


default search action
IEEE Security & Privacy, Volume 23
Volume 23, Number 1, January - February 2025
- Fabio Massacci
:
Exploding Pagers and the Birth of State Cyberterrorism. 4-6 - David D. Clark
, Simson L. Garfinkel
, kc claffy
:
Differential Privacy, Firm-Level Data, and the Binomial Pathology. 8-16 - Giuseppe Cascavilla
:
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement. 17-26 - Rachel McAmis
, F. Betül Durak
, Melissa Erin Chase
, Kim Laine
, Franziska Roesner
, Tadayoshi Kohno
:
Handling Identity and Fraud in the Metaverse. 27-37 - Sean Oesch
, Phillipe Austria
, Amul Chaulagain
, Brian Weber
, Cory L. Watson
, Matthew Dixson
, Amir Sadovnik
:
The Path to Autonomous Cyberdefense. 38-46 - Dominik Schneider
, Jannik Zeitschner
, Michael Kloos
, Kerstin Lemke-Rust
, Luigi Lo Iacono
:
Developers: Beware of Timing Side-Channels. 47-52 - Pranet Sharma
, Zhenpeng Shi
, Sevval Simsek
, David Starobinski
, David Sastre Medina:
Understanding Similarities and Differences Between Software Composition Analysis Tools. 53-63 - Mustafa Abdallah
, Saurabh Bagchi
, Shaunak D. Bopardikar
, Kevin Chan
, Xing Gao
, Murat Kantarcioglu
, Congmiao Li
, Peng Liu
, Quanyan Zhu
:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. 64-74 - Tamara Lopez
:
Securing Code: A View on the Cultural Aspects of Resilience. 76-78 - Alice Hutchings
:
Police Behaving Badly. 80-82 - Cristina Alcaraz
, Javier López
:
Digital Twin Security: A Perspective on Efforts From Standardization Bodies. 83-90 - Roberto Baldoni
, Giuseppe Antonio Di Luna:
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities. 91-96 - Daniel E. Geer
:
Data. 98-100
Volume 23, Number 2, March - April 2025
- Mary Ellen Zurko
:
Cyber Hard Problems: The Next Generation [From the Editors]. 4-9 - Tamara Lopez
, Bashar Nuseibeh
, Eric Bodden
:
Security Requirements and Secure Software Design. 10-12 - Taylor R. Schorlemmer
, Ethan H. Burmane
, Kelechi G. Kalu
, Santiago Torres-Arias
, James C. Davis
:
Establishing Provenance Before Coding: Traditional and Next-Generation Software Signing. 14-22 - Pavel Chuprikov
, Patrick Eugster
, Shamiek Mangipudi
:
Security Policy as Code. 23-31 - Avi Shaked
, Tom Melham
:
Contextualizing Formal Verification for Systems Security Engineering. 32-41 - Manuel Maarek
, Daisy Abbott
, Olga Chatzifoti
, Ryan Shah
, Sheung Chi Chan
, Hans-Wolfgang Loidl
, Robert J. Stewart
, Jamie Iona Ferguson
, Sandy Louchart
, Shenando Stals
, Lynne Baillie
:
Empower New Code Citizens to Reflect and Communicate on Code Security. 42-51 - Harun Oz
, Daniele Cono D'Elia
, Güliz Seray Tuncay
, Abbas Acar
, Riccardo Lazzeretti
, Arif Selcuk Uluagac
:
With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces. 52-60 - Shunsuke Sato
, Ryoichi Shinkuma
, Kensei Hirai
, Masataka Nakahara
, Norihiro Okui
, Ayumu Kubota
, Yasuaki Kobayashi
, Keizo Sugiyama
, Takayuki Nishio
:
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack. 61-70 - Corey M. Hartman
, Bhaskar Prasad Rimal
, Daniel Conte de Leon
, Nirmal Budhathoki
:
Cross-Architecture Binary Function Fingerprinting. 71-80 - Liliana Pasquale
, Antonino Sabetta
, Marcelo d'Amorim
, Péter Hegedüs, Mehdi Tarrit Mirakhorli, Hamed Okhravi
, Mathias Payer, Awais Rashid, Joanna C. S. Santos, Jonathan M. Spring, Lin Tan, Katja Tuma
:
Challenges to Using Large Language Models in Code Generation and Repair. 81-88 - Abdul Majeed
, Seong Oun Hwang
:
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks. 89-94 - Jessica McClearn
, Reem Talhouk
, Rikke Bjerg Jensen
:
The Everyday Security of Living With Conflict. 95-100 - Hamed Okhravi
, Nathan Burow, Fred B. Schneider
:
Software Bill of Materials as a Proactive Defense. 101-106 - Jonathan M. Spring
:
Secure by Design for Everyone. 107-108
Volume 23, Number 3, May - June 2025
- Sean Peisert
:
Software Development and the Near-Ubiquitous Acceptance of Mystery Meat. 4-6 - Awais Rashid:
Cybercrime and Online Harms. 7-8 - Arjun Arunasalam, Z. Berkay Celik
:
Characterizing E-Commerce Harm by Investigating Online Communities: A Case Study With Abusive Dropshipping. 10-19 - Alyssa Chan
, Joseph Hallett
, Matthew Edwards
:
Why Is Johnny Getting Groomed in Roblox? 20-30 - Alina D. Machande
, Laura G. E. Smith
, Adam N. Joinson
:
Trajectories of Piracy and Cyberbullying Across Adolescence. 31-39 - Zubair A. Baig
, Sri Harsha Mekala
, Adnan Anwar, Naeem Syed
, Sherali Zeadally:
Digital Forensics and Jurisdictional Challenges for the Industrial Internet of Things. 40-50 - Awais Rashid, Corinne May-Chahal, Claudia Peersman:
Weakening End-to-End Encryption Considered Harmful. 51-54 - Jacopo Franceschini, Ayhan Gücüyener Evren
, Salih Biçakci:
Fault Lines and Bytes: Cybersecurity Challenges Amid Türkiye's February 2023 Earthquakes. 55-63 - Sophie Hawkes
, Christian Weinert, Teresa Almeida
, Maryam Mehrnezhad
:
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools. 64-73 - Hamid Bostani, Veelasha Moonsamy:
Beyond Learning Algorithms: The Crucial Role of Data in Robust Malware Detection. 74-78 - Marcel Böhme
:
How to Solve Cybersecurity Once and For All. 79-82 - Roberto Baldoni
:
The Artificial Intelligence Paradox: Among Global Power, Errors, and Regulatory Shifts. 83-90 - Kevin R. B. Butler, Kurt Hugenberg
, Eakta Jain
, Apu Kapadia
, Tadayoshi Kohno
, Elissa M. Redmiles
, Franziska Roesner, Mattea Sim
, Patrick Traynor, Hanna Barakat
:
Extending the Heilmeier Catechism to Evaluate Security and Privacy Systems: Who is Left Out? 91-95 - Bruce Schneier
:
The Age of Integrity. 96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.