default search action
IEEE Security & Privacy, Volume 18
Volume 18, Number 1, January - February 2020
- David M. Nicol:
The Value of Useless Academic Research to the Cyberdefense of Critical Infrastructures. 4-7 - Kate Charlet, Heather King:
The Future of Cybersecurity Policy. 8-10 - Andrew J. Grotto:
Deconstructing Cyber Attribution: A Proposed Framework and Lexicon. 12-20 - Daniel W. Woods, Tyler Moore:
Does Insurance Have a Future in Governing Cybersecurity? 21-27 - José Luis Hernández Ramos, Dimitris Geneiatakis, Ioannis Kounelis, Gary Steri, Igor Nai Fovino:
Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies. 28-38 - Michael Klipstein, Austin Minter, Jeremiah Pittman:
Understanding the Information Environment to Win the Next Conflict Without Firing a Shot. 39-45 - Pierantonia Sterlini, Fabio Massacci, Natalia Kadenko, Tobias Fiebig, Michel van Eeten:
Governance Challenges for European Cybersecurity Policies: Stakeholder Views. 46-54 - Barry M. Horowitz:
Cyberattack-Resilient Cyberphysical Systems. 55-60 - William Stallings:
Handling of Personal Information and Deidentified, Aggregated, and Pseudonymized Information Under the California Consumer Privacy Act. 61-64 - James P. Howard II, Maria E. Vachino:
Blockchain Compliance With Federal Cryptographic Information-Processing Standards. 65-70 - Bruce Schneier:
Technologists vs. Policy Makers. 72-71
Volume 18, Number 2, March - April 2020
- Paul C. van Oorschot:
Untangling Security and Privacy. 4-6 - Fariborz Farahmand:
Quantitative Issues in Cyberinsurance: Lessons From Behavioral Economics, Counterfactuals, and Causal Inference. 8-15 - Domhnall Carlin, Jonah Burgess, Philip O'Kane, Sakir Sezer:
You Could Be Mine(d): The Rise of Cryptojacking. 16-22 - Luca Allodi, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone:
The Need for New Antiphishing Measures Against Spear-Phishing Attacks. 23-34 - Boubakr Nour, Kashif Sharif, Fan Li, Yu Wang:
Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks. 35-45 - Markus Jakobsson:
Permissions and Privacy. 46-55 - Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Execution Environments: Properties, Applications, and Challenges. 56-60 - Thomas R. Souvignet, Thibaut Heckmann, Timothy Bollé:
From Lucky Luke to Lock Bits. 61-66 - Denny Pencheva, Joseph Hallett, Awais Rashid:
Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education. 68-74 - Steven M. Bellovin:
Policies on Privacy. 76
Volume 18, Number 3, May - June 2020
- David M. Nicol:
In the Petri Dish: Cybersecurity Pushed to the Edge. 4-5 - Terry Benzel, Frank Stajano:
IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps. 6-7 - Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei:
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery. 8-16 - Fan Zhang, Warren He, Raymond Cheng, Jernej Kos, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. 17-27 - Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. 28-37 - Yuan Tian, Cormac Herley, Stuart E. Schechter:
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing. 38-47 - Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
Benchmarking Flaws Undermine Security Research. 48-57 - Kavita M. Berger:
Addressing Cyber Threats in Biology. 58-61 - Alexander Kott, Paul Théron:
Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber Resilience. 62-66 - Elisa Bertino:
The Quest for Data Transparency. 67-68
Volume 18, Number 4, July - August 2020
- Sean Peisert:
Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19. 4-7 - Hamed Okhravi, Nathan Burow, Richard Skowyra, Bryan C. Ward, Samuel Jero, Roger Khazan, Howard E. Shrobe:
One Giant Leap for Computer Security. 8-19 - Marietheres Dietz, Günther Pernul:
Unleashing the Digital Twin's Potential for ICS Security. 20-27 - L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. 28-37 - Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp:
Best Practices Would Make Things Better in the IoT. 38-47 - Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes:
IT Security Is From Mars, Software Security Is From Venus. 48-54 - Khaled El Emam:
Seven Ways to Evaluate the Utility of Synthetic Data. 56-59 - Dan Shoemaker, Nancy R. Mead, Anne Kohnke:
Teaching Secure Acquisition in Higher Education. 60-66 - Eric Osterweil:
A Cybersecurity Terminarch: Use It Before We Lose It. 67-70 - Holger Mack, Tom Schroer:
Security Midlife Crisis: Building Security in a New World. 72-74 - Daniel E. Geer Jr.:
Security Theater, the Beat Goes On. 75-76
Volume 18, Number 5, September - October 2020
- Paul C. van Oorschot:
Blockchains and Stealth Tactics for Teaching Security. 3-5 - Mohammad Mannan, N. Asokan:
Confronting the Limitations of Hardware-Assisted Security. 6-7 - Lianying Zhao, David Lie:
Is Hardware More Secure Than Software? 8-17 - Michael Schwarz, Daniel Gruss:
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks. 18-27 - Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Frank Piessens, Daniel Gruss:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. 28-37 - Kari Kostiainen, Aritra Dhar, Srdjan Capkun:
Dedicated Security Chips in the Age of Secure Enclaves. 38-46 - David Kohlbrenner, Shweta Shinde, Dayeol Lee, Krste Asanovic, Dawn Song:
Building Open Trusted Execution Environments. 47-56 - Ghada Dessouky, Tommaso Frassetto, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security. 57-66 - Randy Borum, Ron Sanders:
Preparing America's Cyber Intelligence Workforce. 67-73 - Kenneth G. Crowther, Brian Rust:
Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company. 74-79 - Bruce Schneier:
Hacking the Tax Code. 79-80
Volume 18, Number 6, November - December 2020
- Phyllis A. Schneck:
Cybersecurity During COVID-19. 4-5 - Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. 6-13 - Chuadhry Mujeeb Ahmed, Jianying Zhou:
Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective. 14-22 - Rafael Padilha, Caroline Mazini Rodrigues, Fernanda A. Andaló, Gabriel Bertocco, Zanoni Dias, Anderson Rocha:
Forensic Event Analysis: From Seemingly Unrelated Data to Understanding. 23-32 - Roy A. Maxion:
Reproducibility: Buy Low, Sell High. 33-41 - Qiu-Hong Wang, Steven M. Miller, Robert H. Deng:
Driving Cybersecurity Policy Insights From Information on the Internet. 42-50 - Rock Stevens, Josiah Dykstra, Wendy Knox Everette, Michelle L. Mazurek:
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs. 51-58 - Julianna Rodríguez, Benjamin J. Allison, Christopher Apsey, Todd Boudreau:
Courseware as Code: Instituting Agile Courseware Collaboration. 59-62 - Steven M. Bellovin:
Security, Privacy, and Scale. 63-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.