Journal: IEEE Security & Privacy

Volume 22, Issue 6

4 -- 8Sean Peisert. Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity
9 -- 10Feng Hao 0001. Real-World Security Protocols
12 -- 18Martin R. Albrecht, Kenneth G. Paterson. Analyzing Cryptography in the Wild: A Retrospective
19 -- 29Konstantin Fischer, Ivana Trummová, Phillip Gajland, Yasemin Acar, Sascha Fahl, M. Angela Sasse. Adoption Challenges for Cryptographic Protocols
30 -- 39Diana A. Vasile, Fahim Kawsar, Chulhong Min. Emerging Paradigms in Wearable Security: Adaptable and Secure Sandboxing for On-the-Fly Collaboration Among Wearables
40 -- 49Güliz Seray Tuncay. Android Permissions: Evolution, Attacks, and Best Practices
50 -- 61Andrea Bisegna, Matteo Bitussi, Roberto Carbone, Silvio Ranise. Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool
62 -- 74Syed Rafiul Hussain, Patrick D. McDaniel, Anshul Gandhi, Kanad Ghose, Kartik Gopalan, Dongyoon Lee, Yu David Liu, Zhenhua Liu 0002, Shuai Mu, Erez Zadok. Verifiable Sustainability in Data Centers
75 -- 84Timothy J. Pierson, Cesar Arguello, Beatrice Perez, Wondimu Zegeye, Kevin T. Kornegay, Carl A. Gunter, David Kotz. We Need a "Building Inspector for IoT" When Smart Homes Are Sold
85 -- 88Chelsea Komlo. Threshold Signatures
89 -- 98James Crabb, Clemente Izurieta, Bernard Vanwie, Olusola O. Adesope, Assefaw Hadish Gebremedhin. Cybersecurity Education: Insights From a Novel Cybersecurity Summer Workshop
99 -- 104Margaret Cunningham, Calvin Nobles, Nikki Robinson, Julie M. Haney. Leveraging the Human Factors Discipline for Better Cybersecurity Outcomes: A Roundtable Discussion

Volume 22, Issue 5

4 -- 7Trent Jaeger. Has Access Control Become the Weak Link?
10 -- 12Apu Kapadia, Yang Wang 0005. Inclusive Privacy and Security
13 -- 22Filipo Sharevski. Inclusive Involvement of At-Risk Users in Cybersecurity Research
23 -- 31Partha Das Chowdhury, Karen Renaud. Advocating a Policy Push Toward Inclusive and Secure "Digital-First" Societies
32 -- 39Kopo M. Ramokapane, Maria Sameen, Zaina Dkaidek. Inclusive Internet of Things Privacy Labels
40 -- 51Chen Zhong, J. B. (Joo Baek) Kim, Hong Liu 0022. The Art of Inclusive Gamification in Cybersecurity Training
52 -- 62Jinkyung Katie Park, Mamtaj Akter, Pamela J. Wisniewski, Karla Badillo-Urquiola. It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience
63 -- 72João Janeiro, Sérgio Alves, Tiago João Guerreiro 0001, Florian Alt, Verena Distler. Understanding Phishing Experiences of Screen Reader Users
73 -- 81Roberto Natella, Pietro Liguori, Cristina Improta, Bojan Cukic, Domenico Cotroneo. AI Code Generators for Security: Friend or Foe?
82 -- 86Liliana Pasquale, Kushal Ramkumar, Wanling Cai, John McCarthy 0002, Gavin Doherty, Bashar Nuseibeh. The Rocky Road to Sustainable Security
88 -- 95Zaina Dkaidek, Awais Rashid. Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study
96 -- 102Kenneth G. Crowther. Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things

Volume 22, Issue 4

4 -- 6Jianying Zhou 0001. The Need of Testbeds for Cyberphysical System Security
7 -- 12Tadayoshi Kohno. The Task Piper
13 -- 15Hamed Okhravi. Memory Safety
18 -- 21Dan S. Wallach, Bob Lord. A Viewpoint: A Memory Safety Manifesto
22 -- 29Per Larsen. Migrating C to Rust for Memory Safety
30 -- 39Santosh Nagarakatte. Full Spatial and Temporal Memory Safety for C
40 -- 49Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger. Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety
50 -- 61Robert N. M. Watson, David Chisnall, Jessica Clarke 0001, Brooks Davis, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore, Peter G. Neumann, Alexander Richardson, Peter Sewell, Konrad Witaszczyk, Jonathan Woodruff. CHERI: Hardware-Enabled C/C++ Memory Protection at Scale
62 -- 65William K. Robertson, Manuel Egele. A Viewpoint: Safer Heaps With Practical Architectural Security Primitives
66 -- 75André Rösti, Alexios Voulimeneas, Michael Franz. The Astonishing Evolution of Probabilistic Memory Safety: From Basic Heap-Data Attack Detection Toward Fully Survivable Multivariant Execution
76 -- 86Mohamadreza Rostami, Chen Chen, Rahul Kande, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi. Fuzzerfly Effect: Hardware Fuzzing for Memory Safety
87 -- 96Tobias Cloosters, Oussama Draissi, Johannes Willbold, Thorsten Holz, Lucas Davi. Memory Corruption at the Border of Trusted Execution
97 -- 100Hans Liljestrand, Jan-Erik Ekberg. A Viewpoint: Harmonizing the Diverse Memory Safety Fronts
101 -- 102Daniel Moreira, Sébastien Marcel, Anderson Rocha 0001. Synthetic Realities and Artificial Intelligence-Generated Contents
103 -- 114Zander W. Blasingame, Chen Liu 0001. Fast-DiM: Towards Fast Diffusion Morphs
115 -- 122Prakash L. Kharvi. Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
124 -- 128Francis Kofi Andoh-Baidoo, Martin Otu Offei, Emmanuel W. Ayaburi, Mikko T. Siponen, Pavel Gladyshev. How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates
130 -- 132Roberto Baldoni. Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments?
135 -- 136Daniel E. Geer. What I've Learned

Volume 22, Issue 3

4 -- 6Nele Mentens. Hardware Security in the Era of Emerging Device and System Technologies
7 -- 10Daniel Moreira, Sébastien Marcel, Anderson Rocha 0001. Synthetic Realities and Artificial Intelligence-Generated Contents
12 -- 23Yeali S. Sun, Zhi-Kang Chen, Yi-Ting Huang, Meng Chang Chen. Unleashing Malware Analysis and Understanding With Generative AI
24 -- 36Javier Pastor-Galindo, Pantaleone Nespoli, José A. Ruipérez Valiente. Large-Language-Model-Powered Agent-Based Framework for Misinformation and Disinformation Research: Opportunities and Open Challenges
37 -- 49Diangarti Tariang, Riccardo Corvi, Davide Cozzolino, Giovanni Poggi, Koki Nagano, Luisa Verdoliva. Synthetic Image Verification in the Era of Generative Artificial Intelligence: What Works and What Isn't There yet
50 -- 61Can Yavuz. A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle
62 -- 67Emiliano De Cristofaro. Synthetic Data: Methods, Use Cases, and Risks
68 -- 76Meike Ramon, Matthew J. Vowels, Matthew Groh. Deepfake Detection in Super-Recognizers and Police Officers
77 -- 86Luca Maiano, Alexandra Benova, Lorenzo Papa, Mara Stockner, Michela Marchetti, Gianmarco Convertino, Giuliana Mazzoni, Irene Amerini. Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images
88 -- 0Steven M. Bellovin. Degenerative AI?

Volume 22, Issue 2

4 -- 7Laurie A. Williams. Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough
8 -- 16Samuel Aiello, Bhaskar prasad Rimal. Secure Access Service Edge Convergence: Recent Progress and Open Issues
17 -- 28Vaughn Hamilton, Gabriel Kaptchuk, Allison McDonald, Elissa M. Redmiles. Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda
29 -- 37Gregory Lyon. Trust in Data Security Protocols and Knowledge of Privacy and Security Technology
38 -- 48Winnie Mbaka, Katja Tuma. Role of Gender in the Evaluation of Security Decisions
49 -- 59Antonino Sabetta, Serena Elisa Ponta, Rocío Cabrera Lozoya, Michele Bezzi, Tommaso Sacchetti, Matteo Greco, Gergö Balogh, Péter Hegedüs, Rudolf Ferenc, Ranindya Paramitha, Ivan Pashchenko, Aurora Papotti, Ákos Milánkovich, Fabio Massacci. Known Vulnerabilities of Open Source Projects: Where Are the Fixes?
60 -- 68Michele Bezzi. Large Language Models and Security
69 -- 74Matilda Backendal, Miro Haller, Kenny Paterson. End-to-End Encrypted Cloud Storage
75 -- 80Frank Piessens, Paul C. van Oorschot. Side-Channel Attacks: A Short Tour
81 -- 84Alice Hutchings. The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression
86 -- 92Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-Robert Ulbricht, Isabel Wagner, Kim Wuyts, Christian Zimmermann 0002. Privacy Engineering From Principles to Practice: A Roadmap
94 -- 96Helen Nissenbaum. AI Safety: A Poisoned Chalice?

Volume 22, Issue 1

4 -- 6Fabio Massacci. The Holy Grail of Vulnerability Predictions
7 -- 9Franziska Roesner, Tadayoshi Kohno. Security and Privacy in the Metaverse
10 -- 23Derin Cayir, Abbas Acar, Riccardo Lazzeretti, Marco Angelini, Mauro Conti, A. Selcuk Uluagac. Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices
24 -- 32Vivek Nair, Louis B. Rosenberg, James F. O'Brien, Dawn Song. Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data
33 -- 42Matthew Corbett, Brendan David-John, Jiacheng Shang, Y. Charlie Hu, Bo Ji 0001. Securing Bystander Privacy in Mixed Reality While Protecting the User Experience
43 -- 52Abraham H. Mhaidli, Shwetha Rajaram, Selin Fidan, Gina Herakovic, Florian Schaub. Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences
53 -- 62Karoline Brehm, Yan Shvartzshnaider. Understanding Privacy in Virtual Reality Classrooms: A Contextual Integrity Perspective
64 -- 68Joseph O'Hagan, Jan Gugenheimer, Florian Mathis, Jolie Bonner, Richard Jones, Mark McGill. A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights
69 -- 72Eric Bodden, Jens Pottebaum, Markus Fockel, Iris Gräßler. Evaluating Security Through Isolation and Defense in Depth
76 -- 75Elissa M. Redmiles. Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening