default search action
IEEE Security & Privacy, Volume 19
Volume 19, Number 1, January - February 2021
- Sean Peisert:
Reflections on the Past, Perspectives on the Future [From the Editors]. 4-7 - Sabah Mohammed, Tai-Hoon Kim, Wai-Chi Fang:
Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction]. 8-10 - David M. Nicol:
Message from IEEE S&P's Outgoing Editor in Chief. 10 - José Luis Hernández Ramos, Juan A. Martínez, Vincenzo Savarino, Marco Angelini, Vincenzo Napolitano, Antonio F. Skarmeta, Gianmarco Baldini:
Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions. 12-23 - Binod Vaidya, Hussein T. Mouftah:
Security for Shared Electric and Automated Mobility Services in Smart Cities. 24-33 - Lelio Campanile, Mauro Iacono, Alexander H. Levis, Fiammetta Marulli, Michele Mastroianni:
Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work. 34-43 - Guy Amit, Asaf Shabtai, Yuval Elovici:
A Self-Healing Mechanism for Internet of Things Devices. 44-53 - Fabio Massacci, Chan Nam Ngo:
Distributed Financial Exchanges: Security Challenges and Design Principles. 54-64 - Raz Ben-Netanel, Ben Nassi, Adi Shamir, Yuval Elovici:
Detecting Spying Drones. 65-73 - David Mussington:
Calculating Risks: Understanding the 2020 Election Experience and Defining the "New Normal". 74-80 - Nicola Dragoni, Alberto Lluch-Lafuente, Fabio Massacci, Anders Schlichtkrull:
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]. 81-88 - Mahmoud Said Elsayed, Nhien-An Le-Khac, Anca Delia Jurcut:
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]. 90-94 - Daniel Genkin, Yuval Yarom:
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. 95-98 - José Luis Hernández Ramos, Sara Nieves Matheu-García, Antonio F. Skarmeta:
The Challenges of Software Cybersecurity Certification [Building Security In]. 99-102 - Elisa Bertino:
Attacks on Artificial Intelligence [Last Word]. 103-104
Volume 19, Number 2, March - April 2021
- Paul C. van Oorschot:
Toward Unseating the Unsafe C Programming Language. 4-6 - Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. 7-13 - Fabio Massacci, Trent Jaeger, Sean Peisert:
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? 14-19 - Malhar Jere, Tyler Farnan, Farinaz Koushanfar:
A Taxonomy of Attacks on Federated Learning. 20-28 - Amir Herzberg, Hemi Leibowitz, Kent E. Seamons, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. 29-37 - Wajeeha Ahmad, David D. Clark:
A Systems Approach Toward Addressing Anonymous Abuses: Technical and Policy Considerations. 38-47 - Siam U. Hussain, M. Sadegh Riazi, Farinaz Koushanfar:
The Fusion of Secure Function Evaluation and Logic Synthesis. 48-55 - Karen L. Sanzo, Jay Paredes Scribner, Hongyi Wu:
Designing a K-16 Cybersecurity Collaborative: CIPHER. 56-59 - Marco Simioni:
Investigative Techniques for the De-Anonymization of Hidden Services. 60-64 - Samuel T. King, Nolen Scaife, Patrick Traynor, Zain ul Abi Din, Christian Peeters, Hari Venugopalan:
Credit Card Fraud Is a Computer Security Problem. 65-69 - Alfred Menezes, Douglas Stebila:
Challenges in Cryptography. 70-73 - Jonathan M. Spring, Eric Hatleback, Allen D. Householder, Art Manion, Deana Shick:
Time to Change the CVSS? 74-78 - Daniel E. Geer Jr.:
Auto-Update Considered Harmful. 79-80
Volume 19, Number 3, May - June 2021
- Laurie A. Williams:
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]. 4-7 - Hamed Okhravi:
A Cybersecurity Moonshot. 8-16 - Sameed Ali, Prashant Anantharaman, Zephyr Lucas, Sean W. Smith:
What We Have Here Is Failure to Validate: Summer of LangSec. 17-23 - David M. Nicol:
The Ransomware Threat to Energy-Delivery Systems. 24-32 - Akond Rahman, Laurie A. Williams:
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts. 33-41 - Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. 42-49 - Sangchul Park, Gina J. Choi, Haksoo Ko:
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea. 51-56 - Fabio Massacci, Ivan Pashchenko:
Technical Leverage: Dependencies Are a Mixed Blessing. 58-62 - Bruce Schneier:
What Will It Take? 63-64
Volume 19, Number 4, July - August 2021
- James Bret Michael:
Security and Privacy for Edge Artificial Intelligence. 4-7 - Josh Benaloh, Kammi Foote, Philip B. Stark, Vanessa Teague, Dan S. Wallach:
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. 8-18 - Emiliano De Cristofaro:
A Critical Overview of Privacy in Machine Learning. 19-27 - Amy Dettmer, Hamed Okhravi, Kevin Perry, Nabil Schear, Richard Shay, Mary Ellen Zurko, Paula J. Donovan:
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies. 28-36 - Wenqiang Ruan, Mingxin Xu, Haoyang Jia, Zhenhuan Wu, Lushan Song, Weili Han:
Privacy Compliance: Can Technology Come to the Rescue? 37-43 - Francois Boechat, Gabriel Ribas, Lucas Senos, Miguel Angelo Bicudo, Mateus Schulz Nogueira, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché:
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores. 44-53 - Julie M. Haney, Wayne G. Lutters, Jody L. Jacobs:
Cybersecurity Advocates: Force Multipliers in Security Behavior Change. 54-59 - Alfred Menezes, Douglas Stebila:
End-to-End Security: When Do We Have It? 60-64 - Pollyanna Sanderson:
Balancing Public Health and Civil Liberties: Privacy Aspects of Contact-Tracing Technologies. 65-69 - Eric Vétillard:
Security Certification: Is It Box Ticking? 70-74 - Steven M. Bellovin:
The Law and Lawful Hacking. 76
Volume 19, Number 5, September - October 2021
- Terry Benzel:
Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector? 4-7 - Bob Blakley, Lorrie Faith Cranor:
A Discussion of Public Health, Trust, and Privacy With Susan Landau. 9-15 - Yu Tsung Lee, Haining Chen, Trent Jaeger:
Demystifying Android's Scoped Storage Defense. 16-25 - Ramona Trestian, Guodong Xie, Pintu Lohar, Edoardo Celeste, Malika Bendechache, Rob Brennan, Evgeniia Jayasekera, Regina Connolly, Irina Tal:
Privacy in a Time of COVID-19: How Concerned Are You? 26-35 - Florian Skopik, Markus Wurzenberger, Max Landauer:
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection. 36-45 - Francesco Minna, Agathe Blaise, Filippo Rebecchi, Balakrishnan Chandrasekaran, Fabio Massacci:
Understanding the Security Implications of Kubernetes Networking. 46-56 - Zheng Yang, Sridhar Adepu, Jianying Zhou:
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography. 57-65 - Sauvik Das, W. Keith Edwards, DeBrae Kennedy-Mayo, Peter Swire, Yuxi Wu:
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy. 66-70 - Blair Taylor, Sidd Kaza, Paige A. Zaleppa:
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula. 72-76 - Katja Tuma, Mathias Widman:
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain. 78-82 - Paul C. van Oorschot:
Coevolution of Security's Body of Knowledge and Curricula. 83-89 - Sophie Stalla-Bourdillon:
A Maturity Spectrum for Data Institutions. 90-94 - Elisa Bertino:
Zero Trust Architecture: Does It Help? 95-96
Volume 19, Number 6, November - December 2021
- Trent Jaeger:
Toward Fail Safety for Security Decisions. 4-7 - Robert K. Cunningham, Anita D. Carleton, Tom Longstaff, Forrest J. Shull, Deborah A. Frincke:
A Research Road Map for Building Secure and Resilient Software-Intensive Systems. 8-14 - Bob Blakley, Lorrie Faith Cranor:
A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter. 15-22 - Danfeng Daphne Yao, Terry Benzel:
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions. 23-24 - Dongkwan Kim, Eunsoo Kim, Mingeun Kim, Yeongjin Jang, Yongdae Kim:
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds. 26-35 - Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Parental Controls: Safer Internet Solutions or New Pitfalls? 36-46 - Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
Verify It's You: How Users Perceive Risk-Based Authentication. 47-57 - Carter Yagemann, Simon Pak Ho Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
Modeling Large-Scale Manipulation in Open Stock Markets. 58-65 - Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Problematic Privacy Policies of Voice Assistant Applications. 66-73 - Assane Gueye, Carlos E. C. Galhardo, Irena Bojanova, Peter Mell:
A Decade of Reoccurring Software Weaknesses. 74-82 - Cong Shi, Yan Wang, Yingying (Jennifer) Chen, Nitesh Saxena:
Authentication of Voice Commands by Leveraging Vibrations in Wearables. 83-92 - David Pujol, Ashwin Machanavajjhala:
Equity and Privacy: More Than Just a Tradeoff. 93-97 - Alfred Menezes, Douglas Stebila:
The Advanced Encryption Standard: 20 Years Later. 98-102 - Fariborz Farahmand, Jens Grossklags, Jelena Mirkovic, Bill Newhouse:
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education. 104-110 - Emily Stark, Joe DeBlasio, Devon O'Brien, Davide Balzarotti, William Enck, Samuel King, Angelos Stavrou:
Certificate Transparency in Google Chrome: Past, Present, and Future. 112-118 - Jules Polonetsky, Tim Sparapani, Khaled El Emam:
A Review of the Privacy-Enhancing Technologies Software Market. 119-122 - Daniel E. Geer Jr.:
Convergence. 123-124
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.