


default search action
IEEE Security & Privacy, Volume 19
Volume 19, Number 1, January - February 2021
- Sean Peisert
:
Reflections on the Past, Perspectives on the Future [From the Editors]. 4-7 - Sabah Mohammed, Tai-Hoon Kim, Wai-Chi Fang:
Requirements for Security, Privacy, and Trust in the Internet of Things [Guest Editors' Introduction]. 8-10 - David M. Nicol:
Message from IEEE S&P's Outgoing Editor in Chief. 10 - José Luis Hernández-Ramos
, Juan A. Martínez, Vincenzo Savarino, Marco Angelini
, Vincenzo Napolitano, Antonio F. Skarmeta
, Gianmarco Baldini
:
Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions. 12-23 - Binod Vaidya
, Hussein T. Mouftah:
Security for Shared Electric and Automated Mobility Services in Smart Cities. 24-33 - Lelio Campanile
, Mauro Iacono
, Alexander H. Levis, Fiammetta Marulli, Michele Mastroianni
:
Privacy Regulations, Smart Roads, Blockchain, and Liability Insurance: Putting Technologies to Work. 34-43 - Guy Amit
, Asaf Shabtai
, Yuval Elovici
:
A Self-Healing Mechanism for Internet of Things Devices. 44-53 - Fabio Massacci
, Chan Nam Ngo
:
Distributed Financial Exchanges: Security Challenges and Design Principles. 54-64 - Raz Ben-Netanel, Ben Nassi
, Adi Shamir
, Yuval Elovici
:
Detecting Spying Drones. 65-73 - David Mussington
:
Calculating Risks: Understanding the 2020 Election Experience and Defining the "New Normal". 74-80 - Nicola Dragoni
, Alberto Lluch-Lafuente
, Fabio Massacci
, Anders Schlichtkrull
:
Are We Preparing Students to Build Security In? A Survey of European Cybersecurity in Higher Education Programs [Education]. 81-88 - Mahmoud Said Elsayed
, Nhien-An Le-Khac
, Anca Delia Jurcut
:
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]. 90-94 - Daniel Genkin, Yuval Yarom:
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. 95-98 - José Luis Hernández-Ramos
, Sara Nieves Matheu-García
, Antonio F. Skarmeta
:
The Challenges of Software Cybersecurity Certification [Building Security In]. 99-102 - Elisa Bertino
:
Attacks on Artificial Intelligence [Last Word]. 103-104
Volume 19, Number 2, March - April 2021
- Paul C. van Oorschot
:
Toward Unseating the Unsafe C Programming Language. 4-6 - Sean Peisert
, Bruce Schneier, Hamed Okhravi
, Fabio Massacci
, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash
, James Bret Michael:
Perspectives on the SolarWinds Incident. 7-13 - Fabio Massacci
, Trent Jaeger, Sean Peisert
:
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? 14-19 - Malhar Jere
, Tyler Farnan, Farinaz Koushanfar
:
A Taxonomy of Attacks on Federated Learning. 20-28 - Amir Herzberg
, Hemi Leibowitz
, Kent E. Seamons
, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. 29-37 - Wajeeha Ahmad
, David D. Clark:
A Systems Approach Toward Addressing Anonymous Abuses: Technical and Policy Considerations. 38-47 - Siam U. Hussain
, M. Sadegh Riazi
, Farinaz Koushanfar
:
The Fusion of Secure Function Evaluation and Logic Synthesis. 48-55 - Karen L. Sanzo
, Jay Paredes Scribner, Hongyi Wu:
Designing a K-16 Cybersecurity Collaborative: CIPHER. 56-59 - Marco Simioni
:
Investigative Techniques for the De-Anonymization of Hidden Services. 60-64 - Samuel T. King, Nolen Scaife, Patrick Traynor, Zain ul Abi Din, Christian Peeters, Hari Venugopalan:
Credit Card Fraud Is a Computer Security Problem. 65-69 - Alfred Menezes
, Douglas Stebila
:
Challenges in Cryptography. 70-73 - Jonathan M. Spring
, Eric Hatleback
, Allen D. Householder, Art Manion, Deana Shick:
Time to Change the CVSS? 74-78 - Daniel E. Geer Jr.:
Auto-Update Considered Harmful. 79-80
Volume 19, Number 3, May - June 2021
- Laurie A. Williams:
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]. 4-7 - Hamed Okhravi
:
A Cybersecurity Moonshot. 8-16 - Sameed Ali, Prashant Anantharaman, Zephyr Lucas, Sean W. Smith
:
What We Have Here Is Failure to Validate: Summer of LangSec. 17-23 - David M. Nicol
:
The Ransomware Threat to Energy-Delivery Systems. 24-32 - Akond Rahman
, Laurie A. Williams
:
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts. 33-41 - Shuwen Deng
, Wenjie Xiong
, Jakub Szefer
:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. 42-49 - Sangchul Park
, Gina J. Choi, Haksoo Ko:
Privacy in the Time of COVID-19: Divergent Paths for Contact Tracing and Route-Disclosure Mechanisms in South Korea. 51-56 - Fabio Massacci
, Ivan Pashchenko
:
Technical Leverage: Dependencies Are a Mixed Blessing. 58-62 - Bruce Schneier:
What Will It Take? 63-64
Volume 19, Number 4, July - August 2021
- James Bret Michael
:
Security and Privacy for Edge Artificial Intelligence. 4-7 - Josh Benaloh, Kammi Foote, Philip B. Stark, Vanessa Teague, Dan S. Wallach:
VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. 8-18 - Emiliano De Cristofaro
:
A Critical Overview of Privacy in Machine Learning. 19-27 - Amy Dettmer, Hamed Okhravi
, Kevin Perry, Nabil Schear, Richard Shay, Mary Ellen Zurko, Paula J. Donovan:
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies. 28-36 - Wenqiang Ruan
, Mingxin Xu, Haoyang Jia, Zhenhuan Wu, Lushan Song, Weili Han
:
Privacy Compliance: Can Technology Come to the Rescue? 37-43 - Francois Boechat, Gabriel Ribas, Lucas Senos, Miguel Angelo Bicudo
, Mateus Schulz Nogueira
, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché
:
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores. 44-53 - Julie M. Haney
, Wayne G. Lutters, Jody L. Jacobs:
Cybersecurity Advocates: Force Multipliers in Security Behavior Change. 54-59 - Alfred Menezes
, Douglas Stebila
:
End-to-End Security: When Do We Have It? 60-64 - Pollyanna Sanderson
:
Balancing Public Health and Civil Liberties: Privacy Aspects of Contact-Tracing Technologies. 65-69 - Eric Vétillard
:
Security Certification: Is It Box Ticking? 70-74 - Steven M. Bellovin:
The Law and Lawful Hacking. 76
Volume 19, Number 5, September - October 2021
- Terry Benzel
:
Research and Industry Partnerships in Cybersecurity and Privacy Research: New Frontiers or Fueling the Tech Sector? 4-7 - Bob Blakley
, Lorrie Faith Cranor
:
A Discussion of Public Health, Trust, and Privacy With Susan Landau. 9-15 - Yu Tsung Lee
, Haining Chen, Trent Jaeger
:
Demystifying Android's Scoped Storage Defense. 16-25 - Ramona Trestian
, Guodong Xie, Pintu Lohar, Edoardo Celeste
, Malika Bendechache
, Rob Brennan
, Evgeniia Jayasekera, Regina Connolly, Irina Tal:
Privacy in a Time of COVID-19: How Concerned Are You? 26-35 - Florian Skopik
, Markus Wurzenberger
, Max Landauer
:
The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection. 36-45 - Francesco Minna
, Agathe Blaise, Filippo Rebecchi, Balakrishnan Chandrasekaran, Fabio Massacci
:
Understanding the Security Implications of Kubernetes Networking. 46-56 - Zheng Yang
, Sridhar Adepu
, Jianying Zhou:
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography. 57-65 - Sauvik Das
, W. Keith Edwards, DeBrae Kennedy-Mayo, Peter Swire, Yuxi Wu:
Privacy for the People? Exploring Collective Action as a Mechanism to Shift Power to Consumers in End-User Privacy. 66-70 - Blair Taylor
, Sidd Kaza, Paige A. Zaleppa
:
CLARK: A Design Science Research Project for Building and Sharing High-Quality Cybersecurity Curricula. 72-76 - Katja Tuma
, Mathias Widman:
Seven Pain Points of Threat Analysis and Risk Assessment in the Automotive Domain. 78-82 - Paul C. van Oorschot
:
Coevolution of Security's Body of Knowledge and Curricula. 83-89 - Sophie Stalla-Bourdillon
:
A Maturity Spectrum for Data Institutions. 90-94 - Elisa Bertino
:
Zero Trust Architecture: Does It Help? 95-96
Volume 19, Number 6, November - December 2021
- Trent Jaeger:
Toward Fail Safety for Security Decisions. 4-7 - Robert K. Cunningham, Anita D. Carleton, Tom Longstaff, Forrest J. Shull, Deborah A. Frincke:
A Research Road Map for Building Secure and Resilient Software-Intensive Systems. 8-14 - Bob Blakley, Lorrie Faith Cranor:
A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter. 15-22 - Danfeng Daphne Yao, Terry Benzel:
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions. 23-24 - Dongkwan Kim, Eunsoo Kim, Mingeun Kim, Yeongjin Jang, Yongdae Kim
:
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds. 26-35 - Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef
:
Parental Controls: Safer Internet Solutions or New Pitfalls? 36-46 - Stephan Wiefling
, Markus Dürmuth
, Luigi Lo Iacono:
Verify It's You: How Users Perceive Risk-Based Authentication. 47-57 - Carter Yagemann
, Simon Pak Ho Chung, Erkam Uzun
, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
Modeling Large-Scale Manipulation in Open Stock Markets. 58-65 - Song Liao
, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Problematic Privacy Policies of Voice Assistant Applications. 66-73 - Assane Gueye, Carlos E. C. Galhardo, Irena Bojanova, Peter Mell:
A Decade of Reoccurring Software Weaknesses. 74-82 - Cong Shi
, Yan Wang
, Yingying (Jennifer) Chen
, Nitesh Saxena:
Authentication of Voice Commands by Leveraging Vibrations in Wearables. 83-92 - David Pujol, Ashwin Machanavajjhala:
Equity and Privacy: More Than Just a Tradeoff. 93-97 - Alfred Menezes, Douglas Stebila
:
The Advanced Encryption Standard: 20 Years Later. 98-102 - Fariborz Farahmand, Jens Grossklags, Jelena Mirkovic, Bill Newhouse:
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education. 104-110 - Emily Stark, Joe DeBlasio, Devon O'Brien, Davide Balzarotti, William Enck, Samuel King, Angelos Stavrou:
Certificate Transparency in Google Chrome: Past, Present, and Future. 112-118 - Jules Polonetsky, Tim Sparapani, Khaled El Emam:
A Review of the Privacy-Enhancing Technologies Software Market. 119-122 - Daniel E. Geer Jr.:
Convergence. 123-124

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.