


default search action
IEEE Security & Privacy, Volume 23
Volume 23, Number 1, January - February 2025
- Fabio Massacci
:
Exploding Pagers and the Birth of State Cyberterrorism. 4-6 - David D. Clark
, Simson L. Garfinkel
, kc claffy
:
Differential Privacy, Firm-Level Data, and the Binomial Pathology. 8-16 - Giuseppe Cascavilla
:
The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement. 17-26 - Rachel McAmis
, F. Betül Durak
, Melissa Erin Chase
, Kim Laine
, Franziska Roesner
, Tadayoshi Kohno
:
Handling Identity and Fraud in the Metaverse. 27-37 - Sean Oesch
, Phillipe Austria
, Amul Chaulagain
, Brian Weber
, Cory L. Watson
, Matthew Dixson
, Amir Sadovnik
:
The Path to Autonomous Cyberdefense. 38-46 - Dominik Schneider
, Jannik Zeitschner
, Michael Kloos
, Kerstin Lemke-Rust
, Luigi Lo Iacono
:
Developers: Beware of Timing Side-Channels. 47-52 - Pranet Sharma
, Zhenpeng Shi
, Sevval Simsek
, David Starobinski
, David Sastre Medina:
Understanding Similarities and Differences Between Software Composition Analysis Tools. 53-63 - Mustafa Abdallah
, Saurabh Bagchi
, Shaunak D. Bopardikar
, Kevin Chan
, Xing Gao
, Murat Kantarcioglu
, Congmiao Li
, Peng Liu
, Quanyan Zhu
:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. 64-74 - Tamara Lopez
:
Securing Code: A View on the Cultural Aspects of Resilience. 76-78 - Alice Hutchings
:
Police Behaving Badly. 80-82 - Cristina Alcaraz
, Javier López
:
Digital Twin Security: A Perspective on Efforts From Standardization Bodies. 83-90 - Roberto Baldoni
, Giuseppe Antonio Di Luna:
Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities. 91-96 - Daniel E. Geer
:
Data. 98-100
Volume 23, Number 2, March - April 2025
- Mary Ellen Zurko:
Cyber Hard Problems: The Next Generation [From the Editors]. 4-9 - Tamara Lopez, Bashar Nuseibeh, Eric Bodden:
Security Requirements and Secure Software Design. 10-12 - Taylor R. Schorlemmer, Ethan H. Burmane, Kelechi G. Kalu, Santiago Torres-Arias, James C. Davis:
Establishing Provenance Before Coding: Traditional and Next-Generation Software Signing. 14-22 - Pavel Chuprikov, Patrick Eugster, Shamiek Mangipudi:
Security Policy as Code. 23-31 - Avi Shaked, Tom Melham:
Contextualizing Formal Verification for Systems Security Engineering. 32-41 - Manuel Maarek, Daisy Abbott, Olga Chatzifoti, Ryan Shah, Sheung Chi Chan, Hans-Wolfgang Loidl, Robert J. Stewart, Jamie Iona Ferguson, Sandy Louchart, Shenando Stals, Lynne Baillie:
Empower New Code Citizens to Reflect and Communicate on Code Security. 42-51 - Harun Oz, Daniele Cono D'Elia, Güliz Seray Tuncay, Abbas Acar, Riccardo Lazzeretti, Arif Selcuk Uluagac:
With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces. 52-60 - Shunsuke Sato, Ryoichi Shinkuma, Kensei Hirai, Masataka Nakahara, Norihiro Okui, Ayumu Kubota, Yasuaki Kobayashi, Keizo Sugiyama, Takayuki Nishio:
Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack. 61-70 - Corey M. Hartman, Bhaskar Prasad Rimal, Daniel Conte de Leon, Nirmal Budhathoki:
Cross-Architecture Binary Function Fingerprinting. 71-80 - Liliana Pasquale, Antonino Sabetta, Marcelo d'Amorim, Péter Hegedüs, Mehdi Tarrit Mirakhorli, Hamed Okhravi, Mathias Payer, Awais Rashid, Joanna C. S. Santos, Jonathan M. Spring, Lin Tan, Katja Tuma:
Challenges to Using Large Language Models in Code Generation and Repair. 81-88 - Abdul Majeed, Seong Oun Hwang:
The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks. 89-94 - Jessica McClearn, Reem Talhouk, Rikke Bjerg Jensen:
The Everyday Security of Living With Conflict. 95-100 - Hamed Okhravi, Nathan Burow, Fred B. Schneider:
Software Bill of Materials as a Proactive Defense. 101-106 - Jonathan M. Spring:
Secure by Design for Everyone. 107-108

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.