- Sean Peisert

:
Software Development and the Near-Ubiquitous Acceptance of Mystery Meat. 4-6 - Awais Rashid

:
Cybercrime and Online Harms. 7-8 - Arjun Arunasalam

, Z. Berkay Celik
:
Characterizing E-Commerce Harm by Investigating Online Communities: A Case Study With Abusive Dropshipping. 10-19 - Alyssa Chan

, Joseph Hallett
, Matthew Edwards
:
Why Is Johnny Getting Groomed in Roblox? 20-30 - Alina D. Machande

, Laura G. E. Smith
, Adam N. Joinson
:
Trajectories of Piracy and Cyberbullying Across Adolescence. 31-39 - Zubair A. Baig

, Sri Harsha Mekala
, Adnan Anwar
, Naeem Syed
, Sherali Zeadally
:
Digital Forensics and Jurisdictional Challenges for the Industrial Internet of Things. 40-50 - Awais Rashid

, Corinne May-Chahal
, Claudia Peersman
:
Weakening End-to-End Encryption Considered Harmful. 51-54 - Jacopo Franceschini

, Ayhan Gücüyener Evren
, Salih Biçakci
:
Fault Lines and Bytes: Cybersecurity Challenges Amid Türkiye's February 2023 Earthquakes. 55-63 - Sophie Hawkes

, Christian Weinert
, Teresa Almeida
, Maryam Mehrnezhad
:
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools. 64-73 - Hamid Bostani

, Veelasha Moonsamy
:
Beyond Learning Algorithms: The Crucial Role of Data in Robust Malware Detection. 74-78 - Marcel Böhme

:
How to Solve Cybersecurity Once and For All. 79-82 - Roberto Baldoni

:
The Artificial Intelligence Paradox: Among Global Power, Errors, and Regulatory Shifts. 83-90 - Kevin R. B. Butler, Kurt Hugenberg

, Eakta Jain
, Apu Kapadia
, Tadayoshi Kohno
, Elissa M. Redmiles
, Franziska Roesner
, Mattea Sim
, Patrick Traynor
, Hanna Barakat
:
Extending the Heilmeier Catechism to Evaluate Security and Privacy Systems: Who is Left Out? 91-95 - Bruce Schneier

:
The Age of Integrity. 96
Volume 23, Number 4, July - August 2025
- Jianying Zhou

:
Maritime Cybersecurity: A Big Change Ahead. 4-7 - Kovila P. L. Coopamootoo

, Elissa M. Redmiles
, Miranda Wei
:
Online Safety Through the Lens of Gender and Sexuality. 8-10 - Lelia Marie Hampton

, Alicia E. Boyd
:
Centering Reproductive Justice in Online Safety Research. 11-14 - Sara M. Abdulla

:
Are Deepfakes "Ab"Normal Enough? On Using Norm Shifts in Gender and Sexuality Safety Measures. 15-20 - Becca Wood

, Kristina Kocsis
, Pam Briggs
:
Exploring Public Attitudes on Technology-Facilitated Intimate Partner Violence. 22-31 - Eduard Fosch-Villaronga

, Mariana de Hoyos
, Sabine K. Witting
:
Swiping Safely in Online Dating Platforms. 32-40 - Nazanin Sabri

, Kristen Vaccaro
, Mai ElSherief
:
The Double Burden of Moderators: Safeguarding Communities While Facing Identity-Based Harassment. 41-47 - Diana Freed

, Reid McIlroy-Young
, Sarah Radway
, Gabriela Becher
, Diane Bernabei
, Christina Lee
, Cynthia Dwork
:
Medical Data for Sale: Accessing Reproductive Health Information via the Data Brokerage Landscape. 48-59 - Isabella Wilkinson, Laura Shipp

:
Queering FemTech: Understanding "Queer Use" in Gendered Technologies. 60-70 - Cassidy Gibson

, Logan Blue
, Patrick Traynor
, Kevin R. B. Butler:
Copycat Crimes: Characterizing Code Reuse in the Mobile Android Stalkerware Ecosystem. 71-79 - Monica T. Whitty

, Garry Young
:
Relational Cybercrimes: A New Way Forward in Classifying Cybercrimes. 80-90 - Hanshen Xiao

, Srinivas Devadas
:
PAC Privacy and Black-Box Privatization. 92-97 - Wongyu Hwangbo

, Jisoo Jang
, Jaeil Lee
, Dongkyoo Shin
:
Improvement of Data Protection Practices During the Cell Phone Activation Process in South Korea. 98-102 - Ruba Abu-Salma

, Pauline Anthonysamy
, Zinaida Benenson
, Benjamin Berens
, Kovila P. L. Coopamootoo
, Andreas Gutmann
, Adam D. G. Jenkins
, Sameer Patil
, Sören Preibusch
, Florian Schaub
, William Seymour
, Jose Such
, Mohammad Tahaei
, Aybars Tuncdogan
, Max Van Kleek
, Daricia Wilkinson
:
Grand Challenges in Human-Centered Privacy. 103-110 - Steven M. Bellovin

:
Trust Binding. 112
Volume 23, Number 5, September - October 2025
- Gabriela F. Cretu-Ciocarlie

:
The Blind Eye on Artificial Intelligence. 4-5 - Stjepan Picek

:
Security and Privacy of Generative AI. 6-7 - Yanyi Wu

:
Employee Privacy Protection in Enterprise Generative Artificial Intelligence Deployment. 8-17 - Martha A. Larson

, Zhuoran Liu
:
Generative AI and the Threat to Thinking. 18-26 - Jason Blocklove

, Hammond Pearce
, Ramesh Karri
:
Lowering the Bar: How Large Language Models Can be Used as a Copilot by Hardware Hackers. 27-37 - Dinil Mon Divakaran

, Sai Teja Peddinti
:
Large Language Models for Cybersecurity: New Opportunities. 38-45 - Rodothea-Myrsini Tsoupidi

, Elena Troubitsyna
, Panos Papadimitratos
:
Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks. 46-55 - Zineb Meriem Ferdjouni

, Boubakr Nour
, Makan Pourzandi
, Mourad Debbabi
:
ThreatScout: Automated Threat Hunting Solution Using Machine Reasoning. 56-67 - Magdalena Glas

, Clara Hilmer
, Günther Pernul
:
Cyber Ranges: Five Use Cases for Improving Cybersecurity Skills Development in Organizations. 69-78 - David Sánchez

, Josep Domingo-Ferrer
, Krishnamurty Muralidhar
:
Anonymization Did Not Fail: Misconceptions and Overstatements on Data Anonymization Failures. 80-84 - Daniel E. Geer

:
Indeterminism. 86-88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














