


default search action
IEEE Security & Privacy, Volume 22
Volume 22, Number 1, January - February 2024
- Fabio Massacci
:
The Holy Grail of Vulnerability Predictions. 4-6 - Franziska Roesner
, Tadayoshi Kohno
:
Security and Privacy in the Metaverse. 7-9 - Derin Cayir
, Abbas Acar
, Riccardo Lazzeretti
, Marco Angelini
, Mauro Conti
, A. Selcuk Uluagac
:
Augmenting Security and Privacy in the Virtual Realm: An Analysis of Extended Reality Devices. 10-23 - Vivek Nair
, Louis B. Rosenberg
, James F. O'Brien
, Dawn Song
:
Truth in Motion: The Unprecedented Risks and Opportunities of Extended Reality Motion Data. 24-32 - Matthew Corbett
, Brendan David-John
, Jiacheng Shang
, Y. Charlie Hu
, Bo Ji
:
Securing Bystander Privacy in Mixed Reality While Protecting the User Experience. 33-42 - Abraham H. Mhaidli
, Shwetha Rajaram
, Selin Fidan
, Gina Herakovic, Florian Schaub
:
Shockvertising, Malware, and a Lack of Accountability: Exploring Consumer Risks of Virtual Reality Advertisements and Marketing Experiences. 43-52 - Karoline Brehm
, Yan Shvartzshnaider
:
Understanding Privacy in Virtual Reality Classrooms: A Contextual Integrity Perspective. 53-62 - Joseph O'Hagan
, Jan Gugenheimer
, Florian Mathis
, Jolie Bonner
, Richard Jones, Mark McGill
:
A Viewpoint on the Societal Impact of Everyday Augmented Reality and the Need for Perceptual Human Rights. 64-68 - Eric Bodden
, Jens Pottebaum
, Markus Fockel
, Iris Gräßler
:
Evaluating Security Through Isolation and Defense in Depth. 69-72 - Elissa M. Redmiles
:
Friction Matters: Balancing the Pursuit of Perfect Protection With Target Hardening. 76-75
Volume 22, Number 2, March - April 2024
- Laurie A. Williams
:
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough. 4-7 - Samuel Aiello
, Bhaskar Prasad Rimal
:
Secure Access Service Edge Convergence: Recent Progress and Open Issues. 8-16 - Vaughn Hamilton, Gabriel Kaptchuk
, Allison McDonald
, Elissa M. Redmiles
:
Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda. 17-28 - Gregory Lyon
:
Trust in Data Security Protocols and Knowledge of Privacy and Security Technology. 29-37 - Winnie Mbaka
, Katja Tuma
:
Role of Gender in the Evaluation of Security Decisions. 38-48 - Antonino Sabetta
, Serena Elisa Ponta
, Rocío Cabrera Lozoya
, Michele Bezzi
, Tommaso Sacchetti, Matteo Greco
, Gergö Balogh
, Péter Hegedüs
, Rudolf Ferenc
, Ranindya Paramitha
, Ivan Pashchenko
, Aurora Papotti
, Ákos Milánkovich, Fabio Massacci
:
Known Vulnerabilities of Open Source Projects: Where Are the Fixes? 49-59 - Michele Bezzi
:
Large Language Models and Security. 60-68 - Matilda Backendal
, Miro Haller
, Kenny Paterson
:
End-to-End Encrypted Cloud Storage. 69-74 - Frank Piessens
, Paul C. van Oorschot
:
Side-Channel Attacks: A Short Tour. 75-80 - Alice Hutchings
:
The Amplification of Online Deviancy Through the Language of Violent Crime, War, and Aggression. 81-84 - Frank Pallas
, Katharina Koerner, Isabel Barberá
, Jaap-Henk Hoepman
, Meiko Jensen
, Nandita Rao Narla, Nikita Samarin
, Max-Robert Ulbricht
, Isabel Wagner
, Kim Wuyts
, Christian Zimmermann
:
Privacy Engineering From Principles to Practice: A Roadmap. 86-92 - Helen Nissenbaum
:
AI Safety: A Poisoned Chalice? 94-96
Volume 22, Number 3, May - June 2024
- Nele Mentens
:
Hardware Security in the Era of Emerging Device and System Technologies. 4-6 - Daniel Moreira
, Sébastien Marcel
, Anderson Rocha
:
Synthetic Realities and Artificial Intelligence-Generated Contents. 7-10 - Yeali S. Sun
, Zhi-Kang Chen
, Yi-Ting Huang
, Meng Chang Chen
:
Unleashing Malware Analysis and Understanding With Generative AI. 12-23 - Javier Pastor-Galindo
, Pantaleone Nespoli
, José A. Ruipérez-Valiente
:
Large-Language-Model-Powered Agent-Based Framework for Misinformation and Disinformation Research: Opportunities and Open Challenges. 24-36 - Diangarti Tariang
, Riccardo Corvi
, Davide Cozzolino
, Giovanni Poggi
, Koki Nagano
, Luisa Verdoliva
:
Synthetic Image Verification in the Era of Generative Artificial Intelligence: What Works and What Isn't There yet. 37-49 - Can Yavuz
:
A Multidisciplinary Look at History and Future of Deepfake With Gartner Hype Cycle. 50-61 - Emiliano De Cristofaro
:
Synthetic Data: Methods, Use Cases, and Risks. 62-67 - Meike Ramon
, Matthew J. Vowels
, Matthew Groh
:
Deepfake Detection in Super-Recognizers and Police Officers. 68-76 - Luca Maiano
, Alexandra Benova
, Lorenzo Papa
, Mara Stockner
, Michela Marchetti
, Gianmarco Convertino
, Giuliana Mazzoni, Irene Amerini
:
Human Versus Machine: A Comparative Analysis in Detecting Artificial Intelligence-Generated Images. 77-86 - Steven M. Bellovin
:
Degenerative AI? 88
Volume 22, Number 4, July - August 2024
- Jianying Zhou
:
The Need of Testbeds for Cyberphysical System Security. 4-6 - Tadayoshi Kohno
:
The Task Piper. 7-12 - Hamed Okhravi
:
Memory Safety. 13-15 - Dan S. Wallach
, Bob Lord:
A Viewpoint: A Memory Safety Manifesto. 18-21 - Per Larsen
:
Migrating C to Rust for Memory Safety. 22-29 - Santosh Nagarakatte
:
Full Spatial and Temporal Memory Safety for C. 30-39 - Kaiming Huang
, Mathias Payer
, Zhiyun Qian
, Jack Sampson
, Gang Tan
, Trent Jaeger
:
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety. 40-49 - Robert N. M. Watson
, David Chisnall
, Jessica Clarke
, Brooks Davis
, Nathaniel Wesley Filardo, Ben Laurie, Simon W. Moore
, Peter G. Neumann
, Alexander Richardson
, Peter Sewell
, Konrad Witaszczyk
, Jonathan Woodruff
:
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale. 50-61 - William K. Robertson
, Manuel Egele
:
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives. 62-65 - André Rösti
, Alexios Voulimeneas
, Michael Franz
:
The Astonishing Evolution of Probabilistic Memory Safety: From Basic Heap-Data Attack Detection Toward Fully Survivable Multivariant Execution. 66-75 - Mohamadreza Rostami
, Chen Chen
, Rahul Kande
, Huimin Li
, Jeyavijayan Rajendran
, Ahmad-Reza Sadeghi
:
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety. 76-86 - Tobias Cloosters
, Oussama Draissi
, Johannes Willbold
, Thorsten Holz
, Lucas Davi
:
Memory Corruption at the Border of Trusted Execution. 87-96 - Hans Liljestrand
, Jan-Erik Ekberg
:
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts. 97-100 - Daniel Moreira
, Sébastien Marcel
, Anderson Rocha
:
Synthetic Realities and Artificial Intelligence-Generated Contents. 101-102 - Zander W. Blasingame
, Chen Liu
:
Fast-DiM: Towards Fast Diffusion Morphs. 103-114 - Prakash Laxman Kharvi
:
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media. 115-122 - Francis Kofi Andoh-Baidoo
, Martin Otu Offei, Emmanuel W. Ayaburi
, Mikko T. Siponen
, Pavel Gladyshev:
How Do Real Cybercrime Syndicates Operate?: The Case of Online Romance Fraud Syndicates. 124-128 - Roberto Baldoni
:
Global Cybercrime Requires a Collective Response: Are We Prepared to Ban Ransom Payments? 130-132 - Daniel E. Geer:
What I've Learned. 135-136
Volume 22, Number 5, September - October 2024
- Trent Jaeger
:
Has Access Control Become the Weak Link? 4-7 - Apu Kapadia
, Yang Wang
:
Inclusive Privacy and Security. 10-12 - Partha Das Chowdhury
, Karen Renaud
:
Advocating a Policy Push Toward Inclusive and Secure "Digital-First" Societies. 23-31 - Kopo M. Ramokapane
, Maria Sameen
, Zaina Dkaidek
:
Inclusive Internet of Things Privacy Labels. 32-39 - Chen Zhong
, J. B. (Joo Baek) Kim
, Hong Liu
:
The Art of Inclusive Gamification in Cybersecurity Training. 40-51 - Jinkyung Katie Park
, Mamtaj Akter
, Pamela J. Wisniewski
, Karla Badillo-Urquiola
:
It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience. 52-62 - João Janeiro
, Sérgio Alves
, Tiago João Guerreiro, Florian Alt
, Verena Distler
:
Understanding Phishing Experiences of Screen Reader Users. 63-72 - Roberto Natella
, Pietro Liguori
, Cristina Improta
, Bojan Cukic
, Domenico Cotroneo
:
AI Code Generators for Security: Friend or Foe? 73-81 - Liliana Pasquale
, Kushal Ramkumar, Wanling Cai, John McCarthy, Gavin Doherty, Bashar Nuseibeh:
The Rocky Road to Sustainable Security. 82-86 - Zaina Dkaidek
, Awais Rashid
:
Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study. 88-95 - Kenneth G. Crowther
:
Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things. 96-102
Volume 22, Number 6, November - December 2024
- Sean Peisert
:
Adapting a Publicly Focused Individual Health-Care Model to Cybersecurity. 4-8 - Feng Hao
:
Real-World Security Protocols. 9-10 - Martin R. Albrecht, Kenneth G. Paterson
:
Analyzing Cryptography in the Wild: A Retrospective. 12-18 - Konstantin Fischer
, Ivana Trummová
, Phillip Gajland, Yasemin Acar
, Sascha Fahl
, M. Angela Sasse
:
Adoption Challenges for Cryptographic Protocols. 19-29 - Diana A. Vasile
, Fahim Kawsar
, Chulhong Min
:
Emerging Paradigms in Wearable Security: Adaptable and Secure Sandboxing for On-the-Fly Collaboration Among Wearables. 30-39 - Güliz Seray Tuncay
:
Android Permissions: Evolution, Attacks, and Best Practices. 40-49 - Andrea Bisegna
, Matteo Bitussi
, Roberto Carbone
, Silvio Ranise
:
Enhancing Security Testing for Identity Management Implementations: Introducing Micro-Id-Gym Language and Micro-Id-Gym Testing Tool. 50-61 - Syed Rafiul Hussain
, Patrick D. McDaniel
, Anshul Gandhi
, Kanad Ghose, Kartik Gopalan
, Dongyoon Lee
, Yu David Liu
, Zhenhua Liu
, Shuai Mu, Erez Zadok
:
Verifiable Sustainability in Data Centers. 62-74 - Timothy J. Pierson
, Cesar Arguello
, Beatrice Perez
, Wondimu Zegeye
, Kevin T. Kornegay
, Carl A. Gunter
, David Kotz
:
We Need a "Building Inspector for IoT" When Smart Homes Are Sold. 75-84 - Chelsea Komlo
:
Threshold Signatures. 85-88 - James Crabb
, Clemente Izurieta
, Bernard Vanwie
, Olusola O. Adesope
, Assefaw Hadish Gebremedhin
:
Cybersecurity Education: Insights From a Novel Cybersecurity Summer Workshop. 89-98 - Margaret Cunningham
, Calvin Nobles
, Nikki Robinson
, Julie M. Haney
:
Leveraging the Human Factors Discipline for Better Cybersecurity Outcomes: A Roundtable Discussion. 99-104

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.