default search action
IEEE Security & Privacy, Volume 21
Volume 21, Number 1, January - February 2023
- Terry Benzel:
Security and Privacy Research Artifacts: Are We Making Progress? 4-6 - Mary Ellen Zurko, Julie M. Haney:
Usable Security and Privacy for Security and Privacy Workers. 8-10 - Bob Blakley, Lorrie Cranor:
Katie Moussouris: Vulnerability Disclosure and Security Workforce Development. 11-18 - Peter Leo Gorski, Luigi Lo Iacono, Matthew Smith:
Eight Lightweight Usable Security Principles for Developers. 20-26 - Charles Weir, Anna Dyson, Daniel Prince:
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices. 27-36 - Mohamad Fazelnia, Ahmet Okutan, Mehdi Mirakhorli:
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework. 37-48 - Mohammad Tahaei, Kami Vaniea, Awais Rashid:
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions. 49-57 - Nathan Malkin:
Contextual Integrity, Explained: A More Usable Privacy Definition. 58-65 - Francesco Ciclosi, Fabio Massacci:
The Data Protection Officer: A Ubiquitous Role That No One Really Knows. 66-77 - Adam Shostack:
Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption. 78-83 - Sungmi Park, Douglas Stebila:
The Future of Digital Investigation: Automated Legal Inference. 84-90 - Elisa Bertino:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. 91-92
Volume 21, Number 2, March - April 2023
- Sean Peisert:
The First 20 Years of IEEE Security & Privacy. 4-6 - Tadayoshi Kohno:
{In Earth} Until (Ready). 7-8 - Bob Blakley, Lorrie Cranor:
A 20th Anniversary Episode Chat With S&P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert. 9-16 - Crispin Cowan:
Open and Closed Software Security Redux. 18-23 - Steve Lipner, Michael Howard:
Inside the Windows Security Push: A Twenty-Year Retrospective. 24-31 - Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. 32-42 - Terry Benzel, Hilarie Orman:
IEEE Security and Privacy Symposium in the Year 2003. 43-47 - Elissa M. Redmiles, Mia M. Bennett, Tadayoshi Kohno:
Power in Computer Security and Privacy: A Critical Lens. 48-52 - Lorenzo Cavallaro, Johannes Kinder, Feargus Pendlebury, Fabio Pierazzi:
Are Machine Learning Models for Malware Detection Ready for Prime Time? 53-56 - Christopher A. Wood:
Hot Topics in Security and Privacy Standardization at the IETF and Beyond. 57-62 - John True, Navid Asadizanjani:
Physical Inspection and Attacks on Electronics: An Academic Course for the Hardware Cybersecurity Workforce. 63-69 - Paul C. van Oorschot:
Memory Errors and Memory Safety: C as a Case Study. 70-76 - Arvind Narayanan, Kevin Lee:
Security Policy Audits: Why and How. 77-81 - Nusrat Zahan, Elizabeth Lin, Mahzabin Tamanna, William Enck, Laurie A. Williams:
Software Bills of Materials Are Required. Are We There Yet? 82-88 - Daniel E. Geer:
Whither Software? 89-90
Volume 21, Number 3, May - June 2023
- Trent Jaeger:
On Bridges and Software. 4-5 - Trent Jaeger, Brent ByungHoon Kang, Nele Mentens, Cynthia Sturton:
Impact of Emerging Hardware on Security and Privacy. 6-7 - Soyeon Park, Sangho Lee, Taesoo Kim:
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions. 8-15 - Vikram Narayanan, Anton Burtsev:
The Opportunities and Limitations of Extended Page Table Switching for Fine-Grained Isolation. 16-26 - Andres Meza, Francesco Restuccia, Jason Oberg, Dominic Rizzo, Ryan Kastner:
Security Verification of the OpenTitan Hardware Root of Trust. 27-36 - Marc Lacoste, Vincent Lefebvre:
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats. 37-46 - Adam Brian Turner, Stephen McCombie, Allon J. Uhlmann:
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression. 47-57 - Kacper T. Gradon:
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT. 58-61 - Paul C. van Oorschot:
Memory Errors and Memory Safety: A Look at Java and Rust. 62-68
Volume 21, Number 4, July - August 2023
- Sean Peisert:
On Software Infrastructure: Develop, Prove, Profit? 4-8 - Gabriela F. Ciocarlie, Jianying Zhou:
Securing Critical Infrastructure Across Cyber and Physical Dimensions. 9 - Adeen Ayub, Wooyeon Jo, Syed Ali Qasim, Irfan Ahmed:
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers. 10-19 - Luis Burbano, Kunal Garg, Santiago J. Leudo, Alvaro A. Cárdenas, Ricardo G. Sanfelice:
Online Attack Recovery in Cyberphysical Systems. 20-28 - Rodrigo Roman, Cristina Alcaraz, Javier López, Kouichi Sakurai:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. 29-38 - Constantine Doumanidis, Yongyu Xie, Prashant Hari Narayan Rajput, Ryan Pickren, Burak Sahin, Saman A. Zonouz, Michail Maniatakos:
Dissecting the Industrial Control Systems Software Supply Chain. 39-50 - Aditya P. Mathur:
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure. 51-60 - Martin Strohmeier, Mauro Leonardi, Sergei Markochev, Fabio Ricciato, Matthias Schäfer, Vincent Lenders:
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach. 61-73 - Khaled Sarieddine, Mohammad Ali Sayed, Danial Jafarigiv, Ribal Atallah, Mourad Debbabi, Chadi Assi:
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security. 74-83 - David M. Nicol, Gregory Shannon, Monika Akbar, Matt Bishop, Michael M. Chaney, Matthew E. Luallen:
Toward Common Weakness Enumerations in Industrial Control Systems. 84-93 - Nigel P. Smart:
Computing on Encrypted Data. 94-98 - Steven M. Bellovin:
Is Cybersecurity Liability a Liability? 99-100
Volume 21, Number 5, September - October 2023
- Tadayoshi Kohno:
In Your Eyes. 4-5 - Jingwei Wu, Wanxi Mao, Yuxin Deng, Jinghong Xu:
Child Safety and Data Privacy in Smart Homes With Speakers: Comparison of Privacy Policies in the United States and China. 6-17 - Abdul Majeed, Seong Oun Hwang:
Rectification of Syntactic and Semantic Privacy Mechanisms. 18-32 - Priyanka Nanayakkara, Jessica Hullman:
What's Driving Conflicts Around Differential Privacy for the U.S. Census. 33-42 - Sebastian Obermeier, Thomas Jösler, Stephan Renggli, Maurus Unternährer, Bernhard M. Hämmerli:
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures. 43-54 - Eric Ruzomberka, David J. Love, Christopher G. Brinton, Arpit Gupta, Chih-Chun Wang, H. Vincent Poor:
Challenges and Opportunities for Beyond-5G Wireless Security. 55-66 - Padmanabhan Krishnan, Cristina Cifuentes, Li Li, Tegawendé F. Bissyandé, Jacques Klein:
Why Is Static Application Security Testing Hard to Learn? 68-72 - Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Lessons Learned on Machine Learning for Computer Security. 72-77 - Frank Piessens:
Transient Execution Attacks. 79-84 - Konstantinos Adamos, Fabio Di Franco, Athanasios Vasileios Grammatopoulos:
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD. 85-94 - Daniel E. Geer:
Convergence: Ongoing. 95-96
Volume 21, Number 6, November - December 2023
- Mary Ellen Zurko:
Unusable Security for Attackers [From the Editors]. 4-7 - Fabio Massacci, Laurie A. Williams:
Software Supply Chain Security [Guest Editors' Introduction]. 8-10 - Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron Arteaga, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger:
Challenges of Producing Software Bill of Materials for Java. 12-23 - Ákos Milánkovich, Katja Tuma:
Delta Security Certification for Software Supply Chains. 24-33 - Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais:
Journey to the Center of Software Supply Chain Attacks. 34-49 - Santiago Torres-Arias, Daniel E. Geer, John Speed Meyers:
A Viewpoint on Knowing Software: Bill of Materials Quality When You See It. 50-54 - Marcela S. Melara, Santiago Torres-Arias:
A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation? 55-58 - Marcel Fourné, Dominik Wermke, Sascha Fahl, Yasemin Acar:
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. 59-63 - Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. 64-75 - Nusrat Zahan, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan, Laurie A. Williams:
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics. 76-88 - Florian Kerschbaum, Nils Lukas:
Privacy-Preserving Machine Learning [Cryptography]. 90-94 - Bruce Schneier:
Trustworthy AI Means Public AI [Last Word]. 95-96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.