Journal: IEEE Security & Privacy

Volume 23, Issue 3

4 -- 6Sean Peisert. Software Development and the Near-Ubiquitous Acceptance of Mystery Meat
7 -- 8Awais Rashid. Cybercrime and Online Harms
10 -- 19Arjun Arunasalam, Z. Berkay Celik. Characterizing E-Commerce Harm by Investigating Online Communities: A Case Study With Abusive Dropshipping
20 -- 30Alyssa Chan, Joseph Hallett, Matthew Edwards 0001. Why Is Johnny Getting Groomed in Roblox?
31 -- 39Alina D. Machande, Laura G. E. Smith, Adam N. Joinson. Trajectories of Piracy and Cyberbullying Across Adolescence
40 -- 50Zubair A. Baig, Sri Harsha Mekala, Adnan Anwar, Naeem Syed, Sherali Zeadally. Digital Forensics and Jurisdictional Challenges for the Industrial Internet of Things
51 -- 54Awais Rashid, Corinne May-Chahal, Claudia Peersman. Weakening End-to-End Encryption Considered Harmful
55 -- 63Jacopo Franceschini, Ayhan Gücüyener Evren, Salih Biçakci. Fault Lines and Bytes: Cybersecurity Challenges Amid Türkiye's February 2023 Earthquakes
64 -- 73Sophie Hawkes, Christian Weinert, Teresa Almeida, Maryam Mehrnezhad. Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools
74 -- 78Hamid Bostani, Veelasha Moonsamy. Beyond Learning Algorithms: The Crucial Role of Data in Robust Malware Detection
79 -- 82Marcel Böhme. How to Solve Cybersecurity Once and For All
83 -- 90Roberto Baldoni. The Artificial Intelligence Paradox: Among Global Power, Errors, and Regulatory Shifts
91 -- 95Kevin R. B. Butler, Kurt Hugenberg, Eakta Jain, Apu Kapadia, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner, Mattea Sim, Patrick Traynor, Hanna Barakat. Extending the Heilmeier Catechism to Evaluate Security and Privacy Systems: Who is Left Out?
96 -- 0Bruce Schneier. The Age of Integrity

Volume 23, Issue 2

4 -- 9Mary Ellen Zurko. Cyber Hard Problems: The Next Generation [From the Editors]
10 -- 12Tamara Lopez, Bashar Nuseibeh, Eric Bodden. Security Requirements and Secure Software Design
14 -- 22Taylor R. Schorlemmer, Ethan H. Burmane, Kelechi G. Kalu, Santiago Torres-Arias, James C. Davis 0001. Establishing Provenance Before Coding: Traditional and Next-Generation Software Signing
23 -- 31Pavel Chuprikov, Patrick Eugster, Shamiek Mangipudi. Security Policy as Code
32 -- 41Avi Shaked, Tom Melham. Contextualizing Formal Verification for Systems Security Engineering
42 -- 51Manuel Maarek, Daisy Abbott, Olga Chatzifoti, Ryan Shah, Sheung Chi Chan, Hans-Wolfgang Loidl, Robert J. Stewart 0001, Jamie Iona Ferguson, Sandy Louchart, Shenando Stals, Lynne Baillie. Empower New Code Citizens to Reflect and Communicate on Code Security
52 -- 60Harun Oz, Daniele Cono D'Elia, Güliz Seray Tuncay, Abbas Acar, Riccardo Lazzeretti, Arif Selcuk Uluagac. With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces
61 -- 70Shunsuke Sato, Ryoichi Shinkuma, Kensei Hirai, Masataka Nakahara, Norihiro Okui, Ayumu Kubota, Yasuaki Kobayashi, Keizo Sugiyama, Takayuki Nishio. Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack
71 -- 80Corey M. Hartman, Bhaskar prasad Rimal, Daniel Conte de Leon, Nirmal Budhathoki. Cross-Architecture Binary Function Fingerprinting
81 -- 88Liliana Pasquale, Antonino Sabetta, Marcelo d'Amorim, Péter Hegedüs, Mehdi Tarrit Mirakhorli, Hamed Okhravi, Mathias Payer, Awais Rashid, Joanna C. S. Santos, Jonathan M. Spring, Lin Tan 0001, Katja Tuma. Challenges to Using Large Language Models in Code Generation and Repair
89 -- 94Abdul Majeed 0001, Seong Oun Hwang. The Dual Role of Machine Learning in Data Anonymization: Top 10 Benefits and Risks
95 -- 100Jessica McClearn, Reem Talhouk, Rikke Bjerg Jensen. The Everyday Security of Living With Conflict
101 -- 106Hamed Okhravi, Nathan Burow, Fred B. Schneider. Software Bill of Materials as a Proactive Defense
107 -- 108Jonathan M. Spring. Secure by Design for Everyone

Volume 23, Issue 1

4 -- 6Fabio Massacci. Exploding Pagers and the Birth of State Cyberterrorism
8 -- 16David D. Clark, Simson L. Garfinkel, kc claffy. Differential Privacy, Firm-Level Data, and the Binomial Pathology
17 -- 26Giuseppe Cascavilla. The Rise of Cybercrime and Cyber-Threat Intelligence: Perspectives and Challenges From Law Enforcement
27 -- 37Rachel McAmis, F. Betül Durak, Melissa Erin Chase, Kim Laine, Franziska Roesner, Tadayoshi Kohno. Handling Identity and Fraud in the Metaverse
38 -- 46Sean Oesch, Phillipe Austria, Amul Chaulagain, Brian Weber, Cory L. Watson, Matthew Dixson, Amir Sadovnik. The Path to Autonomous Cyberdefense
47 -- 52Dominik Schneider, Jannik Zeitschner, Michael Kloos, Kerstin Lemke-Rust, Luigi Lo Iacono. Developers: Beware of Timing Side-Channels
53 -- 63Pranet Sharma, Zhenpeng Shi, Sevval Simsek, David Starobinski, David Sastre Medina. Understanding Similarities and Differences Between Software Composition Analysis Tools
64 -- 74Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan 0001, Xing Gao 0001, Murat Kantarcioglu, Congmiao Li, Peng Liu 0005, Quanyan Zhu. Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions
76 -- 78Tamara Lopez. Securing Code: A View on the Cultural Aspects of Resilience
80 -- 82Alice Hutchings. Police Behaving Badly
83 -- 90Cristina Alcaraz, Javier López 0001. Digital Twin Security: A Perspective on Efforts From Standardization Bodies
91 -- 96Roberto Baldoni, Giuseppe Antonio Di Luna. Sovereignty in the Digital Era: The Quest for Continuous Access to Dependable Technological Capabilities
98 -- 100Daniel E. Geer. Data