Journal: IEEE Security & Privacy

Volume 15, Issue 6

7 -- 9Gary McGraw. Silver Bullet Talks with Nicole Perlroth
10 -- 11Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel. Recent Advancements in Digital Forensics
12 -- 17Luca Caviglione, Steffen Wendzel, Wojciech Mazurczyk. The Future of Digital Forensics: Challenges and the Road Ahead
18 -- 24Irfan Ahmed, Sebastian Obermeier, Sneha Sudhakaran, Vassil Roussev. Programmable Logic Controller Forensics
25 -- 32Piotr Bazydlo, Krzysztof Lasota, Adam Kozakiewicz. Botnet Fingerprinting: Anomaly Detection in SMTP Conversations
33 -- 41Amarnath Gupta, Subhasis Dasgupta, Aditya Bagchi. PROFORMA: Proactive Forensics with Message Analytics
42 -- 51Maxim Chernyshev, Sherali Zeadally, Zubair A. Baig, Andrew Woodward. Mobile Forensics: Advances, Challenges, and Research Opportunities
52 -- 60Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik. An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks
61 -- 67Nir Drucker, Shay Gueron, Benny Pinkas. Faster Secure Cloud Computations with a Trusted Proxy
68 -- 72Fariborz Farahmand. Decision and Experienced Utility: Computational Applications in Privacy Decision Making
73 -- 76Richard Chow. The Last Mile for IoT Privacy
77 -- 81William H. Hawkins, Jason D. Hiser, Anh Nguyen-Tuong, Michele Co, Jack W. Davidson. Securing Binary Code
82 -- 87Jan Peter van Zandwijk, Aya Fukami. NAND Flash Memory Forensic Analysis and the Growing Challenge of Bit Errors
88 -- 0Steven M. Bellovin. Who Are You?

Volume 15, Issue 5

7 -- 9Gary McGraw. Silver Bullet Talks with Ksenia Dmitrieva-Peguero
10 -- 12Jean-Pierre Hubaux, Stefan Katzenbeisser 0001, Bradley Malin. Genomic Data Privacy and Security: Where We Stand and Where We Are Heading
14 -- 19Sara Renee Savage. Characterizing the Risks and Harms of Linking Genomic Information to Individuals
20 -- 28Marina Blanton, Fattaneh Bayatbabolghani. Improving the Security and Efficiency of Private Genomic Computation Using Server Aid
29 -- 37Erman Ayday, Mathias Humbert. Inference Attacks against Kin Genomic Privacy
38 -- 46Tatiana Bradley, Xuhua Ding, Gene Tsudik. Genomic Security (Lest We Forget)
47 -- 54Adenekan Dedeke. Cybersecurity Framework Adoption: Using Capability Levels for Implementation Tiers and Profiles
55 -- 64Robert W. Reeder, Iulia Ion, Sunny Consolvo. 152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users
65 -- 74Alexander Kott, Jackson Ludwig, Mona Lange. Assessing Mission Impact of Cyberattacks: Toward a Model-Driven Paradigm
76 -- 81Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, Sunny Consolvo. Security and Privacy Experiences and Practices of Survivors of Intimate Partner Abuse
82 -- 84Rolf Oppliger. Disillusioning Alice and Bob
85 -- 89Patrick Traynor, Kevin R. B. Butler, Jasmine Bowers, Bradley Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services
90 -- 93David OReilly. Availability of Required Data to Support Criminal Investigations Involving Large-Scale IP Address-Sharing Technologies
94 -- 95Sean Peisert, Von Welch. The Open Science Cyber Risk Profile: The Rosetta Stone for Open Science and Cybersecurity
96 -- 0Bruce Schneier. IoT Security: What's Plan B?

Volume 15, Issue 4

7 -- 10Gary McGraw. Silver Bullet Talks with Kelly Lum
12 -- 13Johannes Buchmann, Kristin E. Lauter, Michele Mosca. Postquantum Cryptography - State of the Art
14 -- 21John Mulholland, Michele Mosca, Johannes Braun. The Day the Cryptography Dies
22 -- 27Kristin E. Lauter. Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs
28 -- 36Jintai Ding, Albrecht Petzoldt. Current State of Multivariate Cryptography
37 -- 43Denis Butin. Hash-Based Signatures: State of Play
44 -- 50Nicolas Sendrier. Code-Based Cryptography: State of the Art and Perspectives
51 -- 57Lidong Chen. Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?
58 -- 61Ahmad-Reza Sadeghi, Shaza Zeitouni. ACM CCS 2016 Interview, Part 3
62 -- 67Bart P. Knijnenburg. Privacy? I Can't Even! Making a Case for User-Tailored Privacy
68 -- 71Bryan Reinicke, Jeff W. Cummings, Howard Kleinberg. The Right to Digital Self-Defense
72 -- 78Alan T. Sherman, Melissa Dark, Agnes Chan, Rylan Chong, Thomas Morris, Linda Oliva, John Springer, Bhavani M. Thuraisingham, Christopher Vatcher, Rakesh M. Verma, Susanne Wetzel. INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research
79 -- 84Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash. Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
85 -- 87Archer L. Batcheller, Summer Craze Fowler, Robert K. Cunningham, Dinara Doyle, Trent Jaeger, Ulf Lindqvist. Building on the Success of Building Security In
88 -- 0Daniel E. Geer. Attribution

Volume 15, Issue 3

6 -- 9Gary McGraw. Silver Bullet Talks with Kate Pearce
12 -- 13Josh Benaloh, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague. A Vote of Confidence?
14 -- 23Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang. An Efficient E2E Verifiable E-voting System without Setup Assumptions
24 -- 29Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer. Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?
30 -- 38Aleksander Essex. Detecting the Detectable: Unintended Consequences of Cryptographic Election Verification
40 -- 47Jeroen van de Graaf. Long-Term Threats to Ballot Privacy
48 -- 50Ronald L. Rivest, Philip B. Stark. When Is an Election Verifiable?
52 -- 58Aanjhan Ranganathan, Srdjan Capkun. Are We Really Close? Verifying Proximity in Wireless Systems
60 -- 69Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift. Rethinking Security in the Era of Cloud Computing
70 -- 76Ahmad-Reza Sadeghi, Shaza Zeitouni. ACM CCS 2016 Interviews, Part 2
78 -- 83Chetan Gupta. The Market's Law of Privacy: Case Studies in Privacy and Security Adoption
84 -- 87Sai Teja Peddinti, Keith W. Ross, Justin Cappos. User Anonymity on Twitter
90 -- 95Richard Weiss, Franklyn Turbak, Jens Mache, Michael E. Locasto. Cybersecurity Education and Assessment in EDURange
96 -- 0Steven M. Bellovin. Jurisdiction and the Internet

Volume 15, Issue 2

5 -- 6Jeremy Epstein. Privacy is Context Dependent
8 -- 10Gary McGraw. Silver Bullet Talks with Lesley Carhart
11 -- 13Terry Benzel. Selected Papers from the 2016 IEEE Symposium on Security and Privacy
14 -- 23Lucas Silva Figueiredo, David Molnar, Margus Veanes, Benjamin Livshits. Prepose: Privacy, Security, and Reliability for Gesture-Based Programming
24 -- 30Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash. Security Implications of Permission Models in Smart-Home Application Frameworks
32 -- 41Sashank Narain, Triet D. Vo-Huu, Kenneth Block, Guevara Noubir. The Perils of User Tracking Using Zero-Permission Mobile Apps
42 -- 49Xiaolong Bai, Luyi Xing, Nan Zhang, Xiaofeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu. Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos
50 -- 60Yasemin Acar, Michael Backes 0001, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky. How Internet Resources Might Be Helping You Develop Faster but Less Securely
62 -- 69Matthew Tischer, Zakir Durumeric, Elie Bursztein, Michael Bailey. The Danger of USB Drives
70 -- 77Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis. Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains
78 -- 86Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad P. A. van Moorsel. Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?
88 -- 91Ahmad-Reza Sadeghi, Shaza Zeitouni. ACM CCS 2016 Interviews, Part 1
92 -- 95Siona Listokin. Does Industry Self-Regulation of Consumer Data Privacy Work?
96 -- 100Marc Dacier, Hartmut König, Radoslaw Cwalinski, Frank Kargl, Sven Dietrich. Security Challenges and Opportunities of Software-Defined Networking
102 -- 106Joshua I. James. How Businesses Can Speed Up International Cybercrime Investigation
108 -- 0Bruce Schneier. The Internet of Things Will Upend Our Industry

Volume 15, Issue 1

3 -- 4Ahmad-Reza Sadeghi. Security and Privacy More Crucial than Ever
8 -- 11Gary McGraw. Silver Bullet Talks with Marie Moe
12 -- 20Jacob Bellatti, Andrew Brunner, Joseph Lewis, Prasad Annadata, Wisam Eltarjaman, Rinku Dewri, Ramakrishna Thurimella. Driving Habits Data: Location Privacy Implications and Solutions
22 -- 31Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino. Overview of Mobile Containerization Approaches and Open Research Directions
32 -- 40Pawel Lubomski, Henryk Krawczyk. Practical Evaluation of Internet Systems' Security Mechanisms
42 -- 51Manjur S. Kolhar, Mosleh M. Abu-Alhaj, Saied M. Abd El-atty. Cloud Data Auditing Techniques with a Focus on Privacy and Security
52 -- 57Ezhil Kalaimannan, Jatinder N. D. Gupta. The Security Development Lifecycle in the Context of Accreditation Policies and Standards
58 -- 65Hossein Homaei, Hamid Reza Shahriari. Seven Years of Software Vulnerabilities: The Ebb and Flow
66 -- 74Ahmad-Reza Sadeghi, Ghada Dessouky. Security & Privacy Week Interviews, Part 3
75 -- 79Franziska Roesner. Designing Application Permission Models that Meet User Expectations
80 -- 85Nir Kshetri. An Opinion on the "Report on Securing and Growing the Digital Economy"
87 -- 88Daniel E. Geer, Richard Danzig. Mutual Dependence Demands Mutual Sharing