


default search action
IEEE Security & Privacy, Volume 17
Volume 17, Number 1, January - February 2019
- Phyllis A. Schneck:
Cybersecurity Compliance Is Necessary but Not Sufficient: Bad Guys Don't Follow Laws. 4-6 - Wojciech Mazurczyk
, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics, Part 2. 7-8 - Hui Tian
, Yuxiang Chen, Hong Jiang
, Yongfeng Huang
, Fulin Nan, Yonghong Chen:
Public Auditing for Trusted Cloud Storage Services. 10-22 - Apostolos Axenopoulos
, Volker Eiselein, Antonio Penta, Eugenia Koblents, Ernesto La Mattina, Petros Daras
:
A Framework for Large-Scale Analysis of Video "in the Wild" to Assist Digital Forensic Examination. 23-33 - Joseph Ricci, Ibrahim M. Baggili
, Frank Breitinger
:
Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? 34-42 - Rodrigo Carvalho
, Michael Goldsmith, Sadie Creese:
Investigating Malware Campaigns With Semantic Technologies. 43-54 - Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi
:
Behavioral-Anomaly Detection in Forensics Analysis. 55-62 - Davide Maiorca
, Battista Biggio
:
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware. 63-71 - Alan T. Sherman
, Farid Javani, Haibin Zhang, Enis Golaszewski
:
On the Origins and Variations of Blockchain Technologies. 72-77 - Mathias Payer
:
The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes. 78-82 - Bruce Schneier:
Cybersecurity for the Public Interest. 84-83
Volume 17, Number 2, March - April 2019
- Sean Peisert
:
Some Experiences in Developing Security Technology That Actually Get Used. 4-7 - Dimitris M. Kyriazanos
, Konstantinos Giorgos Thanos, Stelios C. A. Thomopoulos
:
Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness. 8-16 - Martin Abrams, John Abrams, Peter Cullen, Lynn Goldstein
:
Artificial Intelligence, Ethics, and Enhanced Data Stewardship. 17-30 - Bita Darvish Rouhani
, Mohammad Samragh, Tara Javidi
, Farinaz Koushanfar
:
Safe Machine Learning and Defeating Adversarial Attacks. 31-38 - Mohammad S. Jalali
, Jessica P. Kaiser, Michael D. Siegel, Stuart E. Madnick:
The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products. 39-48 - Mohammad Al-Rubaie, J. Morris Chang
:
Privacy-Preserving Machine Learning: Threats and Solutions. 49-58 - Graeme Horsman
:
A Call for the Prohibition of Encryption: Panacea or Problem? 59-66 - Yixin Zou
, Florian Schaub:
Beyond Mandatory: Making Data Breach Notifications Useful for Consumers. 67-72 - Vincent Nestler
, Tony Coulson, James D. Ashley III:
The NICE Challenge Project: Providing Workforce Experience Before the Workforce. 73-78 - Daniel E. Geer Jr.:
Unknowable Unknowns. 80-79
Volume 17, Number 3, May - June 2019
- Paul C. van Oorschot
:
Software Security and Systematizing Knowledge. 4-6 - Susanne Barth, Pieter H. Hartel
, Marianne Junger, Lorena Montoya
:
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\". 8-16 - Kalman C. Toth
, Alan Anderson-Priddy:
Self-Sovereign Digital Identity: A Paradigm Shift for Identity. 17-27 - Dirk van der Linden
, Anna Zamansky
, Irit Hadar, Barnaby Craggs
, Awais Rashid
:
Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables. 28-39 - Joshua Siegel
, Sanjay E. Sarma
:
A Cognitive Protection System for the Internet of Things. 40-48 - Joshua Eric Siegel
, Sanjay E. Sarma
:
Using Open Channels to Trigger the Invited, Unintended Consequences of the Internet of Things. 49-55 - Ankush Singla
, Elisa Bertino
:
How Deep Learning Is Making Information Security More Intelligent. 56-65 - Sara Nieves Matheu-García
, José Luis Hernández Ramos
, Antonio F. Skarmeta
:
Toward a Cybersecurity Certification Framework for the Internet of Things. 66-76 - Andelka M. Phillips
:
Buying Your Genetic Self Online: Pitfalls and Potential Reforms in DNA Testing. 77-81 - Alan T. Sherman
, Peter A. H. Peterson, Enis Golaszewski
, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess:
Project-Based Learning Inspires Cybersecurity Students: A Scholarship-for-Service Research Study. 82-88 - Ron Herardian
:
The Soft Underbelly of Cloud Security. 90-93 - Steven M. Bellovin:
Layered Insecurity. 96-95
Volume 17, Number 4, July - August 2019
- William Enck
, Terry Benzel:
Selected Papers From the 2018 USENIX Security Symposium. 7-8 - Nolen Scaife
, Christian Peeters, Patrick Traynor:
More Cowbell: Lessons Learned in Developing the Skim Reaper. 10-17 - Deepak Kumar
, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates
, Michael D. Bailey:
Emerging Threats in Internet of Things Voice Services. 18-24 - Gertjan Franken
, Tom van Goethem, Wouter Joosen:
Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions. 25-34 - Rock Stevens
, Daniel Votipka, Elissa M. Redmiles
, Colin Ahern, Michelle L. Mazurek:
Applied Digital Threat Modeling: It Works. 35-42 - Moritz Schneider
, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. 43-52 - Lorenz Breidenbach, Philip Daian
, Florian Tramèr
, Ari Juels:
The Hydra Framework for Principled, Automated Bug Bounties. 53-61 - Chris Culnane, Aleksander Essex
, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague
:
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud. 62-70 - Nithya Sambasivan, Nova Ahmed
, Amna Batool, Elie Bursztein, Elizabeth F. Churchill, Laura Sanely Gaytán-Lugo
, Tara Matthews, David Nemer, Kurt Thomas, Sunny Consolvo
:
Toward Gender-Equitable Privacy and Security in South Asia. 71-77 - Erwan Beguin, Solal Besnard, Adrien Cros, Barbara Joannes, Ombeline Leclerc-Istria, Alexa Noel, Nicolas Roels, Faical Taleb, Jean Thongphan, Eric Alata, Vincent Nicomette
:
Computer-Security-Oriented Escape Room. 78-83 - Pavel Gladyshev
:
Cybercrime as a Consequence of Unreasonable Expectations. 84-87 - Adam Bates
, Wajih Ul Hassan:
Can Data Provenance Put an End to the Data Breach? 88-93 - Nadim Kobeissi
:
Selfie?s Reflections on Formal Verification for Transport Layer Security 1.3: Largely Opaque. 94-96 - Jeremy Epstein
:
A Horse's Rump and Cybersecurity. 4-6 - Daniel E. Geer Jr.:
Ownership. 100-99
Volume 17, Number 5, September - October 2019
- Laurie A. Williams:
Science Leaves Clues. 4-6 - Paul C. van Oorschot
, Sean W. Smith:
The Internet of Things: Security Challenges. 7-9 - Junia Valente
, Matthew Wynn, Alvaro A. Cárdenas
:
Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices. 10-21 - Musard Balliu, Iulia Bastys
, Andrei Sabelfeld:
Securing IoT Apps. 22-29 - Z. Berkay Celik
, Patrick D. McDaniel
, Gang Tan
, Leonardo Babun
, A. Selcuk Uluagac
:
Verifying Internet of Things Safety and Security in Physical Spaces. 30-37 - Grant Hernandez, Farhaan Fowze
, Dave Jing Tian, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler
:
Toward Automated Firmware Analysis in the IoT Era. 38-46 - Hannes Tschofenig, Emmanuel Baccelli
:
Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security. 47-57 - Roee Leon
, Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg
:
Hypervisor-Based White Listing of Executables. 58-67 - Markus Jakobsson
:
The Rising Threat of Launchpad Attacks. 68-72 - Stephan Raaijmakers
:
Artificial Intelligence for Law Enforcement: Challenges and Opportunities. 74-77 - Igor Linkov, Fabrizio Baiardi
, Marie-Valentine Florin
, Scott Greer, James H. Lambert, Miriam Pollock
, Jean-Marc Rickli
, Lada Roslycky, Thomas P. Seager, Heimir Thorisson, Benjamin D. Trump:
Applying Resilience to Hybrid Threats. 78-83 - Luk Arbuckle
, Felix Ritchie:
The Five Safes of Risk-Based Anonymization. 84-89 - Fabio Massacci
:
Is "Deny Access" a Valid "Fail-Safe Default" Principle for Building Security in Cyberphysical Systems? 90-93 - Elisa Bertino
:
It Takes a Village to Secure Cellular Networks. 96-95
Volume 17, Number 6, November - December 2019
- James Bret Michael
:
Trustworthiness of Autonomous Machines in Armed Conflict. 4-6 - Omer Tene
, Katrine Evans, Bruno Gencarelli, Gabe Maldoff, Gabriela Zanfir-Fortuna:
GDPR at Year One: Enter the Designers and Engineers. 7-9 - Nurul Momen
, Majid Hatamian, Lothar Fritsch:
Did App Privacy Improve After the GDPR? 10-20 - Jatinder Singh
, Jennifer Cobbe
:
The Security Implications of Data Subject Rights. 21-30 - Ronald Petrlic
:
The General Data Protection Regulation: From a Data Protection Authority's (Technical) Perspective. 31-36 - Cesare Bartolini
, Gabriele Lenzini
, Livio Robaldo
:
The DAta Protection REgulation COmpliance Model. 37-45 - Bülent Yener
, Tsvi Gal:
Cybersecurity in the Era of Data Science: Examining New Adversarial Models. 46-53 - M. Sadegh Riazi
, Bita Darvish Rouhani
, Farinaz Koushanfar
:
Deep Learning on Private Data. 54-63 - Dan Boneh, Andrew J. Grotto
, Patrick D. McDaniel, Nicolas Papernot
:
How Relevant Is the Turing Test in the Age of Sophisbots? 64-71 - Scott Ruoti
, Kent E. Seamons
:
Johnny's Journey Toward Usable Secure Email. 72-76 - Alan T. Sherman
, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski
, Rakesh M. Verma
, Ryan Vrecenar, Linda Oliva, Enis Golaszewski
, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman
, Dong San Choi, Spencer E. Offenberger, Peter Peterson:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. 77-83 - Andrew Fasano
, Tim Leek, Brendan Dolan-Gavitt, Josh Bundt
:
The Rode0day to Less-Buggy Programs. 84-88 - Daniel E. Geer Jr., Dale Peterson:
Failure as Design. 89-90

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.