


default search action
IEEE Security & Privacy, Volume 22
Volume 22, Number 1, January - February 2024
- Fabio Massacci

:
The Holy Grail of Vulnerability Predictions. 4-6 - Franziska Roesner

, Tadayoshi Kohno
:
Security and Privacy in the Metaverse. 7-9 - Derin Cayir

, Abbas Acar
, Riccardo Lazzeretti
, Marco Angelini
, Mauro Conti
, A. Selcuk Uluagac
:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. 10-23 - Vivek Nair

, Louis B. Rosenberg
, James F. O'Brien
, Dawn Song
:
Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data. 24-32 - Matthew Corbett

, Brendan David-John
, Jiacheng Shang
, Y. Charlie Hu
, Bo Ji
:
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience. 33-42 - Abraham H. Mhaidli

, Shwetha Rajaram
, Selin Fidan
, Gina Herakovic, Florian Schaub
:
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences. 43-52 - Karoline Brehm

, Yan Shvartzshnaider
:
Understanding Privacy in Virtual Reality Classrooms: A Contextual Integrity Perspective. 53-62 - Joseph O'Hagan

, Jan Gugenheimer
, Florian Mathis
, Jolie Bonner
, Richard Jones, Mark McGill
:
A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights. 64-68 - Eric Bodden

, Jens Pottebaum
, Markus Fockel
, Iris Gräßler
:
Evaluating Security Through Isolation and Defense in Depth. 69-72 - Elissa M. Redmiles

:
Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening. 76-75
Volume 22, Number 2, March - April 2024
- Laurie A. Williams

:
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough. 4-7 - Samuel Aiello

, Bhaskar Prasad Rimal
:
Secure Access Service Edge Convergence: Recent Progress and Open Issues. 8-16 - Vaughn Hamilton, Gabriel Kaptchuk

, Allison McDonald
, Elissa M. Redmiles
:
Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda. 17-28 - Gregory Lyon

:
Trust in Data Security Protocols and Knowledge of Privacy and Security Technology. 29-37 - Winnie Mbaka

, Katja Tuma
:
Role of Gender in the Evaluation of Security Decisions. 38-48 - Antonino Sabetta

, Serena Elisa Ponta
, Rocío Cabrera Lozoya
, Michele Bezzi
, Tommaso Sacchetti, Matteo Greco
, Gergö Balogh
, Péter Hegedüs
, Rudolf Ferenc
, Ranindya Paramitha
, Ivan Pashchenko
, Aurora Papotti
, Ákos Milánkovich
, Fabio Massacci
:
Known Vulnerabilities of Open Source Projects: Where Are the Fixes? 49-59 - Michele Bezzi

:
Large Language Models and Security. 60-68 - Matilda Backendal

, Miro Haller
, Kenny Paterson
:
End-to-End Encrypted Cloud Storage. 69-74 - Frank Piessens

, Paul C. van Oorschot
:
Side-Channel Attacks: A Short Tour. 75-80 - Alice Hutchings

:
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression. 81-84 - Frank Pallas

, Katharina Koerner, Isabel Barberá
, Jaap-Henk Hoepman
, Meiko Jensen
, Nandita Rao Narla, Nikita Samarin
, Max-Robert Ulbricht
, Isabel Wagner
, Kim Wuyts
, Christian Zimmermann
:
Privacy Engineering From Principles to Practice: A Roadmap. 86-92 - Helen Nissenbaum

:
AI Safety: A Poisoned Chalice? 94-96
Volume 22, Number 3, May - June 2024
- Nele Mentens

:
Hardware Security in the Era of Emerging Device and System Technologies. 4-6 - Daniel Moreira

, Sébastien Marcel
, Anderson Rocha
:
Synthetic Realities and Artificial Intelligence-Generated Contents. 7-10 - Yeali S. Sun

, Zhi-Kang Chen
, Yi-Ting Huang
, Meng Chang Chen
:
Unleashing Malware Analysis and Understanding With Generative AI. 12-23 - Javier Pastor-Galindo

, Pantaleone Nespoli
, José A. Ruipérez-Valiente
:
Large-Language-Model-Powered Agent-Based Framework for Misinformation and Disinformation Research: Opportunities and Open Challenges. 24-36 - Diangarti Tariang

, Riccardo Corvi
, Davide Cozzolino
, Giovanni Poggi
, Koki Nagano
, Luisa Verdoliva
:
Synthetic Image Verification in the Era of Generative Artificial Intelligence: What Works and What Isn't There yet. 37-49 - Can Yavuz

:
A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle. 50-61 - Emiliano De Cristofaro

:
Synthetic Data: Methods, Use Cases, and Risks. 62-67 - Meike Ramon

, Matthew J. Vowels
, Matthew Groh
:
Deepfake Detection in Super-Recognizers and Police Officers. 68-76 - Luca Maiano

, Alexandra Benova
, Lorenzo Papa
, Mara Stockner
, Michela Marchetti
, Gianmarco Convertino
, Giuliana Mazzoni, Irene Amerini
:
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images. 77-86 - Steven M. Bellovin

:
Degenerative AI? 88
Volume 22, Number 4, July - August 2024
- Jianying Zhou

:
The Need of Testbeds for Cyberphysical System Security. 4-6 - Tadayoshi Kohno

:
The Task Piper. 7-12 - Hamed Okhravi

:
Memory Safety. 13-15 - Dan S. Wallach

, Bob Lord:
A Viewpoint: A Memory Safety Manifesto. 18-21 - Per Larsen

:
Migrating C to Rust for Memory Safety. 22-29 - Santosh Nagarakatte

:
Full Spatial and Temporal Memory Safety for C. 30-39 - Kaiming Huang

, Mathias Payer
, Zhiyun Qian
, Jack Sampson
, Gang Tan
, Trent Jaeger
:
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety. 40-49 - Robert N. M. Watson

, David Chisnall
, Jessica Clarke
, Brooks Davis
, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore
, Peter G. Neumann
, Alexander Richardson
, Peter Sewell
, Konrad Witaszczyk
, Jonathan Woodruff
:
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale. 50-61 - William K. Robertson

, Manuel Egele
:
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives. 62-65 - André Rösti

, Alexios Voulimeneas
, Michael Franz
:
The Astonishing Evolution of Probabilistic Memory Safety: From Basic Heap-Data Attack Detection Toward Fully Survivable Multivariant Execution. 66-75 - Mohamadreza Rostami

, Chen Chen
, Rahul Kande
, Huimin Li
, Jeyavijayan Rajendran
, Ahmad-Reza Sadeghi
:
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety. 76-86 - Tobias Cloosters

, Oussama Draissi
, Johannes Willbold
, Thorsten Holz
, Lucas Davi
:
Memory Corruption at the Border of Trusted Execution. 87-96 - Hans Liljestrand

, Jan-Erik Ekberg
:
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts. 97-100 - Daniel Moreira

, Sébastien Marcel
, Anderson Rocha
:
Synthetic Realities and Artificial Intelligence-Generated Contents. 101-102 - Zander W. Blasingame

, Chen Liu
:
Fast-DiM: Towards Fast Diffusion Morphs. 103-114 - Prakash Laxman Kharvi

:
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media. 115-122 - Francis Kofi Andoh-Baidoo

, Martin Otu Offei, Emmanuel W. Ayaburi
, Mikko T. Siponen
, Pavel Gladyshev:
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates. 124-128 - Roberto Baldoni

:
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments? 130-132 - Daniel E. Geer:

What I've Learned. 135-136
Volume 22, Number 5, September - October 2024
- Trent Jaeger

:
Has Access Control Become the Weak Link? 4-7 - Apu Kapadia

, Yang Wang
:
Inclusive Privacy and Security. 10-12 - Partha Das Chowdhury

, Karen Renaud
:
Advocating a Policy Push Toward Inclusive and Secure "Digital-First" Societies. 23-31 - Kopo M. Ramokapane

, Maria Sameen
, Zaina Dkaidek
:
Inclusive Internet of Things Privacy Labels. 32-39 - Chen Zhong

, J. B. (Joo Baek) Kim
, Hong Liu
:
The Art of Inclusive Gamification in Cybersecurity Training. 40-51 - Jinkyung Katie Park

, Mamtaj Akter
, Pamela J. Wisniewski
, Karla Badillo-Urquiola
:
It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience. 52-62 - João Janeiro

, Sérgio Alves
, Tiago João Guerreiro, Florian Alt
, Verena Distler
:
Understanding Phishing Experiences of Screen Reader Users. 63-72 - Roberto Natella

, Pietro Liguori
, Cristina Improta
, Bojan Cukic
, Domenico Cotroneo
:
AI Code Generators for Security: Friend or Foe? 73-81 - Liliana Pasquale

, Kushal Ramkumar, Wanling Cai, John McCarthy, Gavin Doherty, Bashar Nuseibeh:
The Rocky Road to Sustainable Security. 82-86 - Zaina Dkaidek

, Awais Rashid
:
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study. 88-95 - Kenneth G. Crowther

:
Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things. 96-102
Volume 22, Number 6, November - December 2024
- Sean Peisert

:
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity. 4-8 - Feng Hao

:
Real-World Security Protocols. 9-10 - Martin R. Albrecht, Kenneth G. Paterson

:
Analyzing Cryptography in the Wild: A Retrospective. 12-18 - Konstantin Fischer

, Ivana Trummová
, Phillip Gajland, Yasemin Acar
, Sascha Fahl
, M. Angela Sasse
:
Adoption Challenges for Cryptographic Protocols. 19-29 - Diana A. Vasile

, Fahim Kawsar
, Chulhong Min
:
Emerging Paradigms in Wearable Security: Adaptable and Secure Sandboxing for On-the-Fly Collaboration Among Wearables. 30-39 - Güliz Seray Tuncay

:
Android Permissions: Evolution, Attacks, and Best Practices. 40-49 - Andrea Bisegna

, Matteo Bitussi
, Roberto Carbone
, Silvio Ranise
:
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool. 50-61 - Syed Rafiul Hussain

, Patrick D. McDaniel
, Anshul Gandhi
, Kanad Ghose
, Kartik Gopalan
, Dongyoon Lee
, Yu David Liu
, Zhenhua Liu
, Shuai Mu, Erez Zadok
:
Verifiable Sustainability in Data Centers. 62-74 - Timothy J. Pierson

, Cesar Arguello
, Beatrice Perez
, Wondimu Zegeye
, Kevin T. Kornegay
, Carl A. Gunter
, David Kotz
:
We Need a "Building Inspector for IoT" When Smart Homes Are Sold. 75-84 - Chelsea Komlo

:
Threshold Signatures. 85-88 - James Crabb

, Clemente Izurieta
, Bernard Vanwie
, Olusola O. Adesope
, Assefaw Hadish Gebremedhin
:
Cybersecurity Education: Insights From a Novel Cybersecurity Summer Workshop. 89-98 - Margaret Cunningham

, Calvin Nobles
, Nikki Robinson
, Julie M. Haney
:
Leveraging the Human Factors Discipline for Better Cybersecurity Outcomes: A Roundtable Discussion. 99-104

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














