


Остановите войну!
for scientists:


default search action
IEEE Security & Privacy, Volume 20
Volume 20, Number 1, January - February 2022
- Sean Peisert
:
Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation. 4-9 - Luca Caviglione, Steffen Wendzel, Simon Vrhovec
, Aleksandra Mileva:
Security and Privacy Issues of Home Globalization. 10-11 - Yashothara Shanmugarasa, Hye-young Paik, Salil S. Kanhere, Liming Zhu:
Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores. 12-22 - Ruben Rios, Jose Antonio Onieva, Rodrigo Roman, Javier López:
Personal IoT Privacy Control at the Edge. 23-32 - Luca Ardito, Luca Barbato, Paolo Mori, Andrea Saracino:
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project. 33-44 - Daniele Bringhenti
, Fulvio Valenza
, Cataldo Basile
:
Toward Cybersecurity Personalization in Smart Homes. 45-53 - Ying Li
, Tong Xin
, Mikko T. Siponen:
Citizens' Cybersecurity Behavior: Some Major Challenges. 54-61 - Anze Mihelic
, Bostjan Zvanut
:
(In)secure Smart Device Use Among Senior Citizens. 62-71 - Joseph Bugeja
, Andreas Jacobsson, Paul Davidsson:
The Ethical Smart Home: Perspectives and Guidelines. 72-80 - Florian Alt, Stefan Schneegass:
Beyond Passwords - Challenges and Opportunities of Future Authentication. 82-86 - Lata Nautiyal
, Awais Rashid, Joseph Hallett, Ben Shreeve, Michael K, Chris Ensor, Catherine H, Jelena Mirkovic, Blair Taylor:
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study. 87-95 - Veronica Schmitt, Pavel Gladyshev, Joshua James:
Medical Device Forensics. 96-100 - Paul C. van Oorschot:
A View of Security as 20 Subject Areas in Four Themes. 102-108 - Adam Shostack, Fabio Massacci, Eric Bodden, Antonino Sabetta:
25 Years in Application Security: Looking Back, Looking Forward. 109-112 - Adam Kardash, Suzanne Morin, Khaled El Emam:
The Practices and Challenges of Generating Nonidentifiable Data. 113-118 - Bruce Schneier:
Robot Hacking Games. 119-120
Volume 20, Number 2, March - April 2022
- Fabio Massacci:
Pseudo Ground-Truth Generators and Large-Scale Studies. 4-7 - Terry Benzel, Thorsten Holz:
Selected Papers From the 2021 IEEE Symposium on Security and Privacy. 8-9 - Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. 10-21 - Chen Ling
, Gianluca Stringhini, Utkucan Balci, Jeremy Blackburn:
A First Look at Zoombombing. 22-30 - Pardis Emami Naeini
, Janarth Dheenadhayalan, Yuvraj Agarwal, Lorrie Faith Cranor
:
An Informative Security and Privacy "Nutrition" Label for Internet of Things Devices. 31-39 - Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas:
Defensive Technology Use During the 2018-2019 Sudanese Revolution. 40-48 - Nicolas Huaman
, Sabrina Amft, Marten Oltrogge, Yasemin Acar, Sascha Fahl:
They Would Do Better If They Worked Together: Interaction Problems Between Password Managers and the Web. 49-60 - Neal Mangaokar, Atul Prakash
:
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection. 61-67 - Daniel W. Woods, Rainer Böhme:
Incident Response as a Lawyers' Service. 68-74 - Felix Fischer, Jens Grossklags:
Nudging Software Developers Toward Secure Code. 76-79 - Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, Paul Zimmermann:
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography. 80-86 - Elisa R. Heymann, Barton P. Miller:
Software Security for the People: Free and Open Resources for Software Security Training. 88-95 - William Enck, Laurie A. Williams:
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations. 96-100 - Fabio Massacci, Silvia Vidor:
Building Principles for Lawful Cyber Lethal Autonomous Weapons. 101-106 - Steven M. Bellovin:
Open Source and Trust. 107-108
Volume 20, Number 3, May - June 2022
- Mary Ellen Zurko:
Disinformation and Reflections From Usable Security. 4-7 - Tadayoshi Kohno:
Excerpts From the New Dictionary of Cybersecurity, 2036. 8 - Tadayoshi Kohno:
Mx. President Has a Brain. 9-11 - Bob Blakley, Lorrie Faith Cranor:
High Assurance in the Twenty-First Century With Roger Schell. 12-21 - William Martin, Patrick Lincoln, William L. Scherlis:
Formal Methods at Scale. 22-23 - David A. Basin, Cas Cremers
, Jannik Dreier, Ralf Sasse:
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols. 24-32 - Gregory Malecha, Gordon Stewart, Frantisek Farka, Jasper Haag, Yoichi Hirai
:
Developing With Formal Methods at BedRock Systems, Inc. 33-42 - Calvin Deutschbein
, Andres Meza, Francesco Restuccia, Matthew Gregoire, Ryan Kastner
, Cynthia Sturton
:
Toward Hardware Security Property Generation at Scale. 43-51 - Darren D. Cofer
, Isaac Amundson, Junaid Babar, David S. Hardin, Konrad Slind, Perry Alexander, John Hatcliff, Robby, Gerwin Klein, Corey Lewis, Eric Mercer, John Shackleton:
Cyberassured Systems Engineering at Scale. 52-64 - Mike Dodds
:
Formally Verifying Industry Cryptography. 65-70 - Simone Raponi
, Savio Sciancalepore
, Gabriele Oligeri, Roberto Di Pietro
:
Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures. 71-79 - Florian Skopik
, Max Landauer
, Markus Wurzenberger
:
Online Log Data Analysis With Efficient Machine Learning: A Review. 80-90 - Pietro Tedeschi
, Kang Eun Jeon, James She, Simon Wong
, Spiridon Bakiras
, Roberto Di Pietro
:
Privacy-Preserving and Sustainable Contact Tracing Using Batteryless Bluetooth Low-Energy Beacons. 91-100 - Josiah Dykstra, Jamie Met, Nicole Backert, Rebecca Mattie, Douglas Hough:
Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response: An Argument for More Measured Incident Response. 102-106 - Elisa Bertino:
The Persistent Problem of Software Insecurity. 107-108
Volume 20, Number 4, July - August 2022
- Tadayoshi Kohno, Camille Cobb, Ada Lerner, Michelle Lin, Adam Shostack:
The Buffet Overflow Café. 4-7 - WooChul Shim
, Hyejin Shin
, Yong Ho Hwang:
On Data Licenses for Open Source Threat Intelligence. 8-22 - Galina S. Rusman
, Yulia A. Morozova:
Measures to Ensure Cybersecurity of Industrial Enterprises: A Legal Perspective. 23-28 - Zhenpeng Shi
, Kalman Graffi, David Starobinski
, Nikolay Matyunin:
Threat Modeling Tools: A Taxonomy. 29-39 - Edy Kristianto, Van-Linh Nguyen
, Po-Ching Lin:
Decentralized Public-Key Infrastructure With Blockchain in V2X Communications: Promising or Only Euphoria? 40-50 - Arslan Munir, Erik Blasch, Alexander J. Aved
, E. Paul Ratazzi, Joonho Kong:
Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques. 51-60 - Jan Huck, Frank Breitinger
:
Wake Up Digital Forensics' Community and Help Combat Ransomware. 61-70 - Daniel E. Geer:
Identity. 71-72
Volume 20, Number 5, September - October 2022
- James Bret Michael
:
Taking a Measured Approach to Investing in Information Infrastructure for Attaining Leading-Edge Trustworthy Artificial Intelligence. 4-6 - Laurie A. Williams
:
Trusting Trust: Humans in the Software Supply Chain Loop. 7-10 - Nathalie Baracaldo, Alina Oprea:
Machine Learning Security and Privacy. 11-13 - Tadayoshi Kohno
:
The Schuhmacher. 14-15 - Fabio Massacci
, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E. Geer:
"Free" as in Freedom to Protest? 16-21 - Minsu Cho, Zahra Ghodsi
, Brandon Reagen, Siddharth Garg
, Chinmay Hegde
:
Sphynx: A Deep Neural Network Design for Private Inference. 22-34 - Ehud Aharoni
, Nir Drucker
, Gilad Ezov
, Hayim Shaul
, Omri Soceanu
:
Complex Encoded Tile Tensors: Accelerating Encrypted Analytics. 35-43 - Martin Strobel
, Reza Shokri
:
Data Privacy and Trustworthy Machine Learning. 44-49 - Shaofeng Li
, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Suguo Du
, Haojin Zhu
:
Backdoors Against Natural Language Processing: A Review. 50-59 - Tina Marjanov
, Ivan Pashchenko
, Fabio Massacci
:
Machine Learning for Source Code Vulnerability Detection: What Works and What Isn't There Yet. 60-76 - Luca Demetrio
, Battista Biggio, Fabio Roli:
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware. 77-85 - Dinil Mon Divakaran
, Adam Oest:
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. 86-95 - Ben Hermann
:
What Has Artifact Evaluation Ever Done for Us? 96-99 - Luca Caviglione, Wojciech Mazurczyk:
Never Mind the Malware, Here's the Stegomalware. 101-106 - Bruce Schneier:
NIST's Post-Quantum Cryptography Standards Competition. 107-108
Volume 20, Number 6, November - December 2022
- Tadayoshi Kohno
:
The Our Reality Privacy Policy. 4-7 - Tadayoshi Kohno:
Welcome to the Latest "Off by One" Column. 5 - Charles Weir
, Sammy Migues, Laurie A. Williams
:
Exploring the Shift in Security Responsibility. 8-17 - Florian Skopik
, Max Landauer
, Markus Wurzenberger
:
Blind Spots of Security Monitoring in Enterprise Infrastructures: A Survey. 18-26 - Charles Gouert
, Nektarios Georgios Tsoutsos
:
Dirty Metadata: Understanding A Threat to Online Privacy. 27-34 - Dhiah el Diehn I. Abou-Tair
, Ala' F. Khalifeh
:
Distributed Self-Sovereign-Based Access Control System. 35-42 - Danfeng Daphne Yao
, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose
, Miles Frantz
, Ke Tian
, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller
, Elisa Heymann
, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. 43-52 - Howard D. Grimes, Gabriela F. Ciocarlie
, Bo Yu, Duminda Wijesekera
, Gregory E. Shannon, Wayne Austad
, Charles Fracchia
, Dongyan Xu, Thomas R. Kurfess, Lisa Strama, Michael Mylrea, Bill Reid:
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing. 53-65 - Dustin Moody, Angela Robinson:
Cryptographic Standards in the Post-Quantum Era. 66-72 - Paul C. van Oorschot
:
Security as an Artificial Science, System Administration, and Tools. 74-78 - Cédric Hébert:
Trust Me, I'm a Liar. 79-82 - Steven M. Bellovin:
What Do We Owe? 83-84

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.