Journal: IEEE Security & Privacy

Volume 18, Issue 6

4 -- 5Phyllis A. Schneck. Cybersecurity During COVID-19
6 -- 13Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu. End-to-End Verifiable E-Voting Trial for Polling Station Voting
14 -- 22Chuadhry Mujeeb Ahmed, Jianying Zhou 0001. Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
23 -- 32Rafael Padilha, Caroline Mazini Rodrigues, Fernanda A. Andaló, Gabriel Bertocco, Zanoni Dias, Anderson Rocha 0001. Forensic Event Analysis: From Seemingly Unrelated Data to Understanding
33 -- 41Roy A. Maxion. Reproducibility: Buy Low, Sell High
42 -- 50Qiu-Hong Wang, Steven M. Miller, Robert H. Deng. Driving Cybersecurity Policy Insights From Information on the Internet
51 -- 58Rock Stevens, Josiah Dykstra, Wendy Knox Everette, Michelle L. Mazurek. It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs
59 -- 62Julianna Rodríguez, Benjamin J. Allison, Christopher Apsey, Todd Boudreau. Courseware as Code: Instituting Agile Courseware Collaboration
63 -- 64Steven M. Bellovin. Security, Privacy, and Scale

Volume 18, Issue 5

3 -- 5Paul C. van Oorschot. Blockchains and Stealth Tactics for Teaching Security
6 -- 7Mohammad Mannan, N. Asokan. Confronting the Limitations of Hardware-Assisted Security
8 -- 17Lianying Zhao, David Lie. Is Hardware More Secure Than Software?
18 -- 27Michael Schwarz 0001, Daniel Gruss. How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
28 -- 37Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Frank Piessens, Daniel Gruss. Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble
38 -- 46Kari Kostiainen, Aritra Dhar, Srdjan Capkun. Dedicated Security Chips in the Age of Secure Enclaves
47 -- 56David Kohlbrenner, Shweta Shinde, Dayeol Lee, Krste Asanovic, Dawn Song. Building Open Trusted Execution Environments
57 -- 66Ghada Dessouky, Tommaso Frassetto, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf. With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security
67 -- 73Randy Borum, Ron Sanders. Preparing America's Cyber Intelligence Workforce
74 -- 79Kenneth G. Crowther, Brian Rust. Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company
79 -- 80Bruce Schneier. Hacking the Tax Code

Volume 18, Issue 4

4 -- 7Sean Peisert. Isolating Insecurely: A Call to Arms for the Security and Privacy Community During the Time of COVID-19
8 -- 19Hamed Okhravi, Nathan Burow, Richard Skowyra, Bryan C. Ward, Samuel Jero, Roger Kazan, Howard E. Shrobe. One Giant Leap for Computer Security
20 -- 27Marietheres Dietz, Günther Pernul. Unleashing the Digital Twin's Potential for ICS Security
28 -- 37L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff. Toward a Secure Internet of Things: Directions for Research
38 -- 47Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp. Best Practices Would Make Things Better in the IoT
48 -- 54Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes. IT Security Is From Mars, Software Security Is From Venus
56 -- 59Khaled El Emam. Seven Ways to Evaluate the Utility of Synthetic Data
60 -- 66Dan Shoemaker 0001, Nancy R. Mead, Anne Kohnke. Teaching Secure Acquisition in Higher Education
67 -- 70Eric Osterweil. A Cybersecurity Terminarch: Use It Before We Lose It
72 -- 74Holger Mack, Tom Schroer. Security Midlife Crisis: Building Security in a New World
75 -- 76Daniel E. Geer Jr.. Security Theater, the Beat Goes On

Volume 18, Issue 3

4 -- 5David M. Nicol. In the Petri Dish: Cybersecurity Pushed to the Edge
6 -- 7Terry Benzel, Frank Stajano. IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland's Footsteps
8 -- 16Stefano Calzavara, Mauro Conti, Riccardo Focardi, Alvise Rabitti, Gabriele Tolomei. Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery
17 -- 27Fan Zhang 0022, Warren He, Raymond Cheng 0001, Jernej Kos, Nicholas Hynes 0001, Noah M. Johnson, Ari Juels, Andrew Miller 0001, Dawn Song. The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
28 -- 37Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai. SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution
38 -- 47Yuan Tian 0001, Cormac Herley, Stuart E. Schechter. StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing
48 -- 57Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida. Benchmarking Flaws Undermine Security Research
58 -- 61Kavita M. Berger. Addressing Cyber Threats in Biology
62 -- 66Alexander Kott, Paul Théron. Doers, Not Watchers: Intelligent Autonomous Agents Are a Path to Cyber Resilience
67 -- 68Elisa Bertino. The Quest for Data Transparency

Volume 18, Issue 2

4 -- 6Paul C. van Oorschot. Untangling Security and Privacy
8 -- 15Fariborz Farahmand. Quantitative Issues in Cyberinsurance: Lessons From Behavioral Economics, Counterfactuals, and Causal Inference
16 -- 22Domhnall Carlin, Jonah Burgess, Philip O'Kane, Sakir Sezer. You Could Be Mine(d): The Rise of Cryptojacking
23 -- 34Luca Allodi, Tzouliano Chotza, Ekaterina Panina, Nicola Zannone. The Need for New Antiphishing Measures Against Spear-Phishing Attacks
35 -- 45Boubakr Nour, Kashif Sharif, Fan Li 0001, Yu Wang 0003. Security and Privacy Challenges in Information-Centric Wireless Internet of Things Networks
46 -- 55Markus Jakobsson. Permissions and Privacy
56 -- 60Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf. Trusted Execution Environments: Properties, Applications, and Challenges
61 -- 66Thomas R. Souvignet, Thibaut Heckmann, Timothy Bollé. From Lucky Luke to Lock Bits
68 -- 74Denny Pencheva, Joseph Hallett, Awais Rashid. Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education
76 -- 0Steven M. Bellovin. Policies on Privacy

Volume 18, Issue 1

4 -- 7David M. Nicol. The Value of Useless Academic Research to the Cyberdefense of Critical Infrastructures
8 -- 10Kate Charlet, Heather King. The Future of Cybersecurity Policy
12 -- 20Andrew J. Grotto. Deconstructing Cyber Attribution: A Proposed Framework and Lexicon
21 -- 27Daniel W. Woods, Tyler Moore. Does Insurance Have a Future in Governing Cybersecurity?
28 -- 38José Luis Hernández Ramos, Dimitris Geneiatakis, Ioannis Kounelis, Gary Steri, Igor Nai Fovino. Toward a Data-Driven Society: A Technological Perspective on the Development of Cybersecurity and Data-Protection Policies
39 -- 45Michael Klipstein, Austin Minter, Jeremiah Pittman. Understanding the Information Environment to Win the Next Conflict Without Firing a Shot
46 -- 54Pierantonia Sterlini, Fabio Massacci, Natalia Kadenko, Tobias Fiebig, Michel van Eeten. Governance Challenges for European Cybersecurity Policies: Stakeholder Views
55 -- 60Barry M. Horowitz. Cyberattack-Resilient Cyberphysical Systems
61 -- 64William Stallings. Handling of Personal Information and Deidentified, Aggregated, and Pseudonymized Information Under the California Consumer Privacy Act
65 -- 70James P. Howard II, Maria E. Vachino. Blockchain Compliance With Federal Cryptographic Information-Processing Standards
72 -- 71Bruce Schneier. Technologists vs. Policy Makers