Journal: IEEE Security & Privacy

Volume 17, Issue 6

4 -- 6James Bret Michael. Trustworthiness of Autonomous Machines in Armed Conflict
7 -- 9Omer Tene, Katrine Evans, Bruno Gencarelli, Gabe Maldoff, Gabriela Zanfir-Fortuna. GDPR at Year One: Enter the Designers and Engineers
10 -- 20Nurul Momen, Majid Hatamian, Lothar Fritsch. Did App Privacy Improve After the GDPR?
21 -- 30Jatinder Singh, Jennifer Cobbe. The Security Implications of Data Subject Rights
31 -- 36Ronald Petrlic. The General Data Protection Regulation: From a Data Protection Authority's (Technical) Perspective
37 -- 45Cesare Bartolini, Gabriele Lenzini, Livio Robaldo. The DAta Protection REgulation COmpliance Model
46 -- 53Bülent Yener, Tsvi Gal. Cybersecurity in the Era of Data Science: Examining New Adversarial Models
54 -- 63M. Sadegh Riazi, Bita Darvish Rouani, Farinaz Koushanfar. Deep Learning on Private Data
64 -- 71Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot. How Relevant Is the Turing Test in the Age of Sophisbots?
72 -- 76Scott Ruoti, Kent E. Seamons. Johnny's Journey Toward Usable Secure Email
77 -- 83Alan T. Sherman, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson. The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
84 -- 88Andrew Fasano, Tim Leek, Brendan Dolan-Gavitt, Josh Bundt. The Rode0day to Less-Buggy Programs
89 -- 90Daniel E. Geer, Dale Peterson. Failure as Design

Volume 17, Issue 5

4 -- 6Laurie Williams. Science Leaves Clues
7 -- 9Paul C. van Oorschot, Sean W. Smith. The Internet of Things: Security Challenges
10 -- 21Junia Valente, Matthew Wynn, Alvaro A. Cárdenas. Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices
22 -- 29Musard Balliu, Iulia Bastys, Andrei Sabelfeld. Securing IoT Apps
30 -- 37Z. Berkay Celik, Patrick D. McDaniel, Gang Tan, Leonardo Babun, A. Selcuk Uluagac. Verifying Internet of Things Safety and Security in Physical Spaces
38 -- 46Grant Hernandez, Farhaan Fowze, Dave Jing Tang, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler. Toward Automated Firmware Analysis in the IoT Era
47 -- 57Hannes Tschofenig, Emmanuel Baccelli. Cyberphysical Security for the Masses: A Survey of the Internet Protocol Suite for Internet of Things Security
58 -- 67Roee Leon, Michael Kiperberg, Anat Anatey Leon Zabag, Amit Resh, Asaf Algawi, Nezer J. Zaidenberg. Hypervisor-Based White Listing of Executables
68 -- 72Markus Jakobsson. The Rising Threat of Launchpad Attacks
74 -- 77Stephan Raaijmakers. Artificial Intelligence for Law Enforcement: Challenges and Opportunities
78 -- 83Igor Linkov, Fabrizio Baiardi, Marie-Valentine Florin, Scott Greer, James H. Lambert, Miriam Pollock, Jean-Marc Rickli, Lada Roslycky, Thomas P. Seager, Heimir Thorisson, Benjamin D. Trump. Applying Resilience to Hybrid Threats
84 -- 89Luk Arbuckle, Felix Ritchie. The Five Safes of Risk-Based Anonymization
90 -- 93Fabio Massacci. Is "Deny Access" a Valid "Fail-Safe Default" Principle for Building Security in Cyberphysical Systems?
96 -- 95Elisa Bertino. It Takes a Village to Secure Cellular Networks

Volume 17, Issue 4

4 -- 6Jeremy Epstein. A Horse's Rump and Cybersecurity
7 -- 8William Enck, Terry Benzel. Selected Papers From the 2018 USENIX Security Symposium
10 -- 17Nolen Scaife, Christian Peeters, Patrick Traynor. More Cowbell: Lessons Learned in Developing the Skim Reaper
18 -- 24Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates 0001, Michael Bailey. Emerging Threats in Internet of Things Voice Services
25 -- 34Gertjan Franken, Tom van Goethem, Wouter Joosen. Exposing Cookie Policy Flaws Through an Extensive Evaluation of Browsers and Their Extensions
35 -- 42Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Michelle L. Mazurek. Applied Digital Threat Modeling: It Works
43 -- 52Moritz Schneider, Sinisa Matetic, Ari Juels, Andrew Miller 0001, Srdjan Capkun. Secure Brokered Delegation Through DelegaTEE
53 -- 61Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels. The Hydra Framework for Principled, Automated Bug Bounties
62 -- 70Chris Culnane, Aleksander Essex, Sarah Jamie Lewis, Olivier Pereira, Vanessa Teague. Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud
71 -- 77Nithya Sambasivan, Nova Ahmed, Amna Batool, Elie Bursztein, Elizabeth Churchill, Laura Sanely Gaytán-Lugo, Tara Matthews, David Nemar, Kurt Thomas, Sunny Consolvo. Toward Gender-Equitable Privacy and Security in South Asia
78 -- 83Erwan Beguin, Solal Besnard, Adrien Cros, Barbara Joannes, Ombeline Leclerc-Istria, Alexa Noel, Nicolas Roels, Faical Taleb, Jean Thongphan, Eric Alata, Vincent Nicomette. Computer-Security-Oriented Escape Room
84 -- 87Pavel Gladyshev. Cybercrime as a Consequence of Unreasonable Expectations
88 -- 93Adam Bates 0001, Wajih Ul Hassan. Can Data Provenance Put an End to the Data Breach?
94 -- 96Nadim Kobeissi. Selfie?s Reflections on Formal Verification for Transport Layer Security 1.3: Largely Opaque
100 -- 99Daniel E. Geer. Ownership

Volume 17, Issue 3

4 -- 6Paul C. van Oorschot. Software Security and Systematizing Knowledge
8 -- 16Susanne Barth, Pieter H. Hartel, Marianne Junger, Lorena Montoya. Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\"
17 -- 27Kalman C. Toth, Alan Anderson-Priddy. Self-Sovereign Digital Identity: A Paradigm Shift for Identity
28 -- 39Dirk van der Linden, Anna Zamansky, Irit Hadar, Barnaby Craggs, Awais Rashid. Buddy's Wearable Is Not Your Buddy: Privacy Implications of Pet Wearables
40 -- 48Joshua Siegel, Sanjay E. Sarma. A Cognitive Protection System for the Internet of Things
49 -- 55Joshua Eric Siegel, Sanjay E. Sarma. Using Open Channels to Trigger the Invited, Unintended Consequences of the Internet of Things
56 -- 65Ankush Singla, Elisa Bertino. How Deep Learning Is Making Information Security More Intelligent
66 -- 76Sara N. Matheu-García, José Luis Hernández Ramos, Antonio F. Skarmeta. Toward a Cybersecurity Certification Framework for the Internet of Things
77 -- 81Andelka M. Phillips. Buying Your Genetic Self Online: Pitfalls and Potential Reforms in DNA Testing
82 -- 88Alan T. Sherman, Peter A. H. Peterson, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess. Project-Based Learning Inspires Cybersecurity Students: A Scholarship-for-Service Research Study
90 -- 93Ron Herardian. The Soft Underbelly of Cloud Security
96 -- 95Steven M. Bellovin. Layered Insecurity

Volume 17, Issue 2

4 -- 7Sean Peisert. Some Experiences in Developing Security Technology That Actually Get Used
8 -- 16Dimitris M. Kyriazanos, Konstantinos Giorgos Thanos, Stelios C. A. Thomopoulos. Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter Security and Fairness
17 -- 30Martin Abrams, John Abrams, Peter Cullen, Lynn Goldstein. Artificial Intelligence, Ethics, and Enhanced Data Stewardship
31 -- 38Bita Darvish Rouhani, Mohammad Samragh, Tara Javidi, Farinaz Koushanfar. Safe Machine Learning and Defeating Adversarial Attacks
39 -- 48Mohammad S. Jalali, Jessica P. Kaiser, Michael Siegel, Stuart E. Madnick. The Internet of Things Promises New Benefits and Risks: A Systematic Analysis of Adoption Dynamics of IoT Products
49 -- 58Mohammad Al-Rubaie, J. Morris Chang. Privacy-Preserving Machine Learning: Threats and Solutions
59 -- 66Graeme Horsman. A Call for the Prohibition of Encryption: Panacea or Problem?
67 -- 72Yixin Zou, Florian Schaub. Beyond Mandatory: Making Data Breach Notifications Useful for Consumers
73 -- 78Vincent Nestler, Tony Coulson, James D. Ashley III. The NICE Challenge Project: Providing Workforce Experience Before the Workforce
80 -- 79Daniel E. Geer Jr.. Unknowable Unknowns

Volume 17, Issue 1

4 -- 6Phyllis A. Schneck. Cybersecurity Compliance Is Necessary but Not Sufficient: Bad Guys Don't Follow Laws
7 -- 8Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel. Recent Advancements in Digital Forensics, Part 2
10 -- 22Hui Tian 0002, Yuxiang Chen, Hong Jiang 0001, Yongfeng Huang, Fulin Nan, Yonghong Chen. Public Auditing for Trusted Cloud Storage Services
23 -- 33Apostolos Axenopoulos, Volker Eiselein, Antonio Penta, Eugenia Koblents, Ernesto La Mattina, Petros Daras. A Framework for Large-Scale Analysis of Video "in the Wild" to Assist Digital Forensic Examination
34 -- 42Joseph Ricci, Ibrahim M. Baggili, Frank Breitinger. Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?
43 -- 54Rodrigo Carvalho, Michael Goldsmith, Sadie Creese. Investigating Malware Campaigns With Semantic Technologies
55 -- 62Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi. Behavioral-Anomaly Detection in Forensics Analysis
63 -- 71Davide Maiorca, Battista Biggio. Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware
72 -- 77Alan T. Sherman, Farid Javani, Haibin Zhang, Enis Golaszewski. On the Origins and Variations of Blockchain Technologies
78 -- 82Mathias Payer. The Fuzzing Hype-Train: How Random Testing Triggers Thousands of Crashes
84 -- 83Bruce Schneier. Cybersecurity for the Public Interest