


default search action
IEEE Security & Privacy, Volume 21
Volume 21, Number 1, January - February 2023
- Terry Benzel
:
Security and Privacy Research Artifacts: Are We Making Progress? 4-6 - Mary Ellen Zurko, Julie M. Haney
:
Usable Security and Privacy for Security and Privacy Workers. 8-10 - Bob Blakley, Lorrie Cranor:
Katie Moussouris: Vulnerability Disclosure and Security Workforce Development. 11-18 - Peter Leo Gorski
, Luigi Lo Iacono
, Matthew Smith:
Eight Lightweight Usable Security Principles for Developers. 20-26 - Charles Weir
, Anna Dyson
, Daniel Prince:
Do You Speak Cyber? Talking Security With Developers of Health Systems and Devices. 27-36 - Mohamad Fazelnia
, Ahmet Okutan
, Mehdi Mirakhorli
:
Supporting Artificial Intelligence/Machine Learning Security Workers Through an Adversarial Techniques, Tools, and Common Knowledge Framework. 37-48 - Mohammad Tahaei
, Kami Vaniea
, Awais Rashid
:
Embedding Privacy Into Design Through Software Developers: Challenges and Solutions. 49-57 - Nathan Malkin
:
Contextual Integrity, Explained: A More Usable Privacy Definition. 58-65 - Francesco Ciclosi
, Fabio Massacci
:
The Data Protection Officer: A Ubiquitous Role That No One Really Knows. 66-77 - Adam Shostack:
Nothing Is Good Enough: Fast and Cheap Are Undervalued as Influencers of Security Tool Adoption. 78-83 - Sungmi Park
, Douglas Stebila:
The Future of Digital Investigation: Automated Legal Inference. 84-90 - Elisa Bertino
:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. 91-92
Volume 21, Number 2, March - April 2023
- Sean Peisert
:
The First 20 Years of IEEE Security & Privacy. 4-6 - Tadayoshi Kohno
:
{In Earth} Until (Ready). 7-8 - Bob Blakley, Lorrie Cranor:
A 20th Anniversary Episode Chat With S&P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert. 9-16 - Crispin Cowan
:
Open and Closed Software Security Redux. 18-23 - Steve Lipner
, Michael Howard:
Inside the Windows Security Push: A Twenty-Year Retrospective. 24-31 - Carl E. Landwehr
, Michael K. Reiter
, Laurie A. Williams
, Gene Tsudik
, Trent Jaeger
, Tadayoshi Kohno
, Apu Kapadia
:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. 32-42 - Terry Benzel
, Hilarie Orman
:
IEEE Security and Privacy Symposium in the Year 2003. 43-47 - Elissa M. Redmiles
, Mia M. Bennett, Tadayoshi Kohno
:
Power in Computer Security and Privacy: A Critical Lens. 48-52 - Lorenzo Cavallaro
, Johannes Kinder
, Feargus Pendlebury
, Fabio Pierazzi
:
Are Machine Learning Models for Malware Detection Ready for Prime Time? 53-56 - Christopher A. Wood
:
Hot Topics in Security and Privacy Standardization at the IETF and Beyond. 57-62 - John True
, Navid Asadizanjani:
Physical Inspection and Attacks on Electronics: An Academic Course for the Hardware Cybersecurity Workforce. 63-69 - Paul C. van Oorschot
:
Memory Errors and Memory Safety: C as a Case Study. 70-76 - Arvind Narayanan
, Kevin Lee
:
Security Policy Audits: Why and How. 77-81 - Nusrat Zahan
, Elizabeth Lin
, Mahzabin Tamanna, William Enck
, Laurie A. Williams
:
Software Bills of Materials Are Required. Are We There Yet? 82-88 - Daniel E. Geer
:
Whither Software? 89-90
Volume 21, Number 3, May - June 2023
- Trent Jaeger
:
On Bridges and Software. 4-5 - Trent Jaeger
, Brent ByungHoon Kang
, Nele Mentens
, Cynthia Sturton
:
Impact of Emerging Hardware on Security and Privacy. 6-7 - Soyeon Park
, Sangho Lee
, Taesoo Kim
:
Memory Protection Keys: Facts, Key Extension Perspectives, and Discussions. 8-15 - Vikram Narayanan
, Anton Burtsev
:
The Opportunities and Limitations of Extended Page Table Switching for Fine-Grained Isolation. 16-26 - Andres Meza
, Francesco Restuccia
, Jason Oberg
, Dominic Rizzo
, Ryan Kastner
:
Security Verification of the OpenTitan Hardware Root of Trust. 27-36 - Marc Lacoste
, Vincent Lefebvre
:
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats. 37-46 - Adam Brian Turner
, Stephen McCombie
, Allon J. Uhlmann
:
Ransomware-Bitcoin Threat Intelligence Sharing Using Structured Threat Information Expression. 47-57 - Kacper T. Gradon
:
Electric Sheep on the Pastures of Disinformation and Targeted Phishing Campaigns: The Security Implications of ChatGPT. 58-61 - Paul C. van Oorschot
:
Memory Errors and Memory Safety: A Look at Java and Rust. 62-68
Volume 21, Number 4, July - August 2023
- Sean Peisert
:
On Software Infrastructure: Develop, Prove, Profit? 4-8 - Gabriela F. Ciocarlie
, Jianying Zhou
:
Securing Critical Infrastructure Across Cyber and Physical Dimensions. 9 - Adeen Ayub
, Wooyeon Jo
, Syed Ali Qasim
, Irfan Ahmed
:
How Are Industrial Control Systems Insecure by Design? A Deeper Insight Into Real-World Programmable Logic Controllers. 10-19 - Luis Burbano
, Kunal Garg
, Santiago J. Leudo
, Alvaro A. Cárdenas
, Ricardo G. Sanfelice
:
Online Attack Recovery in Cyberphysical Systems. 20-28 - Rodrigo Roman, Cristina Alcaraz
, Javier López, Kouichi Sakurai
:
Current Perspectives on Securing Critical Infrastructures' Supply Chains. 29-38 - Constantine Doumanidis
, Yongyu Xie
, Prashant Hari Narayan Rajput
, Ryan Pickren
, Burak Sahin
, Saman A. Zonouz
, Michail Maniatakos
:
Dissecting the Industrial Control Systems Software Supply Chain. 39-50 - Aditya P. Mathur
:
Reconfigurable Digital Twin to Support Research, Education, and Training in the Defense of Critical Infrastructure. 51-60 - Martin Strohmeier
, Mauro Leonardi
, Sergei Markochev, Fabio Ricciato
, Matthias Schäfer, Vincent Lenders
:
In Pursuit of Aviation Cybersecurity: Experiences and Lessons From a Competitive Approach. 61-73 - Khaled Sarieddine
, Mohammad Ali Sayed
, Danial Jafarigiv
, Ribal Atallah, Mourad Debbabi
, Chadi Assi
:
A Real-Time Cosimulation Testbed for Electric Vehicle Charging and Smart Grid Security. 74-83 - David M. Nicol
, Gregory Shannon
, Monika Akbar
, Matt Bishop
, Michael M. Chaney, Matthew E. Luallen:
Toward Common Weakness Enumerations in Industrial Control Systems. 84-93 - Nigel P. Smart
:
Computing on Encrypted Data. 94-98 - Steven M. Bellovin
:
Is Cybersecurity Liability a Liability? 99-100
Volume 21, Number 5, September - October 2023
- Tadayoshi Kohno
:
In Your Eyes. 4-5 - Jingwei Wu, Wanxi Mao, Yuxin Deng, Jinghong Xu
:
Child Safety and Data Privacy in Smart Homes With Speakers: Comparison of Privacy Policies in the United States and China. 6-17 - Abdul Majeed
, Seong Oun Hwang
:
Rectification of Syntactic and Semantic Privacy Mechanisms. 18-32 - Priyanka Nanayakkara
, Jessica Hullman
:
What's Driving Conflicts Around Differential Privacy for the U.S. Census. 33-42 - Sebastian Obermeier
, Thomas Jösler
, Stephan Renggli
, Maurus Unternährer
, Bernhard M. Hämmerli
:
Automating Recovery in Mixed Operation Technology/IT Critical Infrastructures. 43-54 - Eric Ruzomberka
, David J. Love
, Christopher G. Brinton
, Arpit Gupta, Chih-Chun Wang
, H. Vincent Poor
:
Challenges and Opportunities for Beyond-5G Wireless Security. 55-66 - Padmanabhan Krishnan
, Cristina Cifuentes, Li Li
, Tegawendé F. Bissyandé
, Jacques Klein
:
Why Is Static Application Security Testing Hard to Learn? 68-72 - Daniel Arp
, Erwin Quiring
, Feargus Pendlebury
, Alexander Warnecke
, Fabio Pierazzi
, Christian Wressnegger
, Lorenzo Cavallaro
, Konrad Rieck
:
Lessons Learned on Machine Learning for Computer Security. 72-77 - Frank Piessens
:
Transient Execution Attacks. 79-84 - Konstantinos Adamos
, Fabio Di Franco
, Athanasios Vasileios Grammatopoulos
:
An Analysis of European Union Cybersecurity Higher Education Programs Through the Crowd-Sourced Database CyberHEAD. 85-94 - Daniel E. Geer
:
Convergence: Ongoing. 95-96
Volume 21, Number 6, November - December 2023
- Mary Ellen Zurko:
Unusable Security for Attackers [From the Editors]. 4-7 - Fabio Massacci
, Laurie A. Williams:
Software Supply Chain Security [Guest Editors' Introduction]. 8-10 - Musard Balliu
, Benoit Baudry
, Sofia Bobadilla
, Mathias Ekstedt
, Martin Monperrus
, Javier Ron Arteaga
, Aman Sharma
, Gabriel Skoglund
, César Soto-Valero
, Martin Wittlinger
:
Challenges of Producing Software Bill of Materials for Java. 12-23 - Ákos Milánkovich
, Katja Tuma
:
Delta Security Certification for Software Supply Chains. 24-33 - Piergiorgio Ladisa
, Serena Elisa Ponta
, Antonino Sabetta
, Matias Martinez
, Olivier Barais
:
Journey to the Center of Software Supply Chain Attacks. 34-49 - Santiago Torres-Arias
, Daniel E. Geer
, John Speed Meyers
:
A Viewpoint on Knowing Software: Bill of Materials Quality When You See It. 50-54 - Marcela S. Melara
, Santiago Torres-Arias
:
A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation? 55-58 - Marcel Fourné
, Dominik Wermke
, Sascha Fahl
, Yasemin Acar
:
A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda. 59-63 - Matthias Eckhart
, Andreas Ekelhart
, David Allison
, Magnus Almgren
, Katharina Ceesay-Seitz
, Helge Janicke
, Simin Nadjm-Tehrani
, Awais Rashid
, Mark Yampolskiy
:
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives. 64-75 - Nusrat Zahan
, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan
, Laurie A. Williams
:
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics. 76-88 - Florian Kerschbaum
, Nils Lukas
:
Privacy-Preserving Machine Learning [Cryptography]. 90-94 - Bruce Schneier:
Trustworthy AI Means Public AI [Last Word]. 95-96

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.