Last update:
Wed Sep 24 12:02:44 MDT 2025
George Cybenko A Critical Need, An Ambitious Mission, a
New Magazine . . . . . . . . . . . . . . 5--9
Sandra Kay Miller Legal Battle Looming for Internet
Protections Acts . . . . . . . . . . . . 10--12
Scott L. Andresen New Draft to Secure Cyberspace Leaked 13--13
Simson L. Garfinkel and
Abhi Shelat Remembrance of Data Passed: a Study of
Disk Sanitization Practices . . . . . . 17--27
Nick L. Petroni, Jr. and
William A. Arbaugh The Dangers of Mitigating Security
Design Flaws: a Wireless Case Study . . 28--36
Crispin Cowan Software Security for Open-Source
Systems . . . . . . . . . . . . . . . . 38--45
Joshua Haines and
Dorene Kewley Ryder and
Laura Tinnel and
Stephen Taylor Validation of Sensor Alert Correlators 46--56
Michael Howard and
Steve Lipner Inside the Windows Security Push . . . . 57--61
Marc Donner AI Bites Man? . . . . . . . . . . . . . 63--66
Matt Bishop What Is Computer Security? . . . . . . . 67--69
Daniel J. Ryan Two Views on Security Software
Liability: Let the Legal System Decide 70--72
Carey Heckman Two Views on Security Software
Liability: Using the Right Legal Tools 73--75
Michael Lesk Copyright Extension: Eldred v. Ashcroft 76--78
Jim Hearn International Participation: The
Continuing March Toward Security and
Privacy . . . . . . . . . . . . . . . . 79--81
Iván Arce and
Elias Levy An Analysis of the Slapper Worm . . . . 82--87
S. W. Smith Fairy Dust, Secrets, and the Real World 89--93
Martin R. Stytz and
James A. Whittaker Software Protection: Security's Last
Stand? . . . . . . . . . . . . . . . . . 95--98
Michael Caloyannides Privacy vs. Information Technology . . . 100--103
Bruce Schneier We Are All Security Consumers . . . . . 104--104
George Cybenko From the Editor: Sapphire/Slammer Redux 6--6
Anonymous Letters to the Editor . . . . . . . . . 7--10
Daniel P. Dern Privacy Concerns . . . . . . . . . . . . 11--13
Lance Spitzner The Honeynet Project: Trapping the
Hackers . . . . . . . . . . . . . . . . 15--23
Matt Blaze Rights Amplification in Master-Keyed
Mechanical Locks . . . . . . . . . . . . 24--32
Salil Prabhakar and
Sharath Pankanti and
Anil K. Jain Biometric Recognition: Security and
Privacy Concerns . . . . . . . . . . . . 33--42
William E. Burr Selecting the Advanced Encryption
Standard . . . . . . . . . . . . . . . . 43--52
Marc Donner Post-Apocalypse Now . . . . . . . . . . 53--55
Jim Davis and
Melissa Dark Teaching Students to Design Secure
Systems . . . . . . . . . . . . . . . . 56--58
Gary McGraw From the Ground Up: The DIMACS Software
Security Workshop . . . . . . . . . . . 59--66
Michael Lesk Copyright Enforcement or Censorship: New
Uses for the DMCA? . . . . . . . . . . . 67--69
Jim Hearn Moving Forward? . . . . . . . . . . . . 70--71
Iván Arce The Weakest Link Revisited . . . . . . . 72--76
Edward Ball and
David W. Chadwick and
Darren Mundy Patient Privacy in Electronic
Prescription Transfer . . . . . . . . . 77--80
James Whittaker Why Secure Applications Are Difficult to
Write . . . . . . . . . . . . . . . . . 81--83
Michael A. Caloyannides Engineering or Sloganeering? The
Counterattack on Privacy . . . . . . . . 84--87
Bruce Schneier Locks and Full Disclosure . . . . . . . 88--88
Marc Donner Toward a Security Ontology . . . . . . . 6--7
Anonymous Errata: ``On the Horizon'' (vol. 1, no.
2) and ``Interface'' (vol. 1, no. 2, p.
9) . . . . . . . . . . . . . . . . . . . 7--7
Anonymous News . . . . . . . . . . . . . . . . . . 8--13
Nancy R. Mead Building a Foundation . . . . . . . . . 14--14
Lucila Ishitani and
Virgilio Almeida and
Wagner Meira, Jr. Masks: Bringing Anonymity and
Personalization Together . . . . . . . . 18--23
Hassan Aljifri IP Traceback: a New Denial-of-Service
Deterrent? . . . . . . . . . . . . . . . 24--31
Niels Provos and
Peter Honeyman Hide and Seek: An Introduction to
Steganography . . . . . . . . . . . . . 32--44
Václav Matyás, Jr. and
Zdenek Riha Toward Reliable User Authentication
through Biometrics . . . . . . . . . . . 45--49
Marc Donner Hey, Robot! . . . . . . . . . . . . . . 51--55
Deborah Frincke Who Watches the Security Educators? . . 56--58
Edward W. Felten Understanding Trusted Computing: Will
Its Benefits Outweigh Its Drawbacks? . . 60--62
Michael Lesk The Good, the Bad, and the Ugly: What
Might Change if We Had Good DRM . . . . 63--66
Jim Hearn Slow Dancing . . . . . . . . . . . . . . 67--68
Elias Levy Poisoning the Software Supply Chain . . 70--73
S. W. Smith Humans in the Loop: Human-Computer
Interaction and Security . . . . . . . . 75--79
Martin R. Stytz The Case for Software Warranties . . . . 80--82
Michael A. Caloyannides Society Cannot Function Without Privacy 84--86
Bruce Schneier Guilty Until Proven Innocent? . . . . . 88, 87
Carl E. Landwehr From the Editor: Security Cosmology:
Moving from Big Bang to Worlds in
Collusion . . . . . . . . . . . . . . . 5--5
Anonymous Security and Privacy Welcomes New
Editorial Board Members . . . . . . . . 6--7
Greg Goth and
Sandra Kay Miller News . . . . . . . . . . . . . . . . . . 8--11
Scott L. Andresen News Briefs . . . . . . . . . . . . . . 12--13
Anonymous Letters to the Editor . . . . . . . . . 14--14
Robert J. Campbell Crime Scene Investigators: The Next
Generation . . . . . . . . . . . . . . . 15--15
Dennis McGrath Measuring the 4:11 Effect: The Power
Failure and the Internet . . . . . . . . 16--18
Massoud Amin North America's Electricity
Infrastructure: Are We Ready for More
Perfect Storms? . . . . . . . . . . . . 19--25
Peter G. Capek and
David M. Chess and
Steve R. White Merry Christma: An Early Network Worm 26--34
Hilarie Orman The Morris Worm: a Fifteen-Year
Perspective . . . . . . . . . . . . . . 35--43
Rolf Oppliger and
Ruedi Rytz Digital Evidence: Dream and Reality . . 44--48
Salim Hariri and
Guangzhi Qu and
Tushneem Dharmagadda and
Modukuri Ramkishore and
Cauligi S. Raghavendra Impact Analysis of Faults and Attacks in
Large-Scale Networks . . . . . . . . . . 49--54
Fred B. Schneider Least Privilege and More . . . . . . . . 55--59
John Lenarcic The Dinosaur and the Butterfly: a Tale
of Computer Ethics . . . . . . . . . . . 61--63
Dan Ragsdale and
Don Welch and
Ron Dodge Information Assurance the West Point Way 64--67
Nancy R. Mead SEHAS 2003: The Future of High-Assurance
Systems . . . . . . . . . . . . . . . . 68--72
Michael Lesk Chicken Little and the Recorded Music
Crisis . . . . . . . . . . . . . . . . . 73--75
Jim Hearn What Works? . . . . . . . . . . . . . . 76--77
Iván Arce The Rise of the Gadgets . . . . . . . . 78--81
Jean Camp Access Denied . . . . . . . . . . . . . 82--85
Martin Stytz and
James A. Whittaker Caution: This Product Contains Security
Code . . . . . . . . . . . . . . . . . . 86--88
Bill McCarty Automated Identity Theft . . . . . . . . 89--92
Michael Caloyannides Keeping Offline Computer Usage Private 93--95
George Cybenko From the Editors: Privacy Is the Issue 5--7
Greg Goth and
Benjamin J. Alfonsi News . . . . . . . . . . . . . . . . . . 8--13
Daniel E. Geer, Jr. and
Dave Aucsmith and
James A. Whittaker Monoculture . . . . . . . . . . . . . . 14--17
Simson L. Garfinkel Email-Based Identification and
Authentication: An Alternative to PKI? 20--26
Dakshi Agrawal and
Dogan Kesdogan Measuring Anonymity: The Disclosure
Attack . . . . . . . . . . . . . . . . . 27--34
Jean-Marc Seigneur and
Christian Damsgaard Jensen Privacy Recovery with Disposable Email
Addresses . . . . . . . . . . . . . . . 35--39
Abdelmounaam Rezgui and
Athman Bouguettaya and
Mohamed Y. Eltoweissy Privacy on the Web: Facts, Challenges,
and Solutions . . . . . . . . . . . . . 40--49
Lorrie Faith Cranor P3P: Making Privacy Policies More Useful 50--55
John S. Quarterman The Ultimate in Instant Gratification 56--58
Cynthia E. Irvine Teaching Constructive Security . . . . . 59--61
Jeannette M. Wing A Call to Action: Look Beyond the
Horizon . . . . . . . . . . . . . . . . 62--67
Michael Lesk Feist and Facts: If Data Is Protected,
Will It Be More or Less Available? . . . 68--70
Elias Levy Crossover: Online Pests Plaguing the
Offline World . . . . . . . . . . . . . 71--73
S. W. Smith and
Jothy Rosenberg and
Adam Golodner A Funny Thing Happened on the Way to the
Marketplace . . . . . . . . . . . . . . 74--78
Bill McCarty The Honeynet Arms Race . . . . . . . . . 79--82
Anonymous 2003 Annual Index IEEE Security & Privacy
Volume 1 . . . . . . . . . . . . . . . . 83--88
Michael A. Caloyannides Digital `Evidence' and Reasonable Doubt 89--91
Bruce Schneier Airplane Hackers . . . . . . . . . . . . 92--92
Fred B. Schneider From the Editors: The Next Digital
Divide . . . . . . . . . . . . . . . . . 5--5
Anonymous Reviewer Thanks . . . . . . . . . . . . 6--6
Daniel Weber and
Jean Camp and
Tom Van Vleck and
Bob Bruen and
James Whittaker Letters to the Editors: Digital Rights
Management; Change the Game?; No Clear
Answers . . . . . . . . . . . . . . . . 7--9
Charles C. Palmer Editorial Board Member Profile: Can We
Win the Security Game? . . . . . . . . . 10--12
Greg Goth and
Pam Frost Gorder News: E-Voting Security: The Electoral
Dialect Gets Hot; Balancing Video-Game
Piracy Issues . . . . . . . . . . . . . 14--17
Scott L. Andresen News Briefs: Policy; Privacy; Security 18--19
Martin R. Stytz Book Reviews: Wireless World Order [\em
How Secure Is Your Wireless Network?
Safeguarding Your Wi-Fi LAN by Lee
Barken]; No Need to Fear [\em Beyond
Fear: Thinking Sensibly About Security
in an Uncertain World, by Bruce
Schneier] . . . . . . . . . . . . . . . 20--21
David L. Dill and
Aviel D. Rubin Guest Editors' Introduction: E-Voting
Security . . . . . . . . . . . . . . . . 22--23
David Evans and
Nathanael Paul E-Voting: Election Security: Perception
and Reality . . . . . . . . . . . . . . 24--31
Jonathan Bannet and
David W. Price and
Algis Rudys and
Justin Singer and
Dan S. Wallach E-Voting: Hack-a-Vote: Security Issues
with Electronic Voting Systems . . . . . 32--37
David Chaum E-Voting: Secret-Ballot Receipts: True
Voter-Verifiable Elections . . . . . . . 38--47
Nicolas Sklavos and
Nikolay Moldovyan and
Vladimir Gorodetsky and
Odysseas Koufopavlou Conference Reports: Computer Network
Security: Report from MMM-ACNS . . . . . 49--52
Marc Donner Biblio Tech: Die Gedanken Sind Frei . . 53--55
Michael Russell Grimaila Education: Maximizing Business
Information Security's Educational Value 56--60
Michael Lesk Digital Rights: Micropayments: An Idea
Whose Time Has Passed Twice? . . . . . . 61--63
Jim Hearn Global Perspectives: Does the Common
Criteria Paradigm Have a Future? . . . . 64--65
Iván Arce Attack Trends: More Bang For the Bug: An
Account of 2003's Attack Trends . . . . 66--68
Sean W. Smith and
Eugene H. Spafford Secure Systems: Grand Challenges in
Information Security: Process and Output 69--71
Martin R. Stytz Considering Defense in Depth for
Software Applications . . . . . . . . . 72--75
Neal Krawetz The Honeynet Files: Anti-Honeypot
Technology . . . . . . . . . . . . . . . 76--79
Michael A. Caloyannides Privacy Matters: Online Monitoring:
Security or Social Control? . . . . . . 81--83
Bruce Schneier Clear Text: Voting Security and
Technology . . . . . . . . . . . . . . . 84--84
George Cybenko From the Editors: Don't Bring a Knife to
a Gunfight . . . . . . . . . . . . . . . 5--5
Matthias Fischmann and
Matthias Bauer and
Simson Garfinkel Letters to the Editor: EBIA vs. PKI . . 6--7
Martin R. Stytz Book Reviews: Hacking for Understanding:
\em Hacking: The Art of Exploitation, by
Jon Erickson . . . . . . . . . . . . . . 8--8
Greg Goth and
Benjamin J. Alfonsi and
Scott L. Andresen News: How Useful Are Attack Trend
Resources? . . . . . . . . . . . . . . . 9--11
Kanta Jiwnani and
Marvin Zelkowitz Susceptibility Matrix: a New Aid to
Software Auditing . . . . . . . . . . . 16--21
Simon Byers Information Leakage Caused by Hidden
Data in Published Documents . . . . . . 23--27
Marco Gruteser and
Xuan Liu Protecting Privacy in Continuous
Location-Tracking Applications . . . . . 28--34
Annie I. Antón and
Julia B. Earp and
Qingfeng He and
William Stufflebeam and
Davide Bolchini and
University of Lugano and
Carlos Jensen Financial Privacy Policies and the Need
for Standardization . . . . . . . . . . 36--45
Ashish Popli ACM Computer and Communication Security
Conference . . . . . . . . . . . . . . . 46--47
Stephen A. Weis RFID Privacy Workshop: Concerns,
Consensus, and Questions . . . . . . . . 48--50
Marc Donner Hacking the Best-Seller List . . . . . . 51--53
Matt Bishop and
Deb Frincke Teaching Robust Programming . . . . . . 54--57
Jeffery E. Payne Regulation and Information Security: Can
Y2K Lessons Help Us? . . . . . . . . . . 58--61
Michael Lesk Shedding Light on Creativity: The
History of Photography . . . . . . . . . 62--64
Elias Levy Criminals Become Tech Savvy . . . . . . 65--68
Peter Wayner The Power of Candy-Coated Bits . . . . . 69--72
Roland L. Trope A Warranty of Cyberworthiness . . . . . 73--76
George Chamales The Honeywall CD-ROM . . . . . . . . . . 77--79
Gary McGraw Software Security . . . . . . . . . . . 80--83
Michael A. Caloyannides The Cost of Convenience: a Faustian Deal 84--87
Marc Donner From the Editors: Whose Data Are These,
Anyway? . . . . . . . . . . . . . . . . 5--6
Shari Lawrence Pfleeger Book Reviews: a Gift of Impact: \em A
Gift of Fire: The Social, Legal, and
Ethical Issues for Computers and the
Internet, by Sara Baase (Prentice-Hall
2002, ISBN 0-13-008215-5) . . . . . . . 7--7
Hong-Lok Li and
Stan Bush Letters to the Editor: Interface:
Usability, efficiency --- or privacy?;
Does piracy increase sales? . . . . . . 8--9
Greg Goth and
Scott L. Andresen News: Richard Clarke Talks Cybersecurity
and JELL-O . . . . . . . . . . . . . . . 11--15
Noopur Davis and
Watts Humphrey and
Samuel T. Redwine, Jr. and
Gerlinde Zibulski and
Gary McGraw Processes for Producing Secure Software:
Summary of US National Cybersecurity
Summit Subgroup Report . . . . . . . . . 18--25
William A. Arbaugh Guest Editor's Introduction: Wired on
Wireless . . . . . . . . . . . . . . . . 26--27
Yih-Chun Hu and
Adrian Perrig A Survey of Secure Wireless Ad Hoc
Routing . . . . . . . . . . . . . . . . 28--39
David Johnston and
Jesse Walker Overview of IEEE 802.16 Security . . . . 40--48
Jean-Pierre Hubaux and
Srdjan Capkun and
Jun Luo The Security and Privacy of Smart
Vehicles . . . . . . . . . . . . . . . . 49--55
Joel W. Branch and
Nick L. Petroni, Jr. and
Leendert Van Doorn and
David Safford Autonomic 802.11 Wireless LAN Security
Auditing . . . . . . . . . . . . . . . . 56--65
Marc Donner Cult Classics . . . . . . . . . . . . . 66--68
Deborah A. Frincke and
Matt Bishop Guarding the Castle Keep: Teaching with
the Fortress Metaphor . . . . . . . . . 69--72
Salvatore J. Stolfo Worm and Attack Early Warning . . . . . 73--75
Michael Lesk Digital Rights: Copyright and Creativity 76--78
Ivaán Arce The Kernel Craze . . . . . . . . . . . . 79--81
Mark F. Vilardo Online Impersonation in Securities Scams 82--85
Richard Ford The Wrong Stuff? . . . . . . . . . . . . 86--89
Paco Hope and
Gary McGraw and
Annie I. Antón Misuse and Abuse Cases: Getting Past the
Positive . . . . . . . . . . . . . . . . 90--92
Michael A. Caloyannides Security or Cosmetology? . . . . . . . . 93--95
Bruce Schneier Security and Compliance . . . . . . . . 96--96
Marc Donner From the Editors: a Witty Lesson . . . . 5--5
Brad Spencer and
Michael A. Caloyannides Letters to the Editor: Interface:
Machine Gun or Blunderbuss?; Usability
or privacy redux; Erratum . . . . . . . 7--8
Scott Forbes Book Reviews: \em A .NET Gold Mine: .NET
Security and Cryptography, by Peter
Thorsteinson and G. Gnana Arun Ganesh
(Prentice-Hall 2004, ISBN 0-13-100851-X) 10--10
Adam Stone and
Benjamin Alfonsi and
Scott L. Andresen News: The Delicate Balance: Security and
Privacy; Corporate Security Under Siege;
News Briefs . . . . . . . . . . . . . . 12--13
Iváan Arce and
Gary McGraw Guest Editors' Introduction: Why
Attacking Systems Is a Good Idea . . . . 17--19
Jonathan Pincus and
Brandon Baker Beyond Stack Smashing: Recent Advances
in Exploiting Buffer Overruns . . . . . 20--27
Carolyn P. Meinel Cybercrime Treaty Could Chill Research 28--32
Greg White and
Art Conklin The Appropriate Use of Force-on-Force
Cyberexercises . . . . . . . . . . . . . 33--37
Sandra Ring and
Eric Cole Taking a Lesson from Stealthy Rootkits 38--45
Colleen Shannon and
David Moore The Spread of the Witty Worm . . . . . . 46--50
Marc Donner Deus Est Machina . . . . . . . . . . . . 51--53
Deborah Frincke and
Matt Bishop Back to School . . . . . . . . . . . . . 54--56
Chip Elliott Quantum Cryptography . . . . . . . . . . 57--61
Michael Lesk Bigger Share of a Smaller Pie . . . . . 62--64
Elias Levy Approaching Zero . . . . . . . . . . . . 65--66
Richard Guida and
Robert Stahl and
Thomas Bunt and
Gary Secrest and
Joseph Moorcones Deploying and Using Public Key
Technology: Lessons Learned in Real Life 67--71
Frederic Raynal and
Yann Berthier and
Philippe Biondi and
Danielle Kaminsky Honeypot Forensics Part I: Analyzing the
Network . . . . . . . . . . . . . . . . 72--78
Denis Verdon and
Gary McGraw Risk Analysis in Software Design . . . . 79--84
Michael A. Caloyannides Is Privacy Really Constraining Security
or Is this a Red Herring? . . . . . . . 86--87
Bruce Schneier Customers, Passwords, and Web Sites . . 88--88
Fred Schneider Time Out for Station Identification . . 5--5
Anonymous Letters to the Editor . . . . . . . . . 6--7
Greg Goth News . . . . . . . . . . . . . . . . . . 8--11
Anonymous Protecting Consumers' Private Health
Information . . . . . . . . . . . . . . 12--12
Lorrie Faith Cranor and
Simson Garfinkel Guest Editors' Introduction: Secure or
Usable? . . . . . . . . . . . . . . . . 16--18
Dirk Balfanz and
Glenn Durfee and
Rebecca E. Grinter and
D. K. Smetters In Search of Usable Security: Five
Lessons from the Field . . . . . . . . . 19--24
Jeff Yan and
Alan Blackwell and
Ross Anderson and
Alasdair Grant Password Memorability and Security:
Empirical Results . . . . . . . . . . . 25--31
Mike Just Designing and Evaluating
Challenge-Question Systems . . . . . . . 32--39
Alen Peacock and
Xian Ke and
Matthew Wilkerson Typing Patterns: a Key to User
Identification . . . . . . . . . . . . . 40--47
Ka-Ping Yee Aligning Security and Usability . . . . 48--55
Marc Donner Jennifer Government . . . . . . . . . . 57--59
Deborah Frincke and
Matt Bishop Joining the Security Education Community 61--63
O. Sami Saydjari Multilevel Security: Reprise . . . . . . 64--67
Mike Andrews and
James A. Whittaker Computer Security . . . . . . . . . . . 68--71
Iván Arce The Shellcode Generation . . . . . . . . 72--76
Frederic Raynal and
Yann Berthier and
Philippe Biondi and
Danielle Kaminsky Honeypot Forensics, Part II: Analyzing
the Compromised Host . . . . . . . . . . 77--80
Gary McGraw and
Bruce Potter Software Security Testing . . . . . . . 81--85
Michael A. Caloyannides Speech Privacy Technophobes Need Not
Apply . . . . . . . . . . . . . . . . . 86--87
Bruce Schneier SIMS: Solution, or Part of the Problem? 88--88
George Cybenko Security Alchemy . . . . . . . . . . . . 5--5
Scott Forbes Privacy Law Resource for Students and
Professionals . . . . . . . . . . . . . 7--7
Greg Goth and
Benjamin Alfonsi News . . . . . . . . . . . . . . . . . . 8--9
Annie I. Antón and
Qingfeng He and
David L. Baumer Inside JetBlue's Privacy Policy
Violations . . . . . . . . . . . . . . . 12--18
Jaideep Vaidya and
Chris Clifton Privacy-Preserving Data Mining: Why,
How, and When . . . . . . . . . . . . . 19--27
K. S. Shankar and
Helmut Kurth Certifying Open Source---The Linux
Experience . . . . . . . . . . . . . . . 28--33
David E. Bakken and
Rupa Parameswaran and
Douglas M. Blough and
Andy A. Franz and
Ty J. Palmer Data Obfuscation: Anonymity and
Desensitization of Usable Data Sets . . 34--41
Javed Aslam and
Sergey Bratus and
David Kotz and
Ron Peterson and
Brett Tofel and
Daniela Rus The Kerf Toolkit for Intrusion Analysis 42--52
Marc Donner Use the Force, Luke! . . . . . . . . . . 53--55
Deborah Frincke and
Matt Bishop Academic Degrees and Professional
Certification . . . . . . . . . . . . . 56--58
Shelby Evans and
David Heinbuch and
Elizabeth Kyule and
John Piorkowski and
James Wallner Risk-based Systems Security Engineering:
Stopping Attacks with Intention . . . . 59--62
Michael Howard Building More Secure Software with
Improved Development Processes . . . . . 63--65
Elias Levy Interface Illusions . . . . . . . . . . 66--69
Anil Somayaji How to Win and Evolutionary Arms Race 70--72
John G. Levine and
Julian B. Grizzard and
Henry L. Owen Using Honeynets to Protect Large
Enterprise Networks . . . . . . . . . . 73--75
Brian Chess and
Gary McGraw Static Analysis for Security . . . . . . 76--79
Anonymous 2004 Annual Index . . . . . . . . . . . 80--85
Michael Caloyannides Enhancing Security: Not for the
Conformist . . . . . . . . . . . . . . . 88, 86--87
C. Landwehr Changing the Puzzle Pieces . . . . . . . 3--4
M. R. Sytz Studying Attacks to Improve Software
Defense . . . . . . . . . . . . . . . . 11--11
R. Anderson and
B. Schneier Guest Editors' Introduction: Economics
of Information Security . . . . . . . . 12--13
E. Rescorla Is finding security holes a good idea? 14--19
A. Arora and
R. Telang Economics of software vulnerability
disclosure . . . . . . . . . . . . . . . 20--25
A. Acquisti and
J. Grossklags Privacy and rationality in individual
decision making . . . . . . . . . . . . 26--33
H. Varian and
F. Wallenberg and
G. Woroch The demographics of the do-not-call list
[security of data] . . . . . . . . . . . 34--39
S. E. Schechter Toward econometric models of the
security risk from remote attacks . . . 40--44
G. Danezis and
R. Anderson The economics of resisting censorship 45--50
J. Linn Technology and Web user data privacy ---
a survey of risks and countermeasures 52--58
A. Yasinsac and
M. Burmester Centers of academic excellence: a case
study . . . . . . . . . . . . . . . . . 62--65
H. H. Thompson Application penetration testing . . . . 66--69
I. Arce Bad peripherals . . . . . . . . . . . . 70--73
C. Adams Building secure Web-based environments:
understanding research
interrelationships through a
construction metaphor . . . . . . . . . 74--77
R. L. Trope Directors' digital fiduciary duties . . 78--82
B. Arkin and
S. Stender and
G. McGraw Software penetration testing . . . . . . 84--87
B. Schneier Authentication and Expiration . . . . . 88--88
M. Donner What's in a Name? . . . . . . . . . . . 4--5
S. A. Weiss Crypto 2004 . . . . . . . . . . . . . . 11--13
R. Iverson A Framework to Consider . . . . . . . . 14--14
R. Oppliger and
R. Rytz Does trusted computing remedy computer
security problems? . . . . . . . . . . . 16--19
A. Iliev and
S. W. Smith Protecting client privacy with trusted
computing at the server . . . . . . . . 20--28
D. N. Jutla and
P. Bodorik Sociotechnical architecture for online
privacy . . . . . . . . . . . . . . . . 29--39
S. L. Pfleeger and
G. Bloom Canning SPAM: Proposed solutions to
unwanted email . . . . . . . . . . . . . 40--47
R. Dodge and
D. Ragsdale Technology education at the US Military
Academy . . . . . . . . . . . . . . . . 49--53
R. A. Maxion and
R. R. M. Roberts Methodological foundations: enabling the
next generation of security . . . . . . 54--57
P. Oehlert Violating assumptions with fuzzing . . . 58--62
E. Levy Worm propagation and generic attacks . . 63--65
S. W. Smith Turing is from Mars, Shannon is from
Venus: computer science and computer
engineering . . . . . . . . . . . . . . 66--69
E. M. Power and
R. L. Trope Averting security missteps in
outsourcing . . . . . . . . . . . . . . 70--73
S. Barnum and
G. McGraw Knowledge for software security . . . . 74--78
D. Geer, Jr. The Problem Statement is the Problem . . 80--80
F. B. Schneider It Depends on What You Pay . . . . . . . 3--3
M. R. Stytz Under the Black Hat . . . . . . . . . . 5--5
L. McLaughlin Interview: Holistic Security . . . . . . 6--8
S. Landau and
M. R. Stytz Overview of cyber security: a crisis of
prioritization . . . . . . . . . . . . . 9--11
M. Amin Guest Editor's Introduction:
Infrastructure Security--Reliability and
Dependability of Critical Systems . . . 15--17
M. Sahinoglu Security meter: a practical
decision-tree model to quantify risk . . 18--24
Min Cai and
Kai Hwang and
Yu-Kwong Kwok and
Shanshan Song and
Yu Chen Collaborative Internet worm containment 25--33
S. L. Garfinkel and
A. Juels and
R. Pappu RFID privacy: an overview of problems
and proposed solutions . . . . . . . . . 34--43
T. J. Walsh and
D. R. Kuhn Challenges in securing voice over IP . . 44--49
A. Senior and
S. Pankanti and
A. Hampapur and
L. Brown and
Ying-Li Tian and
A. Ekin and
J. Connell and
Chiao Fe Shu and
M. Lu Enabling video privacy through computer
vision . . . . . . . . . . . . . . . . . 50--57
M. Donner A young geek's fancy turns to\ldots
science fiction? [Book recommendations] 58--60
C. E. Irvine and
M. F. Thompson and
K. Allen CyberCIEGE: gaming for information
assurance . . . . . . . . . . . . . . . 61--64
B. Snow Four ways to improve security . . . . . 65--67
P. Gutmann and
D. Naccache and
C. C. Palmer When hashes collide [applied
cryptography] . . . . . . . . . . . . . 68--71
R. Ford Malcode mysteries revealed [computer
viruses and worms] . . . . . . . . . . . 72--75
T. Holz A short visit to the bot zoo [malicious
bots software] . . . . . . . . . . . . . 76--79
C. Salka Programming languages and systems
security . . . . . . . . . . . . . . . . 80--83
M. Lesk Salute the broadcast flag [digital
protection for TV recording] . . . . . . 84--87
D. Taylor and
G. McGraw Adopting a software security improvement
program . . . . . . . . . . . . . . . . 88--91
S. Bellovin Security and Privacy: Enemies or Allies? 92--92
George Cybenko The One-Eyed Man Is King . . . . . . . . 4--5
Nathanael Paul A Closer Look at Viruses and Worms . . . 7
Benjamin Alfonsi Alliance Addresses VoIP Security . . . . 8
Axelle Apvrille and
Makan Pourzandi Secure Software Development by Example 10--17
Helayne T. Ray and
Raghunath Vemuri and
Hariprasad R. Kantubhukta Toward an Automated Attack Model for Red
Teams . . . . . . . . . . . . . . . . . 18--25
Michael Bailey and
Evan Cooke and
Farnam Jahanian and
David Watson and
Jose Nazario The Blaster Worm: Then and Now . . . . . 26--31
Dimitrios Lekkas and
Diomidis Spinellis Handling and Reporting Security
Advisories: a Scorecard Approach . . . . 32--41
Urs E. Gattiker EICAR 2005 . . . . . . . . . . . . . . . 45--48
Matt Bishop and
Deborah Frincke A Human Endeavor: Lessons from
Shakespeare and Beyond . . . . . . . . . 49--51
James Mulvenon Toward a Cyberconflict Studies Research
Agenda . . . . . . . . . . . . . . . . . 52--55
Peter Gutmann and
Ian Grigg Security Usability . . . . . . . . . . . 56--58
William H. Allen Computer Forensics . . . . . . . . . . . 59--62
Iván Arce The Land of the Blind . . . . . . . . . 63--67
Sara Sinclair and
S. W. Smith The TIPPI Point: Toward Trustworthy
Interfaces . . . . . . . . . . . . . . . 68--71
Martin R. Stytz Protecting Personal Privacy: Hauling
Down the Jolly Roger . . . . . . . . . . 72--74
Nancy R. Mead and
Gary McGraw A Portal for Software Security . . . . . 75--79
Marc Donner There Ain't No Inside, There Ain't No
Outside\ldots . . . . . . . . . . . . . 4--5
Katharine W. Webb Biometric Security Solutions . . . . . . 7
Heather Drinan and
Brent Kesler News Briefs . . . . . . . . . . . . . . 8--10
Laurianne McLaughlin From AWK to Google: Peter Weinberger
Talks Search . . . . . . . . . . . . . . 11--13
Barbara Carminati and
Elena Ferrari and
Patrick C. K. Hung Exploring Privacy Issues in Web Services
Discovery Agencies . . . . . . . . . . . 14--21
Bernardo A. Huberman and
Eytan Adar and
Leslie R. Fine Valuating Privacy . . . . . . . . . . . 22--25
Lance J. Hoffman and
Tim Rosenberg and
Ronald Dodge and
Daniel Ragsdale Exploring a National Cybersecurity
Exercise for Universities . . . . . . . 27--33
Fred B. Schneider and
Lidong Zhou Implementing Trustworthy Services Using
Replicated State Machines . . . . . . . 34--43
Robert W. Reeder and
Fahd Arshad Soups 2005 . . . . . . . . . . . . . . . 47--50
Peter Kuper The State of Security . . . . . . . . . 51--53
Matt Bishop and
Deborah A. Frincke Teaching Secure Programming . . . . . . 54--56
Ann Miller Trends in Process Control Systems
Security . . . . . . . . . . . . . . . . 57--60
David Naccache Finding Faults . . . . . . . . . . . . . 61--65
Peter Torr Demystifying the Threat-Modeling Process 66--70
David M. Nicol Modeling and Simulation in Security
Evaluation . . . . . . . . . . . . . . . 71--74
Kenneth R. van Wyk and
Gary McGraw Bridging the Gap between Software
Development and Information Security . . 75--79
Dan Geer When Is a Product a Security Product? 80
Martin Libicki Are RFIDs Coming to Get You? . . . . . . 6--6
Heather Drinan and
Nancy Fontaine and
Brent Kesler News Briefs . . . . . . . . . . . . . . 7--8
Laurianne McLaughlin Winning the Game of Risk: Neumann's Take
on Sound Design . . . . . . . . . . . . 9--12
Michah Sherr and
Eric Cronin and
Sandy Clark and
Matt Blaze Signaling vulnerabilities in wiretapping
systems . . . . . . . . . . . . . . . . 13--25
Susan Landau Security, wiretapping, and the Internet 26--33
Philip L. Campbell The denial-of-service dance . . . . . . 34--40
Stelios Sidiroglou and
Angelos D. Keromytis Countering network worms through
automatic patch generation . . . . . . . 41--49
Gregory Conti and
Mustaque Ahamad A framework for countering
denial-of-information attacks . . . . . 50--56
Faith M. Keikkila SecureWorld Expo 2005 . . . . . . . . . 57--60
Pinny Sheoran and
Oria Friesen and
Barbara J. Huffman de Belón Developing and Sustaining Information
Assurance: The Role of Community
Colleges (Part 1) . . . . . . . . . . . 61--63
Scott Borg Economically complex cyberattacks . . . 64--67
Gerald A. Marin Network security basics . . . . . . . . 68--72
S. W. Smith Pretending that systems are secure . . . 73--76
E. Michael Power and
Roland L. Trope Acting responsibly with geospatial data 77--80
Katrina Tsipenyuk and
Brian Chess and
Gary McGraw Seven pernicious kingdoms: a taxonomy of
software security errors . . . . . . . . 81--84
Ted Phillips and
Ttom Karygiannis and
Rick Kuhn Security standards for the RFID market 85--89
Anonymous 2005 Annual Index . . . . . . . . . . . 90--95
Bruce Schneier The Zotob Storm . . . . . . . . . . . . 96--96
George Cybenko Why Johnny Can't Evaluate Security Risk 5--5
Anonymous Special Thanks to S&P's Reviewers . . . . 7--8
Whitfield Diffie Chattering about SIGINT . . . . . . . . 9--9
Laurianne McLaughlin Philip Zimmermann on What's Next after
PGP? . . . . . . . . . . . . . . . . . . 10--13
Heather Drinan and
Nancy Fontaine and
Brent Kesler News Briefs . . . . . . . . . . . . . . 14--16
Edward W. Felten and
J. Alex Halderman Digital Rights Management, Spyware, and
Security . . . . . . . . . . . . . . . . 18--23
John G. Levine and
Julian B. Grizzard and
Henry L. Owen Detecting and Categorizing Kernel-Level
Rootkits to Aid Future Detection . . . . 24--32
Nir Kshetri The Simple Economics of Cybercrimes . . 33--39
Steven Cheung Denial of Service against the Domain
Name System . . . . . . . . . . . . . . 40--45
John Black and
Martin Cochran and
Ryan Gardner A Security Analysis of the Internet
Chess Club . . . . . . . . . . . . . . . 46--52
Christian Rechberger and
Vincent Rijmen and
Nicolas Sklavos The NIST Cryptographic Workshop on Hash
Functions . . . . . . . . . . . . . . . 54--56
Timothy Rosenberg and
Lance J. Hoffman Taking Networks on the Road: Portable
Solutions for Security Educators . . . . 57--60
Anonymous 2006 Editorial Calendar . . . . . . . . 61--61
Virgil D. Gligor and
Tom Haigh and
Dick Kemmerer and
Carl Landwehr and
Steve Lipner and
John McLean Information Assurance Technology
Forecast 2005 . . . . . . . . . . . . . 62--69
Jean-Sebastien Coron What Is Cryptography? . . . . . . . . . 70--73
Robert Seacord Secure Coding in C and C++: Of Strings
and Integers . . . . . . . . . . . . . . 74--76
Dragos Ruiu Learning from Information Security
History . . . . . . . . . . . . . . . . 77--79
Jeremy Epstein and
Scott Matsumoto and
Gary McGraw Software Security and SOA: Danger, Will
Robinson! . . . . . . . . . . . . . . . 80--83
Ramaswamy Chandramouli and
Scott Rose Challenges in Securing the Domain Name
System . . . . . . . . . . . . . . . . . 84--87
Steve Bellovin Unconventional Wisdom . . . . . . . . . 88--88
Marc Donner The Impending Debate . . . . . . . . . . 4--5
Mikhael Felker Internet War Games: Power of the Masses 7
Brent Kesler and
Heather Drinan and
Nancy Fontaine News Briefs . . . . . . . . . . . . . . 8--13
Kjell J. Hole and
Vebjòrn Moen and
Thomas Tjòstheim Case Study: Online Banking Security . . 14--20
Alain Hiltgen and
Thorsten Kramp and
Thomas Weigold Secure Internet Banking Authentication 21--29
WenJie Wang and
Yufei Yuan and
Norm Archer A Contextual Framework for Combating
Identity Theft . . . . . . . . . . . . . 30--38
David D. Hwang and
Patrick Schaumont and
Kris Tiri and
Ingrid Verbauwhede Securing Embedded Systems . . . . . . . 40--49
Feisal Keblawi and
Dick Sullivan Applying the Common Criteria in Systems
Engineering . . . . . . . . . . . . . . 50--55
Peter Kuper A Warning to Industry---Fix It or Lose
It . . . . . . . . . . . . . . . . . . . 56--60
Matt Bishop and
Deborah A. Frincke Who Owns Your Computer? . . . . . . . . 61--63
Rosario Gennaro Randomness in Cryptography . . . . . . . 64--67
James A. Whittaker and
Richard Ford How to Think about Security . . . . . . 68--71
Thorsten Holz and
Simon Marechal and
Frédéric Raynal New Threats and Attacks on the World
Wide Web . . . . . . . . . . . . . . . . 72--75
Scott Bradner The End of End-to-End Security? . . . . 76--79
Michael Lesk Should Indexing Be Fair Use? The Battle
over Google Book Search . . . . . . . . 80--83
John Steven Adopting an Enterprise Software Security
Framework . . . . . . . . . . . . . . . 84--87
William E. Burr Cryptographic Hash Standards: Where Do
We Go from Here? . . . . . . . . . . . . 88--91
Anonymous IEEE Security & Privacy 2006 Editorial
Calendar . . . . . . . . . . . . . . . . 92
Fred B. Schneider Here Be Dragons . . . . . . . . . . . . 3
Shari Lawrence Pfleeger Everything You Wanted to Know about
Privacy (But Were Afraid to Ask) . . . . 5
Brent Kesler and
Heather Drinan News Briefs . . . . . . . . . . . . . . 6--10
Gary McGraw Interview: Silver Bullet Speaks to Avi
Rubin . . . . . . . . . . . . . . . . . 11--13
James X. Dempsey and
Ira Rubinstein Guest Editors' Introduction: Lawyers and
Technologists---Joined at the Hip? . . . 15--19
Patricia L. Bellia The Fourth Amendment and Emerging
Communications Technologies . . . . . . 20--28
Albert Gidari Designing the Right Wiretap Solution:
Setting Standards under CALEA . . . . . 29--36
Erin Egan and
Tim Jucovy Building a Better Filter: How To Create
a Safer Internet and Avoid the
Litigation Trap . . . . . . . . . . . . 37--44
Charles D. Curran Combating Spam, Spyware, and Other
Desktop Intrusions: Legal Considerations
in Operating Trusted Intermediary
Technologies . . . . . . . . . . . . . . 45--51
Gregory P. Schaffer Worms and Viruses and Botnets, Oh My!:
Rational Responses to Emerging Internet
Threats . . . . . . . . . . . . . . . . 52--58
Pinny Sheoran and
Oris Friesen and
Barbara J. Huffman de Belón Developing and Sustaining Information
Assurance: The Role of Community
Colleges, Part 2 . . . . . . . . . . . . 60--65
Robin E. Bloomfield and
Sofia Guerra and
Ann Miller and
Marcelo Masera and
Charles B. Weinstock International Working Group on Assurance
Cases (for Security) . . . . . . . . . . 66--68
Kenneth G. Paterson and
Arnold K. L. Yau Lost in Translation: Theory and Practice
in Cryptography . . . . . . . . . . . . 69--72
Tuomas Aura Why You Shouldn't Study Security . . . . 74--76
Martin R. Stytz and
Sheila B. Banks Dynamic Software Security Testing . . . 77--79
Pravir Chandra and
Brian Chess and
John Steven Putting the Tools to Work: How to
Succeed with Source Code Analysis . . . 80--83
Anne Anderson Web Services Policies (Abstract) . . . . 84--87
Daniel E. Geer, Jr. Convergence (Abstract) . . . . . . . . . 88--88
Carl E. Landwehr Speaking of Privacy . . . . . . . . . . 4--5
Brent Kesler and
Heather Drinan News Briefs . . . . . . . . . . . . . . 6--8
Charles P. Pfleeger and
Shari Lawrence Pfleeger Why We Won't Review Books by Hackers . . 9
Gary McGraw Interview: Silver Bullet Speaks with Dan
Geer . . . . . . . . . . . . . . . . . . 10--13
Mike Andrews Guest Editor's Introduction: The State
of Web Security . . . . . . . . . . . . 14--15
J. D. Meier Web Application Security Engineering . . 16--24
John Viega and
Jeremy Epstein Why Applying Standards to Web Services
Is Not Enough . . . . . . . . . . . . . 25--31
Mark Curphey and
Rudolph Araujo Web Application Security Assessment
Tools . . . . . . . . . . . . . . . . . 32--41
Denis Verdon Security Policies and the Software
Developer . . . . . . . . . . . . . . . 42--49
Richard R. Brooks and
Christopher Vutsinas Kafka in the Academy: a Note on Ethics
in IA Education . . . . . . . . . . . . 50--53
Paulo E. Veríssimo and
Nuno F. Neves and
Christian Cachin and
Jonathan Poritz and
David Powell and
Yves Deswarte and
Robert Stroud and
Ian Welch Intrusion-Tolerant Middleware: The Road
to Automatic Security . . . . . . . . . 54--62
Roland L. Trope and
E. Michael Power Lessons for Laptops for the 18th Century 64--68
Melanie R. Rieback and
Bruno Crispo and
Andrew S. Tanenbaum RFID Malware: Truth vs. Myth . . . . . . 70--72
Michael Howard A Process for Performing Security Code
Reviews . . . . . . . . . . . . . . . . 74--79
Ivan Arce Voices, I Hear Voices . . . . . . . . . 80--83
Jonathan Herzog Applying Protocol Analysis to Security
Device Interfaces . . . . . . . . . . . 84--87
Gunnar Peterson Introduction to Identity Management Risk
Metrics . . . . . . . . . . . . . . . . 88--91
Jim Robbins and
John T. Sabo Managing Information Privacy: Developing
a Context for Security and Privacy
Standards Convergence . . . . . . . . . 92--95
Steven M. Bellovin On the Brittleness of Software and the
Infeasibility of Security Metrics . . . 96--96
Marc Donner Insecurity through Obscurity . . . . . . 4
Anonymous Letters to the Editor . . . . . . . . . 5
Geraldine MacDonald Cross-Border Transaction Liability . . . 7
Brandi Ortega News Briefs . . . . . . . . . . . . . . 8--10
Gary McGraw Interview: Silver Bullet Speaks to
Marcus Ranum . . . . . . . . . . . . . . 11--14
Matthew Geiger and
Lorrie Faith Cranor Scrubbing Stubborn Data: An Evaluation
of Counter-Forensic Privacy Tools . . . 16--25
Robert Thibadeau Trusted Computing for Disk Drives and
Other Peripherals . . . . . . . . . . . 26--33
Peng Shaunghe and
Han Zhen Enhancing PC Security with a U-Key . . . 34--39
Grant A. Jacoby and
Randy Marchany and
Nathaniel J. Davis IV Using Battery Constraints within Mobile
Hosts to Improve Network Security . . . 40--49
Brian Randell and
Peter Y. A. Ryan Voting Technologies and Trust . . . . . 50--56
Stephen A. Weis Privacy Enhancing Technologies . . . . . 59
Jill Slay and
Benjamin Turnbull Computer Security Education and Research
in Australia . . . . . . . . . . . . . . 60--63
Luther Martin Fitting Square Pegs into Round Holes . . 64--66
Sarah Gordon Understanding the Adversary: Virus
Writers and Beyond . . . . . . . . . . . 67--70
Elias Levy Worst-Case Scenario . . . . . . . . . . 71--73
Roland L. Trope Immaterial Transfers with Material
Consequences . . . . . . . . . . . . . . 74--78
Kenneth R. van Wyk and
John Steven Essential Factors for Successful
Software Security Awareness Training . . 80--83
Doug Montgomery and
Sandra Murphy Toward Secure Routing Infrastructures 84--87
Bruce Schneier University Networks and Data Security 88--88
George Cybenko Weak Links, Strong Ties . . . . . . . . 3
Anonymous Masthead . . . . . . . . . . . . . . . . 4
Eugene Spafford Desert Island Books . . . . . . . . . . 5
Brandi Ortega News Briefs . . . . . . . . . . . . . . 6--9
Gary McGraw Silver Bullet Speaks with Ed Felten . . 10--13
Anonymous RSA\reg Conference 2007 . . . . . . . . 14
Simson Garfinkel and
Michael D. Smith Guest Editors' Introduction: Data
Surveillance . . . . . . . . . . . . . . 15--17
Robert Popp and
John Poindexter Countering Terrorism through Information
and Privacy Protection Technologies . . 18--27
Jeff Jonas Threat and Fraud Intelligence, Las Vegas
Style . . . . . . . . . . . . . . . . . 28--34
Anonymous IEEE Computer Society Distance Learning
Campus . . . . . . . . . . . . . . . . . 35
David J. Chaboya and
Richard A. Raines and
Rusty O. Baldwin and
Barry E. Mullins Network Intrusion Detection: Automated
and Manual Methods Prone to Attack and
Evasion . . . . . . . . . . . . . . . . 36--43
Vincent C. S. Lee and
Linyi Shao Estimating Potential IT Security Losses:
An Alternative Quantitative Approach . . 44--52
Janice Y. Tsai and
Serge Egelman Soups 2006 . . . . . . . . . . . . . . . 53--55
Bradley S. Rubin and
Donald Cheung Computer Security Education and
Research: Handle with Care . . . . . . . 56--59
Phillip A. Porras Privacy-Enabled Global Threat Monitoring 60--63
John P. Tomaszewski Are You Sure You Had a Privacy Incident? 64--66
Vanessa Gratzer and
David Naccache Cryptography, Law Enforcement, and
Mobile Communications . . . . . . . . . 67--70
David Ladd A Software Procurement and Security
Primer . . . . . . . . . . . . . . . . . 71--73
Laree Kiely and
Terry V. Benzel Systemic Security Management . . . . . . 74--77
William Suchan and
Edward Sobiesk Strengthening the Weakest Link in
Digital Protection . . . . . . . . . . . 78--80
Gunnar Peterson and
John Steven Defining Misuse within the Development
Process . . . . . . . . . . . . . . . . 81--84
Peter Mell and
Karen Scarfone and
Sasha Romanosky Common Vulnerability Scoring System . . 85--89
Anonymous IEEE Security & Privacy 2006 Annual
Index, Volume 4 . . . . . . . . . . . . 90--95
Daniel E. Geer, Jr. Evidently Evidentiary . . . . . . . . . 96
Carl E. Landwehr New Challenges for the New Year . . . . 3--4
Anonymous Special Thanks to S&P's Reviewers . . . . 6--7
Ross Anderson Software Security: State of the Art . . 8
Gary McGraw Silver Bullet Speaks with John Stewart 9--11
Brandi Ortega News Briefs . . . . . . . . . . . . . . 12--15
Rolf Oppliger Providing Certified Mail Services on the
Internet . . . . . . . . . . . . . . . . 16--22
Marco Domenico Aime and
Giorgio Calandriello and
Antonio Lioy Dependability in Wireless Networks: Can
We Rely on WiFi? . . . . . . . . . . . . 23--29
Carol Woody and
Christopher Alberts Considering Operational Security Risk
during System Development . . . . . . . 30--35
Wade H. Baker and
Linda Wallace Is Information Security Under Control?:
Investigating Quality in Information
Security Management . . . . . . . . . . 36--44
Annie I. Antón and
Julia B. Eart and
Matthew W. Vail and
Neha Jain and
Carrie M. Gheen and
Jack M. Frink HIPAA's Effect on Web Site Privacy
Policies . . . . . . . . . . . . . . . . 45--52
Matt Bishop and
Deborah A. Frincke Achieving Learning Objectives through
E-Voting Case Studies . . . . . . . . . 53--56
Ravishankar K. Iyer and
Zbigniew Kalbarczyk and
Karthik Pattabiraman and
William Healey and
Wen-Mei W. Hwu and
Peter Klemperer and
Reza Farivar Toward Application-Aware Security and
Reliability . . . . . . . . . . . . . . 57--62
Willi Geiselmann and
Rainer Steinwandt Special-Purpose Hardware in
Cryptanalysis: The Case of 1,024-Bit RSA 63--66
Richard Ford and
William H. Allen How Not to Be Seen . . . . . . . . . . . 67--69
Adam J. O'Donnell The Evolutionary Microcosm of Stock Spam 70--72
Lori DeLooze Providing Web Service Security in a
Federated Environment . . . . . . . . . 73--75
John Morris and
Jon Peterson Who's Watching You Now? . . . . . . . . 76--79
Steve Bellovin DRM, Complexity, and Correctness . . . . 80
Fred Schneider Trusted Computing in Context . . . . . . 4--5
Brandi Ortega News Briefs . . . . . . . . . . . . . . 7--10
Gary McGraw Silver Bullet Speaks with Dorothy
Denning . . . . . . . . . . . . . . . . 11--14
Iván Arce A Surprise Party (on Your Computer)? . . 15--16
Luca Carettoni and
Claudio Merloni and
Stefano Zanero Studying Bluetooth Malware Propagation:
The BlueBag Project . . . . . . . . . . 17--25
Vanessa Gratzer and
David Naccache Alien vs. Quine . . . . . . . . . . . . 26--31
Carsten Willems and
Thorsten Holz and
Felix Freiling Toward Automated Dynamic Malware
Analysis Using CWSandbox . . . . . . . . 32--39
Robert Lyda and
James Hamrock Using Entropy Analysis to Find Encrypted
and Packed Malware . . . . . . . . . . . 40--45
Danilo Bruschi and
Lorenzo Martignoni and
Mattia Monga Code Normalization for Self-Mutating
Malware . . . . . . . . . . . . . . . . 46--54
Abhilasha Bhargav-Spantzel and
Anna C. Squicciarini and
Elisa Bertino Trust Negotiation in Identity Management 55--63
Marianthi Theoharidou and
Dimitris Gritazalis Common Body of Knowledge for Information
Security . . . . . . . . . . . . . . . . 64--67
Keye Martin Secure Communication without Encryption? 68--71
E. Michael Power and
Jonathan Gilhen and
Roland L. Trope Setting Boundaries at Borders:
Reconciling Laptop Searches and Privacy 72--75
Patrick P. Tsang When Cryptographers Turn Lead into Gold 76--79
Apu Kapadia A Case (Study) For Usability in Secure
Email Communication . . . . . . . . . . 80--84
Michael Lesk South Korea's Way to the Future . . . . 85--87
Elizabeth A. Nichols and
Gunnar Peterson A Metrics Framework to Drive Application
Security Improvement . . . . . . . . . . 88--91
Ramaswamy Chandramouli and
Philip Lee Infrastructure Standards for Smart ID
Card Deployment . . . . . . . . . . . . 92--96
Carl E. Landwehr Food for Thought: Improving the Market
for Assurance . . . . . . . . . . . . . 3--4
Gary McGraw Silver Bullet Talks with Becky Bace . . 6--9
Brandi Ortega News Briefs . . . . . . . . . . . . . . 10--12
Shari Lawrence Pfleeger and
Roland L. Trope and
Charles C. Palmer Guest Editors' Introduction: Managing
Organizational Security . . . . . . . . 13--15
M. Eric Johnson and
Eric Goetz Embedding Information Security into the
Organization . . . . . . . . . . . . . . 16--24
Shari Lawrence Pfleeger and
Martin Libicki and
Michael Webber I'll Buy That! Cybersecurity in the
Internet Marketplace . . . . . . . . . . 25--31
Roland L. Trope and
E. Michael Power and
Vincent I. Polley and
Bradford C. Morley A Coherent Strategy for Data Security
through Data Governance . . . . . . . . 32--39
David Rosenblum What Anyone Can Know: The Privacy Risks
of Social Networking Sites . . . . . . . 40--49
Walter S. Baer and
Andrew Parkinson Cyberinsurance in IT Security Management 50--56
Richard S. Swart and
Robert F. Erbacher Educating Students to Create Trustworthy
Systems . . . . . . . . . . . . . . . . 58--61
Matthew Carpenter and
Tom Liston and
Ed Skoudis Hiding Virtualization from Attackers and
Malware . . . . . . . . . . . . . . . . 62--65
Edward Sobiesk and
Gregory Conti The Cost of Free Web Tools . . . . . . . 66--68
Anna Lysyanskaya Authentication without Identification 69--71
Tina R. Knutson Building Privacy into Software Products
and Services . . . . . . . . . . . . . . 72--74
David Ahmad The Contemporary Software Security
Landscape . . . . . . . . . . . . . . . 75--77
M. Angela Sasse Red-Eye Blink, Bendy Shuffle, and the
Yuck Factor: a User Experience of
Biometric Airport Systems . . . . . . . 78--81
Michael N. Gagnon and
Stephen Taylor and
Anup K. Ghosh Software Protection through
Anti-Debugging . . . . . . . . . . . . . 82--84
Johan Peeters and
Paul Dyson Cost-Effective Security . . . . . . . . 85--87
Bruce Schneier Nonsecurity Considerations in Security
Decisions . . . . . . . . . . . . . . . 88
Marc Donner Cyberassault on Estonia . . . . . . . . 4
Brandi Ortega News Briefs . . . . . . . . . . . . . . 6--9
Gary McGraw and
Ross Anderson Silver Bullet Talks with Ross Anderson 10--13
Jennifer English and
David Coe and
Rhonda Gaede and
David Hyde and
Jeffrey Kulick MEMS-Assisted Cryptography for CPI
Protection . . . . . . . . . . . . . . . 14--21
Faith M. Heikkila Encryption: Security Considerations for
Portable Media Devices . . . . . . . . . 22--27
Jeffrey R. Jones Estimating Software Vulnerabilities . . 28--32
Jangbok Kim and
Kihyun Chung and
Kyunghee Choi Spam Filtering With Dynamically Updated
URL Statistics . . . . . . . . . . . . . 33--39
Christos K. Dimitriadis Improving Mobile Core Network Security
with Honeynets . . . . . . . . . . . . . 40--47
Sean Peisert and
Matt Bishop I Am a Scientist, Not a Philosopher! . . 48--51
Michael Franz Containing the Ultimate Trojan Horse . . 52--56
Sophie In 't Veld Data Sharing across the Atlantic . . . . 58--61
Onur Aciiçmez and
Jean-Pierre Seifert and
Çetin Kaya Koç Micro-Architectural Cryptanalysis . . . 62--64
William H. Allen Mixing Wheat with the Chaff: Creating
Useful Test Data for IDS Evaluation . . 65--67
Iván Arce Ghost in the Virtual Machine . . . . . . 68--71
Sergey Bratus What Hackers Learn that the Rest of Us
Don't: Notes on Hacker Curriculum . . . 72--75
Michael Lesk The New Front Line: Estonia under
Cyberassault . . . . . . . . . . . . . . 76--79
Suvajit Gupta and
Joel Winstead Using Attack Graphs to Design Systems 80--83
Pete Bramhall and
Marit Hansen and
Kai Rannenberg and
Thomas Roessler User-Centric Identity Management: New
Trends in Standardization and Regulation 84--87
Daniel E. Geer The End of Black and White . . . . . . . 88
Fred B. Schneider Technology Scapegoats and Policy Saviors 3--4
Anonymous Interface . . . . . . . . . . . . . . . 5
Shari Lawrence Pfleeger Spooky Lessons . . . . . . . . . . . . . 7
Gary McGraw Interview: Silver Bullet Talks with
Annie Antón . . . . . . . . . . . . . . . 8--11
Brandi Ortega News Briefs . . . . . . . . . . . . . . 12--14
Paul N. Otto and
Annie I. Antón and
David L. Baumer The ChoicePoint Dilemma: How Data
Brokers Should Handle the Privacy of
Personal Information . . . . . . . . . . 15--23
Apostol T. Vassilev and
Bertrand du Castel and
Asad M. Ali Personal Brokerage of Web Service Access 24--31
Frank J. Mabry and
John R. James and
Aaron J. Ferguson Unicode Steganographic Exploits:
Maintaining Enterprise Border Security 32--39
Barry E. Mullins and
Timothy H. Lacey and
Robert F. Mills and
Joseph E. Trechter and
Samuel D. Bass How the Cyber Defense Exercise Shaped an
Information-Assurance Curriculum . . . . 40--49
Ilan Oshri and
Julia Kotlarsky and
Corey Hirsch An Information Security Strategy for
Networkable Devices . . . . . . . . . . 50--56
Jonathan Caulkins and
Eric D. Hough and
Nancy R. Mead and
Hassan Osman Optimizing Investments in Security
Countermeasures: a Practical Tool for
Fixed Budgets . . . . . . . . . . . . . 57--60
Julie J. C. H. Ryan Plagiarism, Graduate Education, and
Information Security . . . . . . . . . . 62--65
David Fraser The Canadian Response to the USA Patriot
Act . . . . . . . . . . . . . . . . . . 66--68
Vanessa Gratzer and
David Naccache Trust on a Nationwide Scale . . . . . . 69--71
Dianne Solomon Balancing Privacy and Risk in the
E-Messaging World . . . . . . . . . . . 72--75
Gary McGraw and
Greg Hoglund Online Games and Security . . . . . . . 76--79
Fred Dushin and
Eric Newcomer Handling Multiple Credentials in a
Heterogeneous SOA Environment . . . . . 80--82
Roger Dingledine and
Nick Mathewson and
Paul Syverson Deploying Low-Latency Anonymity: Design
Challenges and Social Factors . . . . . 83--87
Steve Bellovin Seers and Craftspeople . . . . . . . . . 88
Carl E. Landwehr Revolution through Competition? . . . . 3--4
Brandi Ortega News Briefs . . . . . . . . . . . . . . 6--7
Gary McGraw Interview: Silver Bullet Talks with
Mikko Hyppönen . . . . . . . . . . . . . 8--11
Martin R. Stytz What Are the Numbers? . . . . . . . . . 12
Markus Jakobsson and
Sid Stamm Web Camouflage: Protecting Your Clients
from Browser-Sniffing Attacks . . . . . 16--24
Kjell J. Hole and
Vebjòrn Moen and
André N. Klingsheim and
Knut M. Tande Lessons from the Norwegian ATM System 25--31
Ugo Piazzalunga and
Paolo Salvaneschi and
Francesco Balducci and
Pablo Jacomuzzi and
Cristiano Moroncelli Security Strength Measurement for
Dongle-Protected Software . . . . . . . 32--40
Ninghui Li and
Ji-Won Byun and
Elisa Bertino A Critique of the ANSI Standard on
Role-Based Access Control . . . . . . . 41--49
David Ferraiolo and
Rick Kuhn and
Ravi Sandhu RBAC Standard Rationale: Comments on ``A
Critique of the ANSI Standard on
Role-Based Access Control'' . . . . . . 51--53
Pythagoras Petratos Weather, Information Security, and
Markets . . . . . . . . . . . . . . . . 54--57
E. Michael Power Developing a Culture of Privacy: a Case
Study . . . . . . . . . . . . . . . . . 58--60
Serge Vaudenay E-Passport Threats . . . . . . . . . . . 61--64
Richard Ford and
William H. Allen How Not to Be Seen II: The Defenders
Fight Back . . . . . . . . . . . . . . . 65--68
David McKinney Vulnerability Bazaar . . . . . . . . . . 69--73
Luiz Felipe Perrone Could a Caveman Do It? The Surprising
Potential of Simple Attacks . . . . . . 74--77
Martin R. Stytz Who Are the Experts, and What Have They
Done for Us Lately? . . . . . . . . . . 78--80
John Steven and
Gunnar Peterson Metricon 2.0 . . . . . . . . . . . . . . 81--83
Matt Bishop About Penetration Testing . . . . . . . 84--87
Bruce Schneier The Death of the Security Industry . . . 88
Marc Donner Charge of the Light Brigade . . . . . . 5--5
Brandi Ortega News Briefs . . . . . . . . . . . . . . 6--8
Eugene Spafford James P. Anderson: An Information
Security Pioneer . . . . . . . . . . . . 9
Gary McGraw Interview: Silver Bullet Talks with
Eugene Spafford . . . . . . . . . . . . 10--15
Steven M. Bellovin and
Terry V. Benzel and
Bob Blakley and
Dorothy E. Denning and
Whitfield Diffie and
Jeremy Epstein and
Paulo Veríssimo Information Assurance Technology
Forecast 2008 . . . . . . . . . . . . . 16--23
Steven M. Bellovin and
Matt Blaze and
Whitfield Diffie and
Susan Landau and
Peter G. Neumann and
Jennifer Rexford Risking Communications Security:
Potential Hazards of the Protect America
Act . . . . . . . . . . . . . . . . . . 24--33
Siani Pearson and
Marco Casassa-Mont and
Manny Novoa Securing Information Transfer in
Distributed Computing Environments . . . 34--42
Anirban Chakrabarti and
Anish Damodaran and
Shubhashis Sengupta Grid Computing Security: a Taxonomy . . 44--51
David John Leversage and
Eric James Byres Estimating a System's Mean
Time-to-Compromise . . . . . . . . . . . 52--60
Frank L. Greitzer and
Andrew P. Moore and
Dawn M. Cappelli and
Dee H. Andrews and
Lynn A. Carroll and
Thomas D. Hull Combating the Insider Cyber Threat . . . 61--64
Martim Carbone and
Diego Zamboni and
Wenke Lee Taming Virtualization . . . . . . . . . 65--67
Aleksey Kolupaev and
Juriy Ogijenko CAPTCHAs: Humans vs. Bots . . . . . . . 68--70
Michael Howard Becoming a Security Expert . . . . . . . 71--73
Dave Ahmad The Confused Deputy and the Domain
Hijacker . . . . . . . . . . . . . . . . 74--77
Michael Lesk Forum Shopping on the Internet . . . . . 78--80
Edward Bonver Security Testing of Internal Tools . . . 81--83
Ed Coyne and
Tim Weil An RBAC Implementation and
Interoperability Standard: The INCITS
Cyber Security 1.1 Model . . . . . . . . 84--87
Dan Geer and
Daniel Conway What We Got for Christmas . . . . . . . 88
Marc Donner Lessons from Electrification for
Identification . . . . . . . . . . . . . 3
Simson Garfinkel Sharp Figures, Fuzzy Purpose . . . . . . 5
Gary McGraw Interview: Silver Bullet Talks with Ed
Amoroso . . . . . . . . . . . . . . . . 6--9
Brandi Ortega News Briefs . . . . . . . . . . . . . . 10--12
Susan Landau and
Deirdre K. Mulligan I'm Pc01002/SpringPeeper/ED288l.6; Who
are You? . . . . . . . . . . . . . . . . 13--15
Eve Maler and
Drummond Reed The Venn of Identity: Options and Issues
in Federated Identity Management . . . . 16--23
Rachna Dhamija and
Lisa Dusseault The Seven Flaws of Identity Management:
Usability and Security Challenges . . . 24--29
James L. Wayman Biometrics in Identity Management
Systems . . . . . . . . . . . . . . . . 30--37
Marit Hansen and
Ari Schwartz and
Alissa Cooper Privacy and Identity Management . . . . 38--45
Alessandro Acquisti Identity Management, Privacy, and Price
Discrimination . . . . . . . . . . . . . 46--50
Robin McKenzie and
Malcolm Crompton and
Colin Wallis Use Cases for Identity Management in
E-Government . . . . . . . . . . . . . . 51--57
Thomas E. Dube and
Bobby D. Birrer and
Richard A. Raines and
Rusty O. Baldwin and
Barry E. Mullins and
Robert W. Bennington and
Christopher E. Reuter Hindering Reverse Engineering: Thinking
Outside the Box . . . . . . . . . . . . 58--65
Markus Jakobsson and
Nathaniel Johnson and
Peter Finn Why and How to Perform Fraud Experiments 66--68
Eric Levieil and
David Naccache Cryptographic Test Correction . . . . . 69--71
Marco Carvalho Security in Mobile Ad Hoc Networks . . . 72--75
David McKinney New Hurdles for Vulnerability Disclosure 76--78
Michael E. Locasto and
Angelos Stavrou The Hidden Difficulties of Watching and
Rebuilding Networks . . . . . . . . . . 79--82
Patrick Harding and
Leif Johansson and
Nate Klingenstein Dynamic Security Assertion Markup
Language: Simplifying Single Sign-On . . 83--85
Daniel E. Geer, Jr. and
Daniel G. Conway Beware the IDs of March . . . . . . . . 87
Steve Bellovin Security by Checklist . . . . . . . . . 88
Carl E. Landwehr Up Scope . . . . . . . . . . . . . . . . 3--4
Brandi Ortega News Briefs . . . . . . . . . . . . . . 6--8
Gary McGraw Interview: Silver Bullet Talks with Jon
Swartz . . . . . . . . . . . . . . . . . 9--11
Aviel D. Rubin and
David R. Jefferson New Research Results for Electronic
Voting . . . . . . . . . . . . . . . . . 12--13
Altair O. Santin and
Regivaldo G. Costa and
Carlos A. Maziero A Three-Ballot-Based Secure Electronic
Voting System . . . . . . . . . . . . . 14--21
Alec Yasinsac and
Matt Bishop The Dynamics of Counting and Recounting
Votes . . . . . . . . . . . . . . . . . 22--29
Nirwan Ansari and
Pitipatana Sakarindr and
Ehsan Haghani and
Chao Zhang and
Aridaman K. Jain and
Yun Q. Shi Evaluating Electronic Voting Systems
Equipped with Voter-Verified Paper
Records . . . . . . . . . . . . . . . . 30--39
David Chaum and
Aleks Essex and
Richard Carback and
Jeremy Clark and
Stefan Popoveniuc and
Alan Sherman and
Poorvi Vora Scantegrity: End-to-End Voter-Verifiable
Optical-Scan Voting . . . . . . . . . . 40--46
Iñaki Goirizelaia and
Ted Selker and
Maider Huarte and
Juanjo Unzilla An Optical Scan E-Voting System based on
N-Version Programming . . . . . . . . . 47--53
Lynn Batten and
Lei Pan Teaching Digital Forensics to
Undergraduate Students . . . . . . . . . 54--56
Gordon Hughes and
Sophie Dawson and
Tim Brookes Considering New Privacy Laws in
Australia . . . . . . . . . . . . . . . 57--59
William E. Burr A New Hash Competition . . . . . . . . . 60--62
John R. Michener Common Permissions in Microsoft Windows
Server 2008 and Windows Vista . . . . . 63--67
Adam J. O'Donnell When Malware Attacks (Anything but
Windows) . . . . . . . . . . . . . . . . 68--70
Sergey Bratus and
Chris Masone and
Sean W. Smith Why Do Street-Smart People Do Stupid
Things Online? . . . . . . . . . . . . . 71--74
Michael Lesk Digital Rights Management and
Individualized Pricing . . . . . . . . . 76--79
Jeremy Epstein Security Lessons Learned from Société
Générale . . . . . . . . . . . . . . . . . 80--82
Sheila Frankel and
David Green Internet Protocol Version 6 . . . . . . 83--86
Daniel E. Geer, Jr. Learn by Analogy or Die Trying . . . . . 88, 87
Fred B. Schneider Network Neutrality versus Internet
Trustworthiness? . . . . . . . . . . . . 3--4
Gary McGraw Interview: Silver Bullet Talks with Adam
Shostack . . . . . . . . . . . . . . . . 6--10
Brandi Ortega News Briefs . . . . . . . . . . . . . . 11--13
Kjell J. Hole and
Lars-Helge Netland and
Yngve Espelid and
André N. Klingsheim and
Hallvar Helleseth and
Jan B. Henriksen Open Wireless Networks on University
Campuses . . . . . . . . . . . . . . . . 14--20
Abdul (Ali) Razaq and
Wai Tong Luk and
Kam Man Shum and
Lee Ming Cheng and
Kai Ning Yung Second-Generation RFID . . . . . . . . . 21--27
Sameer Pai and
Sergio Bermudez and
Stephen B. Wicker and
Marci Meingast and
Tanya Roosta and
Shankar Sastry and
Deirdre K. Mulligan Transactional Confidentiality in Sensor
Networks . . . . . . . . . . . . . . . . 28--35
Thomas Weigold and
Thorsten Kramp and
Michael Baentsch Remote Client Authentication . . . . . . 36--43
Alexander Pretschner and
Manuel Hilty and
Florian Schütz and
Christian Schaefer and
Thomas Walter Usage Control Enforcement: Present and
Future . . . . . . . . . . . . . . . . . 44--53
Lillian Ròstad and
Gunnar René Òie and
Inger Anne Tòndel and
Per Håkon Meland Learning by Failing (and Fixing) . . . . 54--56
Anonymous Call for Papers: Online Gaming Security 57--57
Khaled El Emam Heuristics for De-identifying Health
Data . . . . . . . . . . . . . . . . . . 58--61
Justin Troutman The Virtues of Mature and Minimalist
Cryptography . . . . . . . . . . . . . . 62--65
Joel Predd and
Shari Lawrence Pfleeger and
Jeffrey Hunker and
Carla Bulford Insiders Behaving Badly . . . . . . . . 66--70
Anonymous 2008 Membership advertisement . . . . . 71--73
Susan Landau Security and Privacy Landscape in
Emerging Technologies . . . . . . . . . 74--77
Daniel E. Geer, Jr. and
Daniel G. Conway Strong Attractors . . . . . . . . . . . 78--79
Bruce Schneier How the Human Brain Buys Security . . . 80--80
Anonymous Corporate Network Security advertisement c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IT Security World advertisement . . . . c2--c2
Anonymous Usenix Security Symposium advertisement c4--c4
Carl E. Landwehr From the Editors: Cybersecurity and
Artificial Intelligence: From Fixing the
Plumbing to Smart Water . . . . . . . . 3--4
Martin R. Stytz Book Reviews: The Shape of Crimeware to
Come . . . . . . . . . . . . . . . . . . 5--5
Gary McGraw Interview: Silver Bullet Talks with Bill
Cheswick . . . . . . . . . . . . . . . . 7--11
Brandi Ortega News Briefs . . . . . . . . . . . . . . 12--13
Samuel T. King and
Sean W. Smith Guest Editors' Introduction:
Virtualization and Security: Back to the
Future . . . . . . . . . . . . . . . . . 15--15
Paul A. Karger and
David R. Safford Virtualization: I/O for Virtual Machine
Monitors: Security and Performance
Issues . . . . . . . . . . . . . . . . . 16--23
Ronald Perez and
Leendert van Doorn and
Reiner Sailer Virtualization and Hardware-Based
Security . . . . . . . . . . . . . . . . 24--31
Kara Nance and
Matt Bishop and
Brian Hay Virtual Machine Introspection:
Observation or Interference? . . . . . . 32--37
Julie J. C. H. Ryan and
Daniel J. Ryan Risk Management: Performance Metrics for
Information Security Risk Management . . 38--44
Panayiotis Kotzanikolaou Data Privacy: Data Retention and Privacy
in Electronic Communications . . . . . . 46--52
Matt Bishop and
Deborah A. Frincke Education: Information Assurance
Education: a Work In Progress . . . . . 54--57
Peter McLaughlin Privacy Interests: Cross-Border Data
Flows and Increased Enforcement . . . . 58--61
Luther Martin Crypto Corner: Identity-Based Encryption
and Beyond . . . . . . . . . . . . . . . 62--64
Wei Yan and
Zheng Zhang and
Nirwan Ansari Basic Training: Revealing Packed Malware 65--69
David Ahmad Attack Trends: Two Years of Broken
Crypto: Debian's Dress Rehearsal for a
Global PKI Compromise . . . . . . . . . 70--73
Camilo Viecco and
Jean Camp Secure Systems: a Life or Death InfoSec
Subversion . . . . . . . . . . . . . . . 74--76
Roland L. Trope and
Monique Witt and
William J. Adams Digital Protection: Hardening the Target 77--81
Edward Bonver and
Michael Cohen Building Security In: Developing and
Retaining a Security Testing Mindset . . 82--85
Daniel E. Geer, Jr. and
Daniel G. Conway For Good Measure: Type II Reverse
Engineering . . . . . . . . . . . . . . 86--87
Steven M. Bellovin Clear Text: The Puzzle of Privacy . . . 88--88
Bret Michael From the Editors: Are Governments Up to
the Task? . . . . . . . . . . . . . . . 4--5
Gary McGraw Interview: Silver Bullet Talks with Matt
Bishop . . . . . . . . . . . . . . . . . 6--10
O. Sami Saydjari Spotlight: Launching into the Cyberspace
Race: An Interview with Melissa E.
Hathaway . . . . . . . . . . . . . . . . 11--17
James Figueroa and
Brandi Ortega News: Shaking Up the Cybersecurity
Landscape . . . . . . . . . . . . . . . 18--21
Ron Trellue and
Charles C. Palmer Guest Editors' Introduction: Process
Control System Security: Bootstrapping a
Legacy . . . . . . . . . . . . . . . . . 22--23
Markus Brändle and
Martin Naedele Process Control Security: Security for
Process Control Systems: An Overview . . 24--29
David M. Nicol and
William H. Sanders and
Sankalp Singh and
Mouna Seri Usable Global Network Access Policy for
Process Control Systems . . . . . . . . 30--36
Raymond C. Parks and
Edmond Rogers Vulnerability Assessment for Critical
Infrastructure Control Systems . . . . . 37--43
Alysson Neves Bessani and
Paulo Sousa and
Miguel Correia and
Nuno Ferreira Neves and
Paulo Veríssimo The Crutial Way of Critical
Infrastructure Protection . . . . . . . 44--51
Bertrand Mathieu and
Saverio Niccolini and
Dorgham Sisalem Voice over IP: SDRS: a Voice-over-IP
Spam Detection and Reaction System . . . 52--59
Shane Balfe and
Eimear Gallery and
Chris J. Mitchell and
Kenneth G. Paterson Trusted Computing: Challenges for
Trusted Computing . . . . . . . . . . . 60--66
Yuen-Yan Chan and
Victor K. Wei Education: Teaching for Conceptual
Change in Security Awareness . . . . . . 67--69
Kirk J. Nahra Privacy Interests: HIPAA Security
Enforcement Is Here . . . . . . . . . . 70--72
Chengyun Chu Basic Training: Introduction to
Microsoft .NET Security . . . . . . . . 73--78
Jeremiah Grossman Attack Trends: Five User-Customizable
Web Site Security Features . . . . . . . 79--81
John Steven Building Security In: State of
Application Assessment . . . . . . . . . 82--85
Daniel E. Geer, Jr. and
Daniel G. Conway For Good Measure: Security Is a Subset
of Reliability . . . . . . . . . . . . . 86--87
Daniel E. Geer, Jr. Clear Text: Complexity Is the Enemy . . 88--88
Anonymous Annual Index . . . . . . . . . . . . . . 0--0
Marc Donner From the Editors: Reading (with) the
Enemy . . . . . . . . . . . . . . . . . 3--3
Brandi Ortega News Briefs: Shaking Up the
Cybersecurity Landscape . . . . . . . . 5--6
Gary McGraw Interview: Silver Bullet Talks with
Gunnar Peterson . . . . . . . . . . . . 7--11
Jaynarayan H. Lala and
Fred B. Schneider Guest Editors' Introduction: IT
Monoculture Security Risks and Defenses 12--13
Kenneth P. Birman and
Fred B. Schneider IT Monoculture: The Monoculture Risk Put
into Context . . . . . . . . . . . . . . 14--17
Angelos D. Keromytis Randomized Instruction Sets and Runtime
Environments Past Research and Future
Directions . . . . . . . . . . . . . . . 18--25
Daniel Williams and
Wei Hu and
Jack W. Davidson and
Jason D. Hiser and
John C. Knight and
Anh Nguyen-Tuong Security through Diversity: Leveraging
Virtual Machine Technology . . . . . . . 26--33
Kjell J. Hole and
André N. Klingsheim and
Lars-Helge Netland and
Yngve Espelid and
Thomas TjÒstheim and
VebjÒrn Moen Assessing PKI: Risk Assessment of a
National Security Infrastructure . . . . 34--41
Michel Cukier and
Susmit Panjwani Vulnerability Remediation: Prioritizing
Vulnerability Remediation by Determining
Attacker-Targeted Vulnerabilities . . . 42--48
William Enck and
Machigar Ongtang and
Patrick McDaniel Focus: Understanding Android Security 50--57
Susan Landau Perspectives: The NRC Takes on Data
Mining, Behavioral Surveillance, and
Privacy . . . . . . . . . . . . . . . . 58--62
Bret Michael and
Jeffrey Voas and
Phil Laplante It All Depends: Cyberpandemics: History,
Inevitability, Response . . . . . . . . 63--67
Yuen-Yan Chan and
Victor K. Wei Education: Teaching for Conceptual
Change in Security Awareness: a Case
Study in Higher Education . . . . . . . 68--71
Patricia Kosseim and
Khaled El Emam Privacy Interests: Privacy Interests in
Prescription Data, Part I: Prescriber
Privacy . . . . . . . . . . . . . . . . 72--76
Franco Callegati and
Walter Cerroni and
Marco Ramilli Basic Training: Man-in-the-Middle Attack
to the HTTPS Protocol . . . . . . . . . 78--81
Phillip Porras Attack Trends: Directions in
Network-Based Security Monitoring . . . 82--85
Daniel E. Geer, Jr. and
Daniel G. Conway For Good Measure: The Owned Price Index 86--87
Bruce Schneier Clear Text: Architecture of Privacy . . 88--88
Fred B. Schneider From the Editors: Accountability for
Perfection . . . . . . . . . . . . . . . 3--4
Anonymous Special Thanks: Special Thanks to S&P's
Peer Reviewers . . . . . . . . . . . . . 5--6
Brandi Ortega News Briefs . . . . . . . . . . . . . . 8--9
Gary McGraw Interview: Silver Bullet Talks with
Jeremiah Grossman . . . . . . . . . . . 10--14
Shari Lawrence Pfleeger Book Reviews: Searching for You . . . . 15--15
Michael A. Caloyannides and
Nasir Memon and
Wietse Venema Guest Editors' Introduction: Digital
Forensics . . . . . . . . . . . . . . . 16--17
Michael A. Caloyannides Forensics Is So ``Yesterday'' . . . . . 18--25
Brian D. Carrier Digital Forensics Works . . . . . . . . 26--29
Brian Hay and
Matt Bishop and
Kara Nance Live Analysis: Progress and Challenges 30--37
Simson L. Garfinkel and
James J. Migletz New XML-Based Files Implications for
Forensics . . . . . . . . . . . . . . . 38--44
Gavin W. Manes and
Elizabeth Downing Overview of Licensing and Legal Issues
for Digital Forensic Investigators . . . 45--48
Vassil Roussev Hashing and Data Fingerprinting in
Digital Forensics . . . . . . . . . . . 49--55
Sarah Spiekermann and
Sergei Evdokimov Authentication: Critical RFID
Privacy-Enhancing Technologies . . . . . 56--62
John Harauz and
Lori M. Kaufman It All Depends: a New Era of
Presidential Security: The President and
His BlackBerry . . . . . . . . . . . . . 67--70
Jungwoo Ryoo and
Angsana Techatassanasoontorn and
Dongwon Lee Education: Security Education Using
Second Life . . . . . . . . . . . . . . 71--74
Khaled El Emam and
Patricia Kosseim Privacy Interests: Privacy Interests in
Prescription Data, Part 2: Patient
Privacy . . . . . . . . . . . . . . . . 75--78
Julien Brouchier and
Tom Kean and
Carol Marsh and
David Naccache Crypto Corner: Temperature Attacks . . . 79--82
Martin Gilje Jaatun and
Jostein Jensen and
Håvard Vegge and
Finn Michael Halvorsen and
Rune Walsò Nergård Attack Trends: Fools Download Where
Angels Fear to Tread . . . . . . . . . . 83--86
Michael Zhivich and
Robert K. Cunningham Secure Systems: The Real Cost of
Software Errors . . . . . . . . . . . . 87--90
Gunnar Peterson Building Security In: Service-Oriented
Security Indications for Use . . . . . . 91--93
Daniel E. Geer, Jr. and
Daniel G. Conway For Good Measure: Hard Data Is Good to
Find . . . . . . . . . . . . . . . . . . 94--95
Steven M. Bellovin Clear Text: The Government and
Cybersecurity . . . . . . . . . . . . . 96--96
Carl E. Landwehr From the Editors: a National Goal for
Cyberspace: Create an Open, Accountable
Internet . . . . . . . . . . . . . . . . 3--4
James Figueroa News Briefs . . . . . . . . . . . . . . 6--7
James McGovern Interview: Silver Bullet Talks with Gary
McGraw . . . . . . . . . . . . . . . . . 8--10
Gary McGraw and
Ming Chow Securing Online Games: Guest Editors'
Introduction: Securing Online Games:
Safeguarding the Future of Software
Security . . . . . . . . . . . . . . . . 11--12
Stephen Bono and
Dan Caselden and
Gabriel Landau and
Charlie Miller Reducing the Attack Surface in Massively
Multiplayer Online Role-Playing Games 13--19
Aaron Portnoy and
Ali Rizvi-Santiago Walking on Water: a Cheating Case Study 20--22
Sean F. Kane Virtual Judgment: Legal Implications of
Online Gaming . . . . . . . . . . . . . 23--28
Stefan Mitterhofer and
Christopher Kruegel and
Engin Kirda and
Christian Platzer Server-Side Bot Detection in Massively
Multiplayer Online Games . . . . . . . . 29--36
Jeff Yan and
Brian Randell An Investigation of Cheating in Online
Games . . . . . . . . . . . . . . . . . 37--44
M. Eric Johnson and
Eric Goetz and
Shari Lawrence Pfleeger Information Risk: Security through
Information Risk Management . . . . . . 45--52
Michael E. Locasto Education: Helping Students Own Their
Own Code . . . . . . . . . . . . . . . . 53--56
Vijay Varadharajan On the Horizon: a Note on Trust-Enhanced
Security . . . . . . . . . . . . . . . . 57--59
Marc Donner Biblio Tech: War Stories . . . . . . . . 60--63
Gregory Conti and
Edward Sobiesk Privacy Interests: Malicious Interfaces
and Personalization's Uninviting Future 64--67
Michael Howard Basic Training: Improving Software
Security by Eliminating the CWE Top 25
Vulnerabilities . . . . . . . . . . . . 68--71
Bojan Zdrnja Attack Trends: Malicious JavaScript
Insertion through ARP Poisoning Attacks 72--74
Patrick McDaniel and
Stephen McLaughlin Secure Systems: Security and Privacy
Challenges in the Smart Grid . . . . . . 75--77
Michael Lesk Security & Privacy Economics: Reading
Over Your Shoulder . . . . . . . . . . . 78--81
Anton Chuvakin and
Gunnar Peterson Building Security In: Logging in the Age
of Web Services . . . . . . . . . . . . 82--85
Daniel E. Geer, Jr. and
Daniel G. Conway For Good Measure: a Doubt of the Benefit 86--87
Daniel E. Geer, Jr. ClearText: Digital Endosymbiosis . . . . 88--88
Marc Donner From the Editors: New Models for Old . . 3--4
Anonymous Interface: Letters to the Editor . . . . 6--7
James Figueroa News Briefs . . . . . . . . . . . . . . 8--10
Gary McGraw Interview: Silver Bullet Talks with
Virgil Gligor . . . . . . . . . . . . . 11--14
Herbert Lin Special Report: Lifting the Veil on
Cyber Offense . . . . . . . . . . . . . 15--21
Jeff Yan and
Ahmad Salah El Ahmad Pixel-Count Attacks: CAPTCHA Security: a
Case Study . . . . . . . . . . . . . . . 22--28
Gordon F. Hughes and
Tom Coughlin and
Daniel M. Commins Secure Data Sanitization: Disposal of
Disk and Tape Data by Secure
Sanitization . . . . . . . . . . . . . . 29--34
Qun Ni and
Elisa Bertino and
Jorge Lobo and
Seraphin B. Calo Access Control: Privacy-Aware Role-Based
Access Control . . . . . . . . . . . . . 35--43
Michael Meike and
Johannes Sametinger and
Andreas Wiesauer Internet Security: Security in Open
Source Web Content Management Systems 44--51
Rachel Rue and
Shari Lawrence Pfleeger Cybersecurity: Making the Best Use of
Cybersecurity Economic Models . . . . . 52--60
Lori M. Kaufman It All Depends: Data Security in the
World of Cloud Computing . . . . . . . . 61--64
Janne Hagen Education: Human Relationships: a
Never-Ending Security Education
Challenge? . . . . . . . . . . . . . . . 65--67
Betsy Masiello Privacy Interests: Deconstructing the
Privacy Experience . . . . . . . . . . . 68--70
Justin Troutman and
Vincent Rijmen Crypto Corner: Green Cryptography:
Cleaner Engineering through Recycling 71--73
Ronda Henning Basic Training: Predictable Surprises 74--76
Patrick Traynor Secure Systems: Securing Cellular
Infrastructure: Challenges and
Opportunities . . . . . . . . . . . . . 77--79
Jeffrey K. MacKie-Mason Security & Privacy Economics:
Incentive-Centered Design for Security 80--83
Andy Steingruebl and
Gunnar Peterson Building Security In: Software
Assumptions Lead to Preventable Errors 84--87
Bruce Schneier Clear Text: Security, Group Size, and
the Human Brain . . . . . . . . . . . . 88--88
Bret Michael From the Editors: In Clouds Shall We
Trust? . . . . . . . . . . . . . . . . . 3--3
Gary McGraw Interview: Silver Bullet Talks with Bob
Blakley . . . . . . . . . . . . . . . . 5--8
James Figueroa News Briefs . . . . . . . . . . . . . . 9--10
Daniel Massey and
Dorothy E. Denning Securing the Domain Name System: Guest
Editors' Introduction . . . . . . . . . 11--13
Ioannis Avramopoulos and
Martin Suchara Protecting the DNS from Routing Attacks:
Two Alternative Anycast Implementations 14--20
D. Kevin McGrath and
Andrew Kalafut and
Minaxi Gupta Phishing Infrastructure Fluxes All the
Way . . . . . . . . . . . . . . . . . . 21--28
Ramaswamy Chandramouli and
Scott Rose Open Issues in Secure DNS Deployment . . 29--35
Wouter C. A. Wijngaards and
Benno J. Overeinder Securing DNS: Extending DNS Servers with
a DNSSEC Validator . . . . . . . . . . . 36--43
Eric Osterweil and
Lixia Zhang Interadministrative Challenges in
Managing DNSKEYs . . . . . . . . . . . . 44--51
Kara Nance Education: Teach Them When They Aren't
Looking: Introducing Security in CS1 . . 53--55
Scott Charney On the Horizon: The Evolution of Online
Identity . . . . . . . . . . . . . . . . 56--59
Fred H. Cate Privacy Interests: Security, Privacy,
and the Role of Law . . . . . . . . . . 60--63
Justin Troutman and
Vincent Rijmen Crypto Corner: Green Cryptography:
Cleaner Engineering through Recycling,
Part 2 . . . . . . . . . . . . . . . . . 64--65
Michael Howard Basic Training: Managing the Security
Wall of Data . . . . . . . . . . . . . . 66--68
Stefano Zanero Attack Trends: Wireless Malware
Propagation: a Reality Check . . . . . . 70--74
Matt Blaze Secure Systems: Taking Surveillance Out
of the Shadows . . . . . . . . . . . . . 75--77
Michael Lesk Security & Privacy Economics: Incentives
to Innovate: Improve the Past or Break
with It? . . . . . . . . . . . . . . . . 78--81
Ryan W. Gardner and
Matt Bishop and
Tadayoshi Kohno Building Security In: Are Patched
Machines Really Fixed? . . . . . . . . . 82--85
Daniel E. Geer, Jr. and
Daniel G. Conway For Good Measure: Risk Concentration . . 86--87
Steven M. Bellovin and
Daniel G. Conway Clear Text: Security as a Systems
Property . . . . . . . . . . . . . . . . 88--88
Fred B. Schneider Labeling-in Security . . . . . . . . . . 3
Gary McGraw Interview: Silver Bullet Talks with Fred
Schneider . . . . . . . . . . . . . . . 5--7
James Figueroa News Briefs . . . . . . . . . . . . . . 8--9
Shari Lawrence Pfleeger and
Salvatore J. Stolfo Addressing the Insider Threat . . . . . 10--13
Deanna Caputo and
Marcus Maloof and
Gregory Stephens Detecting Insider Theft of Trade Secrets 14--21
Felicia Duran and
Stephen H. Conrad and
Gregory N. Conrad and
David P. Duggan and
Edward Bruce Held Building a System for Insider Security 30--38
Brian Bowen and
Malek Ben Salem and
Shlomo Hershkop and
Angelos Keromytis and
Salvatore Stolfo Designing Host and Network Sensors to
Mitigate the Insider Threat . . . . . . 22--29
Saar Drimer and
Steven J. Murdoch and
Ross Anderson Failures of Tamper-Proofing in PIN Entry
Devices . . . . . . . . . . . . . . . . 39--45
Eric Bier and
Richard Chow and
Philippe Golle and
Tracy Holloway King and
Jessica Staddon The Rules of Redaction: Identify,
Protect, Review (and Repeat) . . . . . . 46--53
Bruce Potter High Time for Trusted Computing . . . . 54--56
Adam Goldstein and
David Bucciero The Dartmouth Cyber Security Initiative:
Faculty, Staff, and Students Work
Together . . . . . . . . . . . . . . . . 57--59
O. Sami Saydjari and
Cynthia E. Irvine A Tale of Three Cyber-Defense Workshops 60--64
Nate Lawson Side-Channel Attacks on Cryptographic
Software . . . . . . . . . . . . . . . . 65--68
Richard Ford and
William H. Allen Malware Shall Greatly Increase \ldots 69--71
Franco Callegati and
Marco Ramilli Frightened by Links . . . . . . . . . . 72--76
Michael E. Locasto and
Sergey Bratus and
Brian Schulte Bickering In-Depth: Rethinking the
Composition of Competing Security
Systems . . . . . . . . . . . . . . . . 77--81
Alessandro Acquisti Nudging Privacy: The Behavioral
Economics of Personal Information . . . 82--85
Daniel E. Geer, Jr. and
Daniel G. Conway Patch Grief with Proverbs . . . . . . . 86--87
Daniel E. Geer, Jr. Deskilling Digital Security . . . . . . 88
Anonymous Annual Index . . . . . . . . . . . . . . 1
Carl E. Landwehr Drawing the Line . . . . . . . . . . . . 3--4
James Figueroa News Briefs . . . . . . . . . . . . . . 6--7
Gary McGraw Interview: Silver Bullet Talks with
Christofer Hoff . . . . . . . . . . . . 8--10
Mikhail A. Lisovich and
Deirdre K. Mulligan and
Stephen B. Wicker Inferring Personal Information from
Demand-Response Systems . . . . . . . . 11--20
Annie I. Anton and
Julia B. Earp and
Jessica D. Young How Internet Users' Privacy Concerns
Have Evolved since 2002 . . . . . . . . 21--27
Mark Strembeck Scenario-Driven Role Engineering . . . . 28--35
Francis Kofi Andoh-Baidoo and
Kwasi Amoako-Gyampah and
Kweku-Muata Osei-Bryson How Internet Security Breaches Harm
Market Value . . . . . . . . . . . . . . 36--42
Jorgen Hansson and
Lutz Wrage and
Peter H. Feiler and
John Morley and
Bruce Lewis and
Jerome Hugues Architectural Modeling to Verify
Security and Nonfunctional Behavior . . 43--49
Lori M. Kaufman Can a Trusted Environment Provide
Security? . . . . . . . . . . . . . . . 50--52
Rainer Bohme and
Tyler Moore The Iterated Weakest Link . . . . . . . 53--55
Cynthia E. Irvine and
Charles C. Palmer Call in the Cyber National Guard! . . . 56--59
Fred Cohen The Smarter Grid . . . . . . . . . . . . 60--63
Wil Michiels Opportunities in White-Box Cryptography 64--67
Richard Ford and
Deborah A. Frincke Building a Better Boot Camp . . . . . . 68--71
Mark Fabro and
Tim Roxey and
Michael Assante No Grid Left Behind . . . . . . . . . . 72--76
Trent Jaeger and
Joshua Schiffman Outlook: Cloudy with a Chance of
Security Challenges and Improvements . . 77--80
Himanshu Khurana and
Mark Hadley and
Ning Lu and
Deborah A. Frincke Smart-Grid Security Issues . . . . . . . 81--85
Daniel E. Geer, Jr. and
Daniel G. Conway A Life Is Short, a Half-Life Is Forever 86--87
Bruce Schneier Security and Function Creep . . . . . . 88
Marc Donner International Blues . . . . . . . . . . 3
Gary McGraw Interview: Silver Bullet Talks with
Gillian Hayes . . . . . . . . . . . . . 5--7
James Figueroa News Briefs . . . . . . . . . . . . . . 8--10
John Viega and
Bret Michael Guest Editors' Introduction: Mobile
Device Security . . . . . . . . . . . . 11--12
Ricardo Ribalda and
Guillermo Gonzalez de Rivera and
Angel de Castro and
Javier Garrido A Mobile Biometric System-on-Token
System for Signing Digital Transactions 13--19
John Paul Dunning Taming the Blue Beast: a Survey of
Bluetooth Based Threats . . . . . . . . 20--27
H. Karen Lu and
Asad M. Ali Making Smart Cards Truly Portable . . . 28--34
Asaf Shabtai and
Yuval Fledel and
Uri Kanonov and
Yuval Elovici and
Shlomi Dolev and
Chanan Glezer Google Android: a Comprehensive Security
Assessment . . . . . . . . . . . . . . . 35--44
Christoph Sorge and
Saverio Niccolini and
Jan Seedorf The Legal Ramifications of
Call-Filtering Solutions . . . . . . . . 45--50
Bruce Potter My Information, Your Code . . . . . . . 51--53
Matt Bishop A Clinic for ``Secure'' Programming . . 54--56
Marjory S. Blumenthal Hide and Seek in the Cloud . . . . . . . 57--58
Fred H. Cate The Limits of Notice and Choice . . . . 59--62
Charles P. Pfleeger Crypto: Not Just for the Defensive Team 63--66
Andrea M. Matwyshyn and
Ang Cui and
Angelos D. Keromytis and
Salvatore J. Stolfo Ethics in Security Vulnerability
Research . . . . . . . . . . . . . . . . 67--72
Marco Ramilli and
Marco Prandini Always the Same, Never the Same . . . . 73--75
Angelos D. Keromytis Voice-over-IP Security: Research and
Practice . . . . . . . . . . . . . . . . 76--78
J. Alex Halderman To Strengthen Security, Change
Developers' Incentives . . . . . . . . . 79--82
James McGovern and
Gunnar Peterson 10 Quick, Dirty, and Cheap Things to
Improve Enterprise Security . . . . . . 83--85
Daniel E. Geer, Jr. and
Daniel G. Conway Nothing Ventured, Nothing Gained . . . . 86--87
Steven M. Bellovin Identity and Security . . . . . . . . . 88
Bret Michaels Balancing Liberty, Stability, and
Security . . . . . . . . . . . . . . . . 3
Gary McGraw Interview: Silver Bullet Talks with
Steven Kent . . . . . . . . . . . . . . 5--9
Linda Dailey Paulson News Briefs . . . . . . . . . . . . . . 11--13
Laurie Williams and
Andrew Meneely and
Grant Shipley Protection Poker: The New Software
Security ``Game'' . . . . . . . . . . . 14--20
Kjell Hole and
Lars-Helge Netland Toward Risk Assessment of Large-Impact
and Rare Events . . . . . . . . . . . . 21--27
Ian P. Cook and
Shari Lawrence Pfleeger Security Decision Support Challenges in
Data Collection and Use . . . . . . . . 28--35
Asaf Shabtai and
Yuval Fledel and
Yuval Elovici Securing Android-Powered Mobile Devices
Using SELinux . . . . . . . . . . . . . 36--44
Nir Kshetri The Economics of Click Fraud . . . . . . 45--53
Bruce Potter Thinking Operationally . . . . . . . . . 54--55
Edward B. Talbot and
Deborah Frincke and
Matt Bishop Demythifying Cybersecurity . . . . . . . 56--59
Fred Cohen The Virtualization Solution . . . . . . 60--63
Khaled El Emam Risk-Based De-Identification of Health
Data . . . . . . . . . . . . . . . . . . 64--67
Luther Martin XTS: a Mode of AES for Encrypting Hard
Disks . . . . . . . . . . . . . . . . . 68--69
Tom Kellerman Cyber-Threat Proliferation: Today's
Truly Pervasive Global Epidemic . . . . 70--73
Jon Giffin The Next Malware Battleground: Recovery
After Unknown Infection . . . . . . . . 74--76
Michael Lesk Son of Carterfone: Network Neutrality or
Regulation? . . . . . . . . . . . . . . 77--82
John Steven Threat Modeling . . . . . . . . . . . . 83--86
Daniel E. Geer, Jr. Fratricide . . . . . . . . . . . . . . . 88, 87
Fred B. Schneider Fumbling the Future, Again . . . . . . . 3
Gary McGraw Interview: Silver Bullet Talks with
Richard Clarke . . . . . . . . . . . . . 5--11
Linda Dailey Paulson News Briefs . . . . . . . . . . . . . . 12--14
Salvatore J. Stolfo and
Gene Tsudik Privacy-Preserving Sharing of Sensitive
Information . . . . . . . . . . . . . . 16--17
Emiliano De Cristofaro and
Jihye Kim Some Like It Private: Sharing
Confidential Information Based on
Oblivious Authorization . . . . . . . . 18--24
Lalana Kagal and
Joe Pato Preserving Privacy Based on Semantic
Policy Tools . . . . . . . . . . . . . . 25--30
Kc Claffy and
Erin Kenneally Dialing Privacy and Utility: a Proposed
Data-Sharing Framework to Advance
Internet Research . . . . . . . . . . . 31--39
Tal Moran and
Tyler Moore The Phish-Market Protocol: Secure
Sharing Between Competitors . . . . . . 40--45
Shari Pfleeger and
Robert Cunningham Why Measuring Security Is Hard . . . . . 46--54
Lori M. Kaufman Can Public-Cloud Security Meet Its
Unique Challenges? . . . . . . . . . . . 55--57
Cynthia Irvine and
Thuy D. Nguyen Educating the Systems Security
Engineer's Apprentice . . . . . . . . . 58--61
Vijay Varadharajan Internet Filtering . . . . . . . . . . . 62--65
Christian Cachin and
Jan Camenisch Encrypting Keys Securely . . . . . . . . 66--69
Daniel Bilar Degradation and Subversion through
Subsystem Attacks . . . . . . . . . . . 70--73
Sara Sinclair and
Sean W. Smith What's Wrong with Access Control in the
Real World? . . . . . . . . . . . . . . 74--77
Benjamin Edelman Least-Cost Avoiders in Online Fraud and
Abuse . . . . . . . . . . . . . . . . . 78--81
Anton Chuvakin and
Gunnar Peterson How to Do Application Logging Right . . 82--85
Daniel E. Geer, Jr. A Time to Rethink . . . . . . . . . . . 86--87
Bruce Schneier A Taxonomy of Social Networking Data . . 88
Marc Donner Phagocytes in Cyberspace . . . . . . . . 3--4
Gary McGraw Interview: Silver Bullet Talks with Greg
Morrisett . . . . . . . . . . . . . . . 6--9
George Lawton News Briefs . . . . . . . . . . . . . . 10--11
Ram Chillarege and
Jeffrey Voas Guest Editors' Introduction: Reliability
of Embedded and Cyber-Physical Systems 12--13
Hui Jun Wu Kernel Service Protection for Client
Security . . . . . . . . . . . . . . . . 14--19
J. Ryan Kenny and
Craig Robinson Embedded Software Assurance for
Configuring Secure Hardware . . . . . . 20--26
Sean Barnum and
Shankar Sastry and
John A. Stankovic Roundtable: Reliability of Embedded and
Cyber-Physical Systems . . . . . . . . . 27--32
Kevin Butler and
Steve McLaughlin and
Thomas Moyer and
Patrick McDaniel New Security Architectures Based on
Emerging Disk Functionality . . . . . . 34--41
Saeed Abu-Nimeh and
Thomas Chen Proliferation and Detection of Blog Spam 42--47
Corrado Visaggio Session Management Vulnerabilities in
Today's Web . . . . . . . . . . . . . . 48--56
Bruce Potter Necessary but Not Sufficient . . . . . . 57--58
Gregory B. White and
Dwayne Williams and
Keith Harrison The CyberPatriot National High School
Cyber Defense Competition . . . . . . . 59--61
Fred Cohen Automated Control System Security . . . 62--63
Paula J. Bruening and
K. Krasnow Waterman Data Tagging for New Information
Governance Models . . . . . . . . . . . 64--68
Teddy Furon and
Gwenael Doerr Tracing Pirated Content on the Internet:
Unwinding Ariadne's Thread . . . . . . . 69--71
Matt Bishop Technology, Training, and Transformation 72--75
Patrick McDaniel and
William Enck Not So Great Expectations: Why
Application Markets Haven't Failed
Security . . . . . . . . . . . . . . . . 76--78
Michael Lesk Do the Luddites Ever Win? . . . . . . . 79--82
Gunnar Peterson Don't Trust. And Verify: a Security
Architecture Stack for the Cloud . . . . 83--86
Steven M. Bellovin Perceptions and Reality . . . . . . . . 88, 87
Carl E. Landwehr Sailing Away! . . . . . . . . . . . . . 3--4
Roger Schell and
Steve Lipner and
Mary Ellen Zurko and
Elaine R. Palmer and
David Safford and
Charles C. Palmer and
Carl E. Landwehr In Memoriam: Paul Karger . . . . . . . . 5
George Lawton News Briefs . . . . . . . . . . . . . . 7--8
Gary McGraw Silver Bullet Talks with Ivan Arce . . . 9--13
Anup Ghosh and
Ivan Arce Guest Editors' Introduction: In Cloud
Computing We Trust --- But Should We? 14--16
Eric Grosse and
John Howie and
James Ransome and
Jim Reavis and
Steve Schmidt Cloud Computing Roundtable . . . . . . . 17--23
Hassan Takabi and
James B. D. Joshi and
Gail-Joon Ahn Security and Privacy Challenges in Cloud
Computing Environments . . . . . . . . . 24--31
Wayne Pauley Cloud Provider Transparency: An
Empirical Evaluation . . . . . . . . . . 32--39
Danny Harnik and
Benny Pinkas and
Alexandra Shulman-Peleg Side Channels in Cloud Services:
Deduplication in Cloud Storage . . . . . 40--47
Jose M. Alcaraz Calero and
Nigel Edwards and
Johannes Kirschnick and
Lawrence Wilcock and
Mike Wray Toward a Multi-Tenancy Authorization
System for Cloud Services . . . . . . . 48--55
Qian Liu and
Chuliang Weng and
Minglu Li and
Yuan Luo An In-VM Measuring Framework for
Increasing Virtual Machine Security in
Clouds . . . . . . . . . . . . . . . . . 56--62
Paul C. Clark and
Glenn R. Cook and
Edward L. Fisher and
John D. Fulp and
Valerie Linhoff and
Cynthia E. Irvine New Pathways in Identity Management . . 64--67
Fred H. Cate Government Access to Private-Sector Data 68--71
Joan Daemen and
Vincent Rijmen The First 10 Years of Advanced
Encryption . . . . . . . . . . . . . . . 72--74
Liam M. Mayron Secure Multimedia Communications . . . . 76--79
Marco Prandini and
Marco Ramilli and
Walter Cerroni and
Franco Callegati Splitting the HTTPS Stream to Attack
Secure Web Connections . . . . . . . . . 80--84
Anupam Datta Logical Methods in Security and Privacy 86--89
Jean Camp Identity Management's Misaligned
Incentives . . . . . . . . . . . . . . . 90--94
Daniel E. Geer, Jr. An Index of Cybersecurity . . . . . . . 96, 95
John Viega Reality Check . . . . . . . . . . . . . 3--4
Anonymous 2010 Reviewer Thanks . . . . . . . . . . 5--6
Gary McGraw Interview: Silver Bullet Talks with Paul
Kocher . . . . . . . . . . . . . . . . . 8--11
Giovanni Vigna The 2010 International Capture the Flag
Competition . . . . . . . . . . . . . . 12--14
Lee Garber News Briefs . . . . . . . . . . . . . . 15--17
Cynthia Irvine and
J. R. Rao Guest Editors' Introduction: Engineering
Secure Systems . . . . . . . . . . . . . 18--21
Paul Karger and
Suzanne McIntosh and
Elaine Palmer and
David Toll and
Samuel Weber Lessons Learned: Building the Caernarvon
High-Assurance Operating System . . . . 22--30
Clark Weissman and
Timothy Levin Lessons Learned from Building a
High-Assurance Crypto Gateway . . . . . 31--39
Joshua Schiffman and
Thomas Moyer and
Trent Jaeger and
Patrick McDaniel Network-Based Root of Trust for
Installation . . . . . . . . . . . . . . 40--48
M. Eric Johnson and
Shari Pfleeger Addressing Information Risk in Turbulent
Times . . . . . . . . . . . . . . . . . 49--57
James Alexander and
Jonathan Smith Disinformation: a Taxonomy . . . . . . . 58--63
Brett Stone-Gross and
Marco Cova and
Bob Gilbert and
Richard Kemmerer and
Christopher Kruegel and
Giovanni Vigna Analysis of a Botnet Takeover . . . . . 64--72
Lori M. Kaufman How Private Is the Internet? . . . . . . 73--75
Fred H. Cate A Transatlantic Convergence on Privacy? 76--79
Didier Stevens Malicious PDF Documents Explained . . . 80--82
Wendy Seltzer Exposing the Flaws of Censorship by
Domain Name . . . . . . . . . . . . . . 83--87
Michael Lesk What Is Information Worth? . . . . . . . 88--90
Richard Bejtlich and
John Steven and
Gunnar Peterson Directions in Incident Detection and
Response . . . . . . . . . . . . . . . . 91--92
Daniel E. Geer, Jr. Does a Rising Tide Lift All Boats? . . . 93--94
Daniel E. Geer, Jr. A Time for Choosing . . . . . . . . . . 96, 95
Marc Donner Privacy and the System Life Cycle . . . 3
Lee Garber News Briefs . . . . . . . . . . . . . . 5--7
Gary McGraw Interview: Silver Bullet Talks with
David Rice . . . . . . . . . . . . . . . 8--11
Mary Frances Theofanos and
Shari Lawrence Pfleeger Guest Editors' Introduction: Shouldn't
All Security Be Usable? . . . . . . . . 12--17
Cristian Bravo-Lillo and
Lorrie Faith Cranor and
Julie Downs and
Saranga Komanduri Bridging the Gap in Computer Security
Warnings: a Mental Model Approach . . . 18--26
Kristin Fuglerud and
Òystein Dale Secure and Inclusive Authentication with
a Talking Mobile One-Time-Password
Client . . . . . . . . . . . . . . . . . 27--34
M. Eric Johnson and
Nicholas D. Willey Usability Failures and Healthcare Data
Hemorrhages . . . . . . . . . . . . . . 35--42
Robert W. Reeder and
Stuart Schechter When the Password Doesn't Work:
Secondary Authentication for Websites 43--49
Bernd Grobauer and
Tobias Walloschek and
Elmar Stocker Understanding Cloud Computing
Vulnerabilities . . . . . . . . . . . . 50--57
Stefan Fenz and
Andreas Ekelhart Verification, Validation, and Evaluation
in Information Security Risk Management 58--65
Jonathan Spring Monitoring Cloud Computing by Layer,
Part 1 . . . . . . . . . . . . . . . . . 66--68
Matt Bishop Teaching Security Stealthily . . . . . . 69--71
Jennifer L. Bayuk Systems Security Engineering . . . . . . 72--74
Herve Chabanne and
Mehdi Tibouchi Securing E-passports with Elliptic
Curves . . . . . . . . . . . . . . . . . 75--78
Chris Greamo and
Anup Ghosh Sandboxing and Virtualization: Modern
Tools for Combating Malware . . . . . . 79--82
Patrick McDaniel Data Provenance and Security . . . . . . 83--85
Aza Raskin Your Life Experiences, Brought to You by
Budweiser . . . . . . . . . . . . . . . 86--88
Brian Chess and
Brad Arkin Software Security in Practice . . . . . 89--92
Daniel E. Geer, Jr. Correlation Is Not Causation . . . . . . 93--94
Bruce Schneier Detecting Cheaters . . . . . . . . . . . 96, 95
Robin E. Bloomfield Resilient to the Unexpected . . . . . . 3--4
Lee Garber News Briefs . . . . . . . . . . . . . . 6--8
Gary McGraw Silver Bullet Talks with Ralph Langner 9--14
David Evans and
Sal Stolfo Guest Editors' Introduction: The Science
of Security . . . . . . . . . . . . . . 16--17
Jason Bau and
John C. Mitchell Security Modeling and Analysis . . . . . 18--25
Anupam Datta and
Jason Franklin and
Deepak Garg and
Limin Jia and
Dilsun Kaynar On Adversary Models and Compositional
Security . . . . . . . . . . . . . . . . 26--32
Jean Paul Degabriele and
Kenny Paterson and
Gaven J. Watson Provable Security in the Real World . . 33--41
David Barrera and
Paul Van Oorschot Secure Software Installation on
Smartphones . . . . . . . . . . . . . . 42--48
Ralph Langner Stuxnet: Dissecting a Cyberwarfare
Weapon . . . . . . . . . . . . . . . . . 49--51
Jonathan Spring Monitoring Cloud Computing by Layer,
Part 2 . . . . . . . . . . . . . . . . . 52--55
Gregory Conti and
Thomas Babbitt and
John Nelson Hacking Competitions and Their Untapped
Potential for Security Education . . . . 56--59
Sal Stolfo and
Steven M. Bellovin and
David Evans Measuring Security . . . . . . . . . . . 60--65
Paul M. Schwartz Privacy, Ethics, and Analytics . . . . . 66--69
Ian Grigg and
Peter Gutmann The Curse of Cryptographic Numerology 70--72
Sean Heelan Vulnerability Detection Systems: Think
Cyborg, Not Robot . . . . . . . . . . . 74--77
Michael Lesk Salmon, Songs, and Blankets: Creativity
on the Northwest Coast . . . . . . . . . 78--81
Brad Arkin Never Waste a Crisis . . . . . . . . . . 82--85
Daniel E. Geer, Jr. New Measures . . . . . . . . . . . . . . 86--87
Steven M. Bellovin Clouds from Both Sides . . . . . . . . . 88
Fred B. Schneider and
Deirdre K. Mulligan A Doctrinal Thesis . . . . . . . . . . . 3--4
Lee Garber News Briefs . . . . . . . . . . . . . . 6--8
Gary McGraw Interview: Silver Bullet Talks with John
Savage . . . . . . . . . . . . . . . . . 9--12
Lee Hively and
Frederick Sheldon and
Anna Cinzia Squicciarini Toward Scalable Trustworthy Computing
Using the Human-Physiology-Immunity
Metaphor . . . . . . . . . . . . . . . . 14--23
Quyen L. Nguyen and
Arun Sood A Comparison of Intrusion-Tolerant
System Architectures . . . . . . . . . . 24--31
David Dittrich and
Michael Bailey and
Sven Dietrich Building an Active Computer Security
Ethics Community . . . . . . . . . . . . 32--40
Danny Dhillon Developer-Driven Threat Modeling:
Lessons Learned in the Trenches . . . . 41--47
Gregory Conti and
James Caroland Embracing the Kobayashi Maru: Why You
Should Teach Your Students to Cheat . . 48--51
Denis Tr\vcek Trust Management in the Pervasive
Computing Era . . . . . . . . . . . . . 52--55
David P. Fidler Was Stuxnet an Act of War? Decoding a
Cyberattack . . . . . . . . . . . . . . 56--59
Sean W. Smith Room at the Bottom: Authenticated
Encryption on Slow Legacy Networks . . . 60--63
Tara Whalen Security as if People Mattered . . . . . 64--67
Charlie Miller Mobile Attacks and Defense . . . . . . . 68--70
Michael E. Locasto and
Matthew C. Little A Failure-Based Discipline of
Trustworthy Information Systems . . . . 71--75
Michael Lesk Reading: From Paper to Pixels . . . . . 76--79
John Diamant Resilient Security Architecture: a
Complementary Approach to Reducing
Vulnerabilities . . . . . . . . . . . . 80--84
Daniel E. Geer, Jr. Attack Surface Inflation . . . . . . . . 85--86
Daniel E. Geer, Jr. Eisenhower Revisited . . . . . . . . . . 88, 87
John Viega Ten Years of Trustworthy Computing:
Lessons Learned . . . . . . . . . . . . 3--4
Lee Garber News Briefs . . . . . . . . . . . . . . 6--8
Gary McGraw Interview: Silver Bullet Talks with
Elinor Mills . . . . . . . . . . . . . . 9--12
Thomas A. Berson and
Dorothy E. Denning Cyberwarfare . . . . . . . . . . . . . . 13--15
Scott D. Applegate Cybermilitias and Political Hackers: Use
of Irregular Forces in Cyberwarfare . . 16--22
James A. Lewis Cyberwar Thresholds and Effects . . . . 23--29
Raymond C. Parks and
David P. Duggan Principles of Cyberwarfare . . . . . . . 30--35
David Elliott Deterring Strategic Cyberattack . . . . 36--40
Philip O'Kane and
Sakir Sezer and
Kieran McLaughlin Obfuscation: The Hidden Malware . . . . 41--47
Carl A. Gunter and
David M. Liebovitz and
Bradley Malin Experience-Based Access Management: a
Life-Cycle Framework for Identity and
Access Management Systems . . . . . . . 48--55
Raheem Beyah and
Aravind Venkataraman Rogue-Access-Point Detection:
Challenges, Solutions, and Future
Directions . . . . . . . . . . . . . . . 56--61
ShuiHua Han and
Chao-Hsien Chu and
Zongwei Luo Tamper Detection in the EPC Network
Using Digital Watermarking . . . . . . . 62--69
Wenliang Du SEED: Hands-On Lab Exercises for
Computer Security Education . . . . . . 70--73
Landon P. Cox Truth in Crowdsourcing . . . . . . . . . 74--76
Jeffrey MacKie-Mason All Space Will Be Public Space . . . . . 77--80
Dimitri DeFigueiredo The Case for Mobile Two-Factor
Authentication . . . . . . . . . . . . . 81--85
Daniel E. Geer, Jr. and
Peter Kuper When \$80 Billion Is Not Enough . . . . 86--87
Bruce Schneier Empathy and Security . . . . . . . . . . 88--88
Marc Donner The Invisible Computers . . . . . . . . 3
Gary McGraw Interview: Silver Bullet Talks with
Halvar Flake . . . . . . . . . . . . . . 5--8
Lee Garber News Briefs . . . . . . . . . . . . . . 9--11
William Arbaugh and
Deborah A. Frincke Living with Insecurity . . . . . . . . . 12--13
Rosa R. Heckle Security Dilemma: Healthcare Clinicians
at Work . . . . . . . . . . . . . . . . 14--19
Debin Liu and
Ninghui Li and
XiaoFeng Wang and
L. Jean Camp Security Risk Management Using
Incentives . . . . . . . . . . . . . . . 20--28
Antonio Manuel Fernandez Villamor and
Antonio Manuel Fernandez Villamor and
Juan Yelmo and
Juan C. Yelmo Helping Users Deal with Digital Threats:
The Online User Supervision Architecture 29--35
Steven Cheung Securing Collaborative Intrusion
Detection Systems . . . . . . . . . . . 36--42
Simson L. Garfinkel and
George Dinolt Operations with Degraded Security . . . 43--48
Joel Weis and
Jim Alves-Foss Securing Database as a Service: Issues
and Compromises . . . . . . . . . . . . 49--55
Mohamed Kaaniche and
Aad van Moorsel It All Depends, and Increasingly So . . 56--57
Cynthia Irvine The Value of Capture-the-Flag Exercises
in Education: An Interview with Chris
Eagle . . . . . . . . . . . . . . . . . 58--60
Tara Whalen Mobile Devices and Location Privacy:
Where Do We Go from Here? . . . . . . . 61--62
Kirsten Ferguson-Boucher Cloud Computing: a Records and
Information Management Perspective . . . 63--66
Dan Guido A Case Study of Intelligence-Driven
Defense . . . . . . . . . . . . . . . . 67--70
Kathleen M. Moriarty Incident Coordination . . . . . . . . . 71--75
Michael Lesk Cybersecurity and Economics . . . . . . 76--79
Robert Fly Detecting Fraud on Websites . . . . . . 80--85
Daniel E. Geer, Jr. Small Is Beautiful, Big Is Inevitable 86--87
Steven M. Bellovin Security Think . . . . . . . . . . . . . 88
John Viega Happy Anniversary! . . . . . . . . . . . 3--4
Anup Ghosh and
Gary McGraw Lost Decade or Golden Era: Computer
Security since 9/11 . . . . . . . . . . 6--10
Gary McGraw Interview: Silver Bullet Talks with
Deborah Frincke . . . . . . . . . . . . 11--14
Lee Garber Security, Privacy, and Policy Roundup 15--17
Markus Jakobsson and
Richard Chow and
Jesus Molina Authentication --- Are We Doing Well
Enough? . . . . . . . . . . . . . . . . 19--21
Dirk Balfanz and
Richard Chow and
Ori Eisen and
Markus Jakobsson and
Steve Kirsch and
Scott Matsumoto and
Jesus Molina and
Paul van Oorschot The Future of Authentication . . . . . . 22--27
Cormac Herley and
Paul van Oorschot A Research Agenda Acknowledging the
Persistence of Passwords . . . . . . . . 28--36
Amir Herzberg and
Ronen Margulies Training Johnny to Authenticate (Safely) 37--45
Andreas Poller and
Ulrich Waldmann and
Sven Vowe and
Sven Turpe Electronic Identity Cards for User
Authentication --- Promise and Practice 46--54
Idoia Aguirre and
Sergio Alonso Improving the Automation of Security
Information Management: a Collaborative
Approach . . . . . . . . . . . . . . . . 55--59
James A. Pettigrew III and
Julie J. C. H. Ryan Making Successful Security Decisions: a
Qualitative Evaluation . . . . . . . . . 60--68
Jean Arlat and
Zbigniew Kalbarczyk and
Takashi Nanya Nanocomputing: Small Devices, Large
Dependability Challenges . . . . . . . . 69--72
Jelena Mirkovic and
Terry Benzel Teaching Cybersecurity with DeterLab . . 73--76
Tara Whalen This Time, It's Personal: Recent
Discussions on Concepts of Personal
Information . . . . . . . . . . . . . . 77--79
Jan Camenisch and
Anja Lehmann and
Gregory Neven Electronic Identities Need Private
Credentials . . . . . . . . . . . . . . 80--83
Don A. Bailey Moving 2 Mishap: M2M's Impact on Privacy
and Safety . . . . . . . . . . . . . . . 84--87
Michael Lesk Your Memory Is Now a Vendor Service . . 88--90
Bronwen Matthews Optimizing Product Improvement Spending
with Third-Party Security Consultants 91--93
Daniel E. Geer, Jr. Power. Law. . . . . . . . . . . . . . . 94--95
Daniel E. Geer, Jr. More or Less . . . . . . . . . . . . . . 96
Jeremy Epstein Can We Be Too Careful? . . . . . . . . . 3--5
Jeremy Epstein Reflecting on Some Past Predictions . . 7--10
Gary McGraw Interview: Silver Bullet Talks with Neil
Daswani . . . . . . . . . . . . . . . . 11--14
Lee Garber Security, Privacy, and Policy Roundup 15--17
Shari Lawrence Pfleeger and
Cynthia Irvine and
Mischel Kwon Guest Editors' Introduction . . . . . . 19--23
Iacovos Kirlappos and
M. Angela Sasse Security Education against Phishing: a
Modest Proposal for a Major Rethink . . 24--32
Lance J. Hoffman and
Diana L. Burley and
Costis Toregas Holistically Building the Cybersecurity
Workforce . . . . . . . . . . . . . . . 33--39
Susanne M. Furman and
Mary Frances Theofanos and
Yee-Yin Choong and
Brian Stanton Basing Cybersecurity Training on User
Perceptions . . . . . . . . . . . . . . 40--49
Mischel Kwon and
Michael J. Jacobs and
David Cullinane and
Christopher G. Ipsen and
James Foley Educating Cyber Professionals: a View
from Academia, the Private Sector, and
Government . . . . . . . . . . . . . . . 50--53
Scott Charney Collective Defense: Applying the
Public-Health Model to the Internet . . 54--59
Sanjeev Kumar and
Sirisha Surisetty Microsoft vs. Apple: Resilience against
Distributed Denial-of-Service Attacks 60--64
Peter G. Neumann and
Ulf Lindqvist The IEEE Symposium on Security and
Privacy Is Moving to San Francisco . . . 65--66
Gernot Heiser and
Toby Murray and
Gerwin Klein It's Time for Trustworthy Systems . . . 67--70
Michael Bailey and
David Dittrich and
Erin Kenneally and
Doug Maughan The Menlo Report . . . . . . . . . . . . 71--75
Diana Maimut and
Khaled Ouafi Lightweight Cryptography for RFID Tags 76--79
Barbara Endicott-Popovsky and
Donald J. Horowitz Unintended Consequences: Digital
Evidence in Our Legal System . . . . . . 80--83
Chris Rohlf and
Yan Ivnitskiy The Security Challenges of Client-Side
Just-in-Time Engines . . . . . . . . . . 84--86
Len Sassaman and
Meredith L. Patterson and
Sergey Bratus A Patch for Postel's Robustness
Principle . . . . . . . . . . . . . . . 87--91
Lorrie Faith Cranor Can Users Control Online Behavioral
Advertising Effectively? . . . . . . . . 93--96
Barbara Fichtinger and
Frances Paulisch and
Peter Panholzer Driving Secure Software Development
Experience in a Diverse Product
Environment . . . . . . . . . . . . . . 97--101
Daniel E. Geer, Jr. Numbers Worth Having . . . . . . . . . . 102--103
Bruce Schneier How Changing Technology Affects Security 104
Shari Lawrence Pfleeger A Key to the Castle . . . . . . . . . . 3
George Cybenko and
Carl E. Landwehr Security Analytics and Measurements . . 5--8
Gary McGraw Interview: Silver Bullet Talks with
Giovanni Vigna . . . . . . . . . . . . . 9--11
Lee Garber Security, Privacy, and Policy Roundup 12--13
Brian Chess and
Chris Wysopal Software Assurance for the Masses . . . 14--15
Cristina Cifuentes and
Nathan Keynes and
Lian Li and
Nathan Hawes and
Manuel Valdiviezo Transitioning Parfait into a Development
Tool . . . . . . . . . . . . . . . . . . 16--23
Robert A. Martin and
Steven M. Christey The Software Industry's ``Clean Water
Act'' Alternative . . . . . . . . . . . 24--31
Brian Chess and
Kris Britton and
Chris Eng and
Bill Pugh and
Lakshmikanth Raghavan and
Jacob West Static Analysis in Motion . . . . . . . 53--56
Paul Anderson Measuring the Value of Static-Analysis
Tool Deployments . . . . . . . . . . . . 40--47
Karen Renaud Blaming Noncompliance Is Too Convenient:
What Really Causes Information Breaches? 57--63
Rohan M. Amin and
Julie J. C. H. Ryan and
Johan Rene van Dorp Detecting Targeted Malicious Email . . . 64--71
Lorenzo Strigini Resilience: What Is It, and How Much Do
We Want? . . . . . . . . . . . . . . . . 72--75
Celia Paulsen and
Ernest McDuffie and
William Newhouse and
Patricia Toth NICE: Creating a Cybersecurity Workforce
and Aware Public . . . . . . . . . . . . 76--79
Helena Handschuh Hardware-Anchored Security Based on SRAM
PUFs, Part 1 . . . . . . . . . . . . . . 80--83
Michael Lesk The Clouds Roll By . . . . . . . . . . . 84--87
Eric Baize Developing Secure Products in the Age of
Advanced Persistent Threats . . . . . . 88--92
Daniel E. Geer, Jr. and
Mukul Pareek ICS Update . . . . . . . . . . . . . . . 93--95
Steven M. Bellovin Fighting the Last War . . . . . . . . . 96
John Viega Cloud Security: Not a Problem . . . . . 3--3
Shari Lawrence Pfleeger Security Measurement Steps, Missteps,
and Next Steps . . . . . . . . . . . . . 5--9
Shari Lawrence Pfleeger and
Marc Rogers and
Masooda Bashir and
Kelly Caine and
Deanna Caputo and
Michael Losavio and
Sal Stolfo Does Profiling Make Us More Secure? . . 10--15
Lee Garber Security, Privacy, and Policy Roundup 16--18
Jose Nazario and
John Kristoff Internet Infrastructure Security . . . . 24--25
Ahmad AlSa'deh and
Christoph Meinel Secure Neighbor Discovery: Review,
Challenges, Perspectives, and
Recommendations . . . . . . . . . . . . 26--34
Matthew Dunlop and
Stephen Groat and
William Urbanski and
Randy Marchany and
Joseph Tront The Blind Man's Bluff Approach to
Security Using IPv6 . . . . . . . . . . 35--43
Sergio Sanchez Garcia and
Ana Gomez Oliva and
Emilia Perez-Belleboni Is Europe Ready for a Pan-European
Identity Management System? . . . . . . 44--49
Jan Kallberg The Common Criteria Meets Realpolitik:
Trust, Alliances, and Potential Betrayal 50--53
Frederick T. Sheldon and
John Mark Weber and
Seong-Moo Yoo and
W. David Pan The Insecurity of Wireless Networks . . 54--61
Gyorgy Dan and
Henrik Sandberg and
Mathias Ekstedt and
Gunnar Bjorkman Challenges in Power System Information
Security . . . . . . . . . . . . . . . . 62--70
Gary McGraw Interview: Silver Bullet Talks with
Randy Sabett . . . . . . . . . . . . . . 19--22
Anthony Dessiatnikoff and
Yves Deswarte and
Eric Alata and
Vincent Nicomette Potential Attacks on Onboard Aerospace
Systems . . . . . . . . . . . . . . . . 71--74
Efstratios Gavas and
Nasir Memon and
Douglas Britton Winning Cybersecurity One Challenge at a
Time . . . . . . . . . . . . . . . . . . 75--79
Daniel E. Geer and
Bob Blakley Are You Smarter than the TSA? (Hint: No) 94--95
Helena Handschuh Hardware-Anchored Security Based on SRAM
PUFs, Part 2 . . . . . . . . . . . . . . 80--81
Daniel E. Geer and
Jerry Archer Stand Your Ground . . . . . . . . . . . 96
Chris Valasek Primitive-Chaining Exploits: a
Real-World Example . . . . . . . . . . . 82--84
Patrick McDaniel Bloatware Comes to the Smartphone . . . 85--87
Michael Lesk Georgia on My Mind . . . . . . . . . . . 88--90
Jeremiah Grossman The State of Website Security . . . . . 91--93
Robin Bloomfield Are Things Getting Worse? . . . . . . . 3
Gary McGraw Interview: Silver Bullet Talks with Kay
Connelly . . . . . . . . . . . . . . . . 5--7
Lee Garber Security, Privacy, and Policy Roundup 8--9
Ann Cavoukian and
Alan Davidson and
Ed Felton and
Marit Hansen and
Susan Landau and
Anna Slomovic Privacy: Front and Center . . . . . . . 10--15
Michael Shamos and
Alec Yasinsac Realities of E-voting Security . . . . . 16--17
Aleksander Essex and
Urs Hengartner Hover: Trustworthy Elections with
Hash-Only Verification . . . . . . . . . 18--24
Richard Buckland and
Roland Wen The Future of E-voting in Australia . . 25--32
Philip B. Stark and
David Wagner Evidence-Based Elections . . . . . . . . 33--41
Mark Lindeman and
Philip B. Stark A Gentle Introduction to Risk-Limiting
Audits . . . . . . . . . . . . . . . . . 42--49
Merle S. King and
Brian Hancock Electronic Voting Security 10 Years
after the Help America Vote Act . . . . 50--52
Mariana Raykova and
Ang Cui and
Binh Vo and
Bin Liu and
Tal Malkin and
Steven M. Bellovin and
Salvatore J. Stolfo Usable, Secure, Private Search . . . . . 53--60
Krishna K. Venkatasubramanian and
Eugene Y. Vasserman and
Oleg Sokolsky and
Insup Lee Security and
Interoperable-Medical-Device Systems,
Part 1 . . . . . . . . . . . . . . . . . 61--63
Matt Bishop and
Sean Peisert Security and Elections . . . . . . . . . 64--67
John Viega and
Hugh Thompson The State of Embedded-Device Security
(Spoiler Alert: It's Bad) . . . . . . . 68--70
Josh Pauli and
Patrick Engebretson Filling Your Cyber Operations Training
Toolbox . . . . . . . . . . . . . . . . 71--74
Sean W. Smith Security and Cognitive Bias: Exploring
the Role of the Mind . . . . . . . . . . 75--78
Michael Lesk The Price of Privacy . . . . . . . . . . 79--81
\vZeljko Obrenovic and
Bart den Haak Integrating User Customization and
Authentication: The Identity Crisis . . 82--85
Daniel E. Geer, Jr. Risk Aversion . . . . . . . . . . . . . 86--87
Bruce Schneier The Importance of Security Engineering 88
John Viega Giving Back . . . . . . . . . . . . . . 3--4
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 6--8
Gary McGraw Interview: Silver Bullet Talks with
Howard Schmidt . . . . . . . . . . . . . 9--12
John Viega Ten Years On, How Are We Doing? (Spoiler
Alert: We Have No Clue) . . . . . . . . 13--16
Dan Thomsen and
Jeremy Epstein and
Peter G. Neumann Lost Treasures . . . . . . . . . . . . . 17--19
Richard E. Smith A Contemporary Look at Saltzer and
Schroeder's 1975 \booktitleDesign
Principles . . . . . . . . . . . . . . . 20--25
Steve Lipner and
Trent Jaeger and
Mary Ellen Zurko Lessons from VAX/SVS for High-Assurance
VM Systems . . . . . . . . . . . . . . . 26--35
Howard Shrobe and
Daniel Adams Suppose We Got a Do-Over: a Revolution
for Secure Computing . . . . . . . . . . 36--39
Steven J. Murdoch and
Mike Bond and
Ross Anderson How Certification Systems Fail: Lessons
from the Ware Report . . . . . . . . . . 40--44
Jeffrey T. McDonald and
Todd R. Andel Integrating Historical Security Jewels
in Information Assurance Education . . . 45--50
Fernando Alonso-Fernandez and
Julian Fierrez and
Javier Ortega-Garcia Quality Measures in Biometric Systems 52--62
Dinei Florencio and
Cormac Herley Is Everything We Know about Password
Stealing Wrong? . . . . . . . . . . . . 63--69
Eugene Y. Vasserman and
Krishna K. Venkatasubramanian and
Oleg Sokolsky and
Insup Lee Security and
Interoperable-Medical-Device Systems,
Part 2: Failures, Consequences, and
Classification . . . . . . . . . . . . . 70--73
Susan Older and
Shiu-Kai Chin Engineering Assurance at the
Undergraduate Level . . . . . . . . . . 74--77
Michael Brennan Academic Impact at the Federal Trade
Commission . . . . . . . . . . . . . . . 78--82
Marco Prandini and
Marco Ramilli Return-Oriented Programming . . . . . . 84--87
Rick Wash Folk Security . . . . . . . . . . . . . 88--90
Josh Kebbel-Wyen Training an Army of Security Ninjas . . 91--93
Daniel E. Geer, Jr. and
Daniel B. Larremore Progress Is Infectious . . . . . . . . . 94--95
Steven M. Bellovin The Major Cyberincident Investigations
Board . . . . . . . . . . . . . . . . . 96
Shari Lawrence Pfleeger Enlightened Security: Shedding Light on
What Works and Why . . . . . . . . . . . 3--4
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 6--7
Gary McGraw Interview: Silver Bullet Talks with
Per-Olof Persson . . . . . . . . . . . . 8--10
Edward G. Amoroso and
Hugh Thompson A View from the C-Suite . . . . . . . . 11--12
Dave Martin Implementing Effective Controls in a
Mobile, Agile, Cloud-Enabled Enterprise 13--14
Eric Grosse and
Mayank Upadhyay Authentication at Scale . . . . . . . . 15--22
Edward G. Amoroso From the Enterprise Perimeter to a
Mobility-Enabled Secure Cloud . . . . . 23--31
Hugh Thompson The Human Element of Information
Security . . . . . . . . . . . . . . . . 32--35
Lukasz Kufel Security Event Monitoring in a
Distributed Systems Environment . . . . 36--43
Khaled Salah and
Jose M. Alcaraz Calero and
Sherali Zeadally and
Sameera Al-Mulla and
Mohammed Alzaabi Using Cloud Computing to Implement a
Security Overlay Network . . . . . . . . 44--53
Aditya K. Sood and
Richard J. Enbody Targeted Cyberattacks: A Superset of
Advanced Persistent Threats . . . . . . 54--61
Steven M. Bellovin and
Matt Blaze and
Sandy Clark and
Susan Landau Going Bright: Wiretapping without
Weakening Communications Infrastructure 62--72
Alec Yasinsac and
Cynthia Irvine Help! Is There a Trustworthy-Systems
Doctor in the House? . . . . . . . . . . 73--77
Qing Li and
Greg Clark Mobile Security: A Look Ahead . . . . . 78--81
Frederik Zuiderveen Borgesius Behavioral Targeting: A European Legal
Perspective . . . . . . . . . . . . . . 82--85
Matthew Green The Threat in the Cloud . . . . . . . . 86--89
Alexander Kott and
Curtis Arnold The Promises and Challenges of
Continuous Monitoring and Risk Scoring 90--93
Daniel E. Geer, Jr. and
Daniel G. Conway The Times, They Are a Changin' . . . . . 94--95
Daniel E. Geer, Jr. Last Word: Identity as Privacy . . . . . 96
Fred B. Schneider Breaking-in Research . . . . . . . . . . 3--4
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 6--7
Gary McGraw Interview: Silver Bullet Talks with
Steve Bellovin . . . . . . . . . . . . . 8--11
Terry V. Benzel and
Steve Lipner Crossing the Great Divide: Transferring
Security Technology from Research to the
Market . . . . . . . . . . . . . . . . . 12--13
Douglas Maughan and
David Balenson and
Ulf Lindqvist and
Zachary Tudor Crossing the ``Valley of Death'':
Transitioning Cybersecurity Research
into Practice . . . . . . . . . . . . . 14--23
Anita D'Amico and
Brianne O'Brien and
Mark Larkin Building a Bridge across the Transition
Chasm . . . . . . . . . . . . . . . . . 24--33
Jostein Jensen and
Martin Gilje Jaatun Federated Identity Management --- We
Built It; Why Won't They Come? . . . . . 34--41
Terry V. Benzel and
Eric O'Brien and
Robert Rodriguez and
William Arbaugh and
John Sebes Crossing the Great Divide: From Research
to Market . . . . . . . . . . . . . . . 42--46
Bart Coppens and
Bjorn De Sutter and
Koen De Bosschere Protecting Your Software Updates . . . . 47--54
Anastasios N. Bikos and
Nicolas Sklavos LTE/SAE Security Issues on $4$G Wireless
Networks . . . . . . . . . . . . . . . . 55--62
Roland L. Trope and
Stephen J. Humes By Executive Order: Delivery of Cyber
Intelligence Imparts Cyber
Responsibilities . . . . . . . . . . . . 63--67
Anatoliy Gorbenko and
Alexander Romanovsky Time-Outing Internet Services . . . . . 68--71
Ian Koss and
Richard Ford Authorship Is Continuous: Managing Code
Plagiarism . . . . . . . . . . . . . . . 72--74
Arvind Narayanan What Happened to the Crypto Dream?, Part
1 . . . . . . . . . . . . . . . . . . . 75--76
Lorrie Faith Cranor and
Norman Sadeh A Shortage of Privacy Engineers . . . . 77--79
Adrian Hayes Network Service Authentication Timing
Attacks . . . . . . . . . . . . . . . . 80--82
Sergey Bratus and
Anna Shubina Avoiding a War on Unauthorized
Computation . . . . . . . . . . . . . . 83--88
Cormac Herley When Does Targeting Make Sense for an
Attacker? . . . . . . . . . . . . . . . 89--92
Alessandro Acquisti Complementary Perspectives on Privacy
and Security: Economics . . . . . . . . 93--95
Bruce Schneier IT for Oppression . . . . . . . . . . . 96
Jeremy Epstein From the Editors: Are all types of
Internet voting unsafe? . . . . . . . . 3--4
Lee Garber Security, privacy, policy, and
dependability roundup . . . . . . . . . 6--7
Gary McGraw Interview: Silver Bullet talks with
Thomas Rid . . . . . . . . . . . . . . . 8--10
Susan Landau Guest Editor's Introduction: Politics,
love, and death in a world of no privacy 11--13
Balachander Krishnamurthy Privacy and online social networks: can
colorless green ideas sleep furiously? 14--20
Norberto Nuno Gomes de Andrade and
Aaron Martin and
Shara Monteleone ``All the better to see you with, my
dear'': Facial recognition and privacy
in online social networks . . . . . . . 21--28
Seda Gurses and
Claudia Diaz Two tales of privacy in online social
networks . . . . . . . . . . . . . . . . 29--37
Eszter Hargittai and
Eden Litt New strategies for employment? Internet
skills and online privacy practices
during people's job search . . . . . . . 38--45
Indrajeet Singh and
Michael Butkiewicz and
Harsha V. Madhyastha and
Srikanth V. Krishnamurthy and
Sateesh Addepalli Twitsper: Tweeting privately . . . . . . 46--50
Jonathan Anderson and
Frank Stajano Must social networking conflict with
privacy? . . . . . . . . . . . . . . . . 51--60
Philip Koopman and
Christopher Szilagyi Integrity in embedded control networks 61--63
Mark Gondree and
Zachary N. J. Peterson and
Tamara Denning Security through play . . . . . . . . . 64--67
Arvind Narayanan What Happened to the Crypto Dream?, Part
2 . . . . . . . . . . . . . . . . . . . 68--71
Travis Breaux and
David Gordon What engineers should know about US
security and privacy law . . . . . . . . 72--76
Benedikt Koppel and
Stephan Neuhaus Crypto Corner: Analysis of a hardware
security module's high-availability
setting . . . . . . . . . . . . . . . . 77--80
Michael Lesk Security & Privacy Economics: Privateers
in cyberspace: Aargh! . . . . . . . . . 81--84
Shari Lawrence Pfleeger In Our Orbit: Ramsey theory: Learning
about the needle in the haystack . . . . 85--87
Steven M. Bellovin Last Word: Military cybersomethings . . 88
Fred B. Schneider Cybersecurity Education in Universities 3--4
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 6--7
Gary McGraw Interview: Silver Bullet Talks with Gary
Warzala . . . . . . . . . . . . . . . . 8--10
Robin Bloomfield and
Jay Lala Safety-Critical Systems: The Next
Generation . . . . . . . . . . . . . . . 11--13
Homa Alemzadeh and
Ravishankar K. Iyer and
Zbigniew Kalbarczyk and
Jai Raman Analysis of Safety-Critical Computer
Failures in Medical Devices . . . . . . 14--26
Sayan Mitra and
Tichakorn Wongpiromsarn and
Richard M. Murray Verifying Cyber-Physical Interactions in
Safety-Critical Systems . . . . . . . . 28--37
Domenico Cotroneo and
Roberto Natella Fault Injection for Software
Certification . . . . . . . . . . . . . 38--45
Thiago Mattos Rosa and
Altair Olivo Santin and
Andreia Malucelli Mitigating XML Injection 0-Day Attacks
through Strategy-Based Detection Systems 46--53
Susan Landau Making Sense from Snowden: What's
Significant in the NSA Surveillance
Revelations . . . . . . . . . . . . . . 54--63
Jeff Stein The End of National Security Reporting? 64--68
Chris Eagle Computer Security Competitions:
Expanding Educational Outcomes . . . . . 69--71
Alessandro Acquisti and
Idris Adjerid and
Laura Brandimarte Gone in 15 Seconds: The Limits of
Privacy Transparency and Control . . . . 72--74
Stefan Mangard Keeping Secrets on Low-Cost Chips . . . 75--77
Rebecca Bace Pain Management for Entrepreneurs:
Working with Venture Capital . . . . . . 78--81
Stephen McLaughlin Securing Control Systems from the
Inside: A Case for Mediating Physical
Behaviors . . . . . . . . . . . . . . . 82--84
Michael Lesk Big Data, Big Brother, Big Money . . . . 85--89
Susan Dery Using Whitelisting to Combat Malware
Attacks at Fannie Mae . . . . . . . . . 90--92
Rafe Sagarin Bio-hacking: Tapping Life's Code to Deal
with Unpredictable Risk . . . . . . . . 93--95
Daniel E. Geer On Abandonment . . . . . . . . . . . . . 96
Robin Bloomfield Open Assurance . . . . . . . . . . . . . 3--4
Lee Garber News Briefs: Security, Privacy, Policy,
and Dependability Roundup . . . . . . . 6--7
Gary McGraw Interview: Silver Bullet Talks with
Wenyuan Xu . . . . . . . . . . . . . . . 8--10
Tom Kirkham and
Sandra Winfield and
Serge Ravet and
Sampo Kellomäki The Personal Data Store Approach to
Personal Data Security . . . . . . . . . 12--19
Keith Harrison and
Gregory B. White Anonymous and Distributed Community
Cyberincident Detection . . . . . . . . 20--27
Weihan Goh and
Chai Kiat Yeo Teaching an Old TPM New Tricks:
Repurposing for Identity-Based
Signatures . . . . . . . . . . . . . . . 28--35
Eleanor Birrell and
Fred B. Schneider Federated Identity Management Systems: A
Privacy-Based Characterization . . . . . 36--48
Wei-dong Qiu and
Qian Su and
Bo-zhong Liu iOS Data Recovery Using Low-Level NAND
Images . . . . . . . . . . . . . . . . . 49--55
Gary T. Marx The Public as Partner? Technology Can
Make Us Auxiliaries as Well as
Vigilantes . . . . . . . . . . . . . . . 56--61
Boudewijn R. Haverkort The Dependable Systems-of-Systems Design
Challenge . . . . . . . . . . . . . . . 62--65
Cynthia Irvine A Cyberoperations Program . . . . . . . 66--69
Ryan Calo Tiny Salespeople: Mediated Transactions
and the Internet of Things . . . . . . . 70--72
Vashek Matyá\vs and
Ji\vrí K\rur Conflicts between Intrusion Detection
and Privacy Mechanisms for Wireless
Sensor Networks . . . . . . . . . . . . 73--76
Jim Alves-Foss and
Paul Oman The Known Unknowns . . . . . . . . . . . 77--79
Jim Blythe and
Ross Koppel and
Sean W. Smith Circumvention of Security: Good Users Do
Bad Things . . . . . . . . . . . . . . . 80--83
Nicole B. Ellison and
Jeffrey T. Hancock Profile as Promise: Honest and Deceptive
Signals in Online Dating . . . . . . . . 84--88
Thomas B. Hilburn and
Nancy R. Mead Building Security In: A Road to
Competency . . . . . . . . . . . . . . . 89--92
Kacper Gradon Crime Science and the Internet
Battlefield: Securing the Analog World
from Digital Crime . . . . . . . . . . . 93--95
Bruce Schneier Last word: Trust in Man/Machine Security
Systems . . . . . . . . . . . . . . . . 96--96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Usenix [House Advertisement] . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Shari Lawrence Pfleeger Focus on Policy . . . . . . . . . . . . 3--3
Anonymous Masthead . . . . . . . . . . . . . . . . 4
Gary McGraw Interview: Silver Bullet Talks with W.
Hord Tipton . . . . . . . . . . . . . . 5--7
Lee Garber News Briefs: Security, Privacy, Policy,
and Dependability Roundup . . . . . . . 8--9
Kelly Caine and
Michael Lesk Security and Privacy in Health IT [Guest
editors' introduction] . . . . . . . . . 10--11
Mark Chignell and
Mahsa Rouzbahman and
Ryan Kealey and
Reza Samavi and
Erin Yu and
Tammy Sieminowski Nonconfidential Patient Types in
Emergency Clinical Decision Support . . 12--18
Michael Lesk Electronic Medical Records:
Confidentiality, Care, and Epidemiology 19--24
Denise Anthony and
Andrew T. Campbell and
Thomas Candon and
Andrew Gettinger and
David Kotz and
Lisa A. Marsch and
Andres Molina-Markham and
Karen Page and
Sean W. Smith and
Carl A. Gunter and
M. Eric Johnson Securing Information Technology in
Healthcare . . . . . . . . . . . . . . . 25--33
Gines Dolera Tormo and
Felix Gomez Marmol and
Joao Girao and
Gregorio Martinez Perez Identity Management --- In Privacy We
Trust: Bridging the Trust Gap in eHealth
Environments . . . . . . . . . . . . . . 34--41
Deborah C. Peel Point/Counterpoint: The Consequences of
the Lack of Privacy in Today's
Electronic Health Systems . . . . . . . 42--44
Deven McGraw Point/Counterpoint: Privacy and Security
as Enable, Not Barrier, to Responsible
Health Data Uses . . . . . . . . . . . . 42--44
Abdulghani Ali Ahmed and
Aman Jantan and
Tat-Chee Wan Real-Time Detection of Intrusive Traffic
in QoS Network Domains . . . . . . . . . 45--53
Sanmeet Kaur and
Maninder Singh Automatic Attack Signature Generation
Systems: A Review . . . . . . . . . . . 54--61
Paulo Esteves Verissimo and
Alysson Bessani E-biobanking: What Have You Done to My
Cell Samples? . . . . . . . . . . . . . 62--65
Andrew McGettrick Toward Effective Cybersecurity Education 66--68
Heather Dewey-Hagborg Stranger Visions: A Provocation . . . . 69--70
Jean-Michel Cioranesco and
Houda Ferradi and
David Naccache Crypto Corner: Communicating Covertly
through CPU Monitoring . . . . . . . . . 71--73
Alvaro A. Cardenas and
Pratyusa K. Manadhata and
Sreeranga P. Rajan Systems Security: Big Data Analytics for
Security . . . . . . . . . . . . . . . . 74--76
Michael Lesk Security & Privacy Economics: The Old Is
New Again . . . . . . . . . . . . . . . 77--79
Nancy R. Mead and
Thomas B. Hilburn Building Security In: Preparing for a
Software Security Career . . . . . . . . 80--83
Harvey Molotch Everyday Security: Default to Decency 84--87
Steven M. Bellovin The Last Word: Walls and Gates . . . . . 88--88
Anonymous InfoSec World Conference 2014 Trade
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Magazine Subscribe [House Advertisement] c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1
Anonymous Rock Stars of Mobile Cloud [House
Advertisement] . . . . . . . . . . . . . c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Bill Horne Humans in the Loop . . . . . . . . . . . 3--4
Anonymous Masthead . . . . . . . . . . . . . . . . 5
Gary McGraw Silver Bullet Talks with Jon Callas . . 6--8
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 9--10
M. Angela Sasse and
Charles C. Palmer Protecting You . . . . . . . . . . . . . 11--13
Cormac Herley More Is Not the Answer . . . . . . . . . 14--19
Simson L. Garfinkel Leaking Sensitive Information in Complex
Document Files--and How to Prevent It 20--27
Deanna D. Caputo and
Shari Lawrence Pfleeger and
Jesse D. Freeman and
M. Eric Johnson Going Spear Phishing: Exploring Embedded
Training and Awareness . . . . . . . . . 28--38
M. Angela Sasse and
Charles C. Palmer and
Markus Jakobsson and
Sunny Consolvo and
Rick Wash and
L. Jean Camp Helping You Protect You . . . . . . . . 39--42
Ying-Dar Lin and
Chia-Yin Lee and
Hao-Chuan Tsai Redefining Security Criteria for
Networking Devices with Case Studies . . 43--53
Moti Geva and
Amir Herzberg and
Yehoshua Gev Bandwidth Distributed Denial of Service:
Attacks and Defenses . . . . . . . . . . 54--61
Susan Landau Highlights from Making Sense of Snowden,
Part II: What's Significant in the NSA
Revelations . . . . . . . . . . . . . . 62--64
George Candea The Tests-versus-Proofs Conundrum . . . 65--68
Prabir Bhattacharya and
Li Yang and
Minzhe Guo and
Kai Qian and
Ming Yang Learning Mobile Security with Labware 69--72
Paul Ohm Should Sniffing Wi-Fi Be Illegal? . . . 73--76
David Eckhoff and
Christoph Sommer Driving for Big Data? Privacy Concerns
in Vehicular Networking . . . . . . . . 77--79
Richard Ford and
Marco Carvalho Protecting Me . . . . . . . . . . . . . 80--82
Sergey Bratus and
Trey Darley and
Michael Locasto and
Meredith L. Patterson and
Rebecca ``bx'' Shapiro and
Anna Shubina Beyond Planted Bugs in `Trusting Trust':
The Input-Processing Frontier . . . . . 83--87
Daniel E. Geer Last Word: Polarization . . . . . . . . 88
Anonymous Subscribe to \booktitleIEEE Security &
Privacy [House Advertisement] . . . . . c3
Anonymous Front Cover . . . . . . . . . . . . . . c1
Anonymous Magazine Subscribe [House Advertisement] c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Taking Action to Build Trust in Security 3--4
Anonymous Masthead . . . . . . . . . . . . . . . . 5
Anonymous Membership Matters [House Advertisement] 6
Gary McGraw Silver Bullet Talks with Matthew Green 7--10
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 11--13
Luanne Goldrich and
Carl E. Landwehr Moving Target [Guest Editors'
introduction] . . . . . . . . . . . . . 14--15
Hamed Okhravi and
Thomas Hobson and
David Bigelow and
William Streilein Finding Focus in the Blur of
Moving-Target Techniques . . . . . . . . 16--26
Anonymous Jobs Board [House Advertisement] . . . . 27
Glenn A. Fink and
Jereme N. Haack and
A. David McKinnon and
Errin W. Fulp Defense on the Move: Ant-Based Cyber
Defense . . . . . . . . . . . . . . . . 36--43
Cherita Corbett and
Jason Uher and
Jarriel Cook and
Angela Dalton Countering Intelligent Jamming with Full
Protocol Stack Agility . . . . . . . . . 44--50
Fernand Lone Sang and
Vincent Nicomette and
Yves Deswarte A Tool to Analyze Potential I/O Attacks
against PCs . . . . . . . . . . . . . . 60--66
William H. Sanders Quantitative Security Metrics:
Unattainable Holy Grail or a Vital
Breakthrough within Our Reach? . . . . . 67--69
Diana Maimut and
Reza Reyhanitabar Authenticated Encryption: Toward
Next-Generation Algorithms . . . . . . . 70--72
Marco Carvalho and
Richard Ford Moving-Target Defenses for Computer
Networks . . . . . . . . . . . . . . . . 73--76
Michael Lesk Caller ID: Whose Privacy? . . . . . . . 77--79
Emiliano De Cristofaro Genomic Privacy and the Rise of a New
Research Community . . . . . . . . . . . 80--83
Bruce Schneier Metadata $=$ Surveillance . . . . . . . 84
Anonymous Software Experts Summit [House
Advertisement] . . . . . . . . . . . . . c3
Anonymous Rock Stars of Mobile Cloud [House
Advertisement] . . . . . . . . . . . . . c4
Anonymous Focus on Your Job Search [House
Advertisement] . . . . . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Jeremy Epstein Phishing Our Employees . . . . . . . . . 3--4
Anonymous [Masthead] . . . . . . . . . . . . . . . 5
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 6--8
Gary McGraw Silver Bullet Talks with Yoshi Kohno . . 9--12
Terry Benzel A Symposium, a Magazine, and a Community
[Guest editorial] . . . . . . . . . . . 13--14
Peter G. Neumann and
Sean Peisert and
Marvin Schaefer The IEEE Symposium on Security and
Privacy, in Retrospect . . . . . . . . . 15--17
George Cybenko and
Kathy Clark-Fisher IEEE Security & Privacy: The Early Years 18--19
Michael Z. Lee and
Alan M. Dunn and
Jonathan Katz and
Brent Waters and
Emmett Witchel Anon-Pass: Practical Anonymous
Subscriptions . . . . . . . . . . . . . 20--27
Nick Nikiforakis and
Alexandros Kapravelos and
Wouter Joosen and
Christopher Kruegel and
Frank Piessens and
Giovanni Vigna On the Workings and Current Practices of
Web-Based Device Fingerprinting . . . . 28--36
Joel Reardon and
David Basin and
Srdjan Capkun On Secure Data Deletion . . . . . . . . 37--44
Laszlo Szekeres and
Mathias Payer and
Lenx Tao Wei and
R. Sekar Eternal War in Memory . . . . . . . . . 45--53
Arthur Gervais and
Ghassan O. Karame and
Vedran Capkun and
Srdjan Capkun Is Bitcoin a Decentralized Currency? . . 54--60
Deirdre K. Mulligan The Enduring Importance of Transparency 61--65
Susan Landau Educating Engineers: Teaching Privacy in
a World of Open Doors . . . . . . . . . 66--70
Anna Slomovic Privacy Issues in Identity Verification 71--73
Milan Broz and
Vashek Matyas The TrueCrypt On-Disk Format --- An
Independent View . . . . . . . . . . . . 74--77
Michael Lesk Does the Cloud of Surveillance Have a
Silver Lining? . . . . . . . . . . . . . 78--81
Chris Bonebrake and
Lori Ross O'Neil Attacks on GPS Time Reliability . . . . 82--84
Martin Ortlieb The Anthropologist's View on Privacy . . 85--87
Steven M. Bellovin Dr. Strangecode . . . . . . . . . . . . 88
Anonymous IEEE Security & Privacy [Advertisement] c3
Anonymous Rock Stars of Cybersecurity [House
Advertisement] . . . . . . . . . . . . . c4
Anonymous Table of contents . . . . . . . . . . . 1--2
Susan Landau Security and Privacy: Facing Ethical
Choices . . . . . . . . . . . . . . . . 3--6
Anonymous [Masthead] . . . . . . . . . . . . . . . 7--7
Lee Garber Security, Privacy, Policy, and
Dependability Roundup . . . . . . . . . 8--10
Gary McGraw Silver Bullet Talks with Nate Fick . . . 11--13
Michael Kerr and
Ron van Schyndel Adapting Law Enforcement Frameworks to
Address the Ethical Problems of CCTV
Product Propagation . . . . . . . . . . 14--21
Simson L. Garfinkel and
Michael McCarrin Can We Sniff Wi-Fi?: Implications of
Joffe v. Google . . . . . . . . . . . . 22--28
Jan-Erik Ekberg and
Kari Kostiainen and
N. Asokan The Untapped Potential of Trusted
Execution Environments on Mobile Devices 29--37
Nir Kshetri China's Data Privacy Regulations: A
Tricky Tradeoff between ICT's Productive
Utilization and Cybercontrol . . . . . . 38--45
Daniel E. Geer and
Poul-Henning Kamp Inviting More Heartbleed . . . . . . . . 46--50
Robert Gellman Willis Ware's Lasting Contribution to
Privacy: Fair Information Practices . . 51--54
Rebecca Balebako and
Lorrie Cranor Improving App Privacy: Nudging App
Developers to Protect User Privacy . . . 55--58
Ari Juels and
Thomas Ristenpart Honey Encryption: Encryption beyond the
Brute-Force Barrier . . . . . . . . . . 59--62
Marco Carvalho and
Jared DeMott and
Richard Ford and
David A. Wheeler Heartbleed 101 . . . . . . . . . . . . . 63--67
Patrick McDaniel and
Brian Rivera and
Ananthram Swami Toward a Science of Secure Environments 68--70
Michael Lesk Staffing for Security: Don't Optimize 71--73
Shari Lawrence Pfleeger The Eyes Have It: Surveillance and How
It Evolved . . . . . . . . . . . . . . . 74--79
Steven M. Bellovin By Any Means Possible: How Intelligence
Agencies Have Gotten Their Data . . . . 80--84
John DeLong Aligning the Compasses: A Journey
through Compliance and Technology . . . 85--89
Daniel E. Geer Personal Data and Government
Surveillance . . . . . . . . . . . . . . 90--96
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous IEEE Security & Privacy [Advertisement] c3--c3
Anonymous Rock Stars of Cybersecurity
[Advertisement] . . . . . . . . . . . . c4--c4
Anonymous Seeking IEEE Security & Security Editor
in Chief . . . . . . . . . . . . . . . . c2--c2
Anonymous Table of contents . . . . . . . . . . . 1--2
Shari Lawrence Pfleeger Expanding to Meet Readers' Needs . . . . 3--4
Anonymous [Masthead] . . . . . . . . . . . . . . . 5--5
Gary McGraw Silver Bullet Talks with Bart Miller . . 6--8
Sean Peisert and
Jonathan Margulies and
David M. Nicol and
Himanshu Khurana and
Chris Sawall Designed-in Security for Cyber-Physical
Systems . . . . . . . . . . . . . . . . 9--12
Bill Horne On Computer Security Incident Response
Teams . . . . . . . . . . . . . . . . . 13--15
Robin Ruefle and
Audrey Dorofee and
David Mundie and
Allen D. Householder and
Michael Murray and
Samuel J. Perl Computer Security Incident Response Team
Development and Evolution . . . . . . . 16--26
Kas Clark and
Don Stikvoort and
Eelco Stofbergen and
Elly van den Heuvel A Dutch Approach to Cybersecurity
through Participation . . . . . . . . . 27--34
Sandeep Bhatt and
Pratyusa K. Manadhata and
Loai Zomlot The Operational Role of Security
Information and Event Management Systems 35--41
Panos Kampanakis Security Automation and Threat
Information-Sharing Options . . . . . . 42--51
Sathya Chandran Sundaramurthy and
John McHugh and
Xinming Simon Ou and
S. Raj Rajagopalan and
Michael Wesch An Anthropological Approach to Studying
CSIRTs . . . . . . . . . . . . . . . . . 52--60
Tiffani R. Chen and
Daniel B. Shore and
Stephen J. Zaccaro and
Reeshad S. Dalal and
Lois E. Tetrick and
Aiva K. Gorab An Organizational Psychology Perspective
to Examining Computer Security Incident
Response Teams . . . . . . . . . . . . . 61--67
Yossi Gilad and
Amir Herzberg and
Haya Shulman Off-Path Hacking: The Illusion of
Challenge--Response Authentication . . . 68--77
Katrine Evans Where in the World Is My Information?:
Giving People Access to Their Data . . . 78--81
Cuong Pham and
Zachary J. Estrada and
Phuong Cao and
Zbigniew Kalbarczyk and
Ravishankar K. Iyer Building Reliable and Secure Virtual
Machines Using Architectural Invariants 82--85
Jeffrey MacKie-Mason Can We Afford Privacy from Surveillance? 86--89
Aaron Beuhring and
Kyle Salous Beyond Blacklisting: Cyberdefense in the
Era of Advanced Persistent Threats . . . 90--93
Anonymous Intelect [Advertisement] . . . . . . . . 94--94
Bruce Schneier The Future of Incident Response . . . . 96--96
Anonymous Co3 Systems Advertisement . . . . . . . c2--c2
Anonymous IEEE Security & Privacy [Advertisement] c3--c3
Anonymous Rock Stars of Big Data Analytics
[Advertisement] . . . . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2
Shari Lawrence Pfleeger Technology, Transparency, and Trust . . 3--5
Anonymous [Masthead] . . . . . . . . . . . . . . . 6--6
Anonymous Reviewer Thanks . . . . . . . . . . . . 7--8
Gary McGraw Silver Bullet Talks with the IEEE Center
for Secure Design . . . . . . . . . . . 9--12
Sean Peisert and
Jonathan Margulies Closing the Gap on Securing Energy
Sector Control Systems [Guest Editors'
introduction] . . . . . . . . . . . . . 13--14
Carlos Barreto and
Jairo Giraldo and
Alvaro A. Cardenas and
Eduardo Mojica-Nava and
Nicanor Quijano Control Systems for the Power Grid and
Their Resiliency to Attacks . . . . . . 15--23
Moses Schwartz and
John Mulder and
Adrian R. Chavez and
Benjamin A. Allan Emerging Techniques for Field Device
Security . . . . . . . . . . . . . . . . 24--31
Chuck McParland and
Sean Peisert and
Anna Scaglione Monitoring Security of Networked Control
Systems: It's the Physics . . . . . . . 32--39
Saman Zonouz and
Julian Rrushi and
Stephen McLaughlin Detecting Industrial Control Malware
Using Automated PLC Code Analytics . . . 40--47
Ryan Ellis Regulating Cybersecurity: Institutional
Learning or a Lesson in Futility? . . . 48--54
Sean Peisert and
Jonathan Margulies and
Eric Byres and
Paul Dorey and
Dale Peterson and
Zach Tudor Control Systems Security from the Front
Lines . . . . . . . . . . . . . . . . . 55--58
Francien Dechesne and
Dina Hadziosmanovic and
Wolter Pieters Experimenting with Incentives: Security
in Pilots for Future Grids . . . . . . . 59--66
Anonymous IEEE Computer Society [Advertisement] 67--67
Jungwoo Ryoo and
Syed Rizvi and
William Aiken and
John Kissell Cloud Security Auditing: Challenges and
Emerging Approaches . . . . . . . . . . 68--74
Frank Kargl and
Rens W. van der Heijden and
Hartmut Konig and
Alfonso Valdes and
Marc C. Dacier Insights on the Security and
Dependability of Industrial Control
Systems . . . . . . . . . . . . . . . . 75--78
Melissa Dark Advancing Cybersecurity Education . . . 79--83
Wendy M. Grossman ``Emergency'' Ushers in a New Era in
British Communications Surveillance . . 84--88
Lorrie Faith Cranor and
Norbou Buchler Better Together: Usability and Security
Go Hand in Hand . . . . . . . . . . . . 89--93
Michael Lesk Trust, but Verify . . . . . . . . . . . 94--96
Todd Bauer and
Jason Hamlet Physical Unclonable Functions: A Primer 97--101
Benjamin Edelman Accountable? The Problems and Solutions
of Online Ad Optimization . . . . . . . 102--107
Steven M. Bellovin What Should Crypto Look Like? . . . . . 108--108
Anonymous [Advertisement] . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous Focus on Your Job Search [Advertisement] c2--c2
Anonymous IEEE Security & Privacy [Advertisement] c3--c3
Bill Horne Umbrellas and Octopuses . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6--6
Gary McGraw Silver Bullet Talks with Brian Krebs . . 7--11
Hilarie Orman and
Charles P. Pfleeger Mathematics and Physics Build a New
Future for Secure Communication [Guest
Editors' introduction] . . . . . . . . . 12--13
Wade Trappe and
Richard Howard and
Robert S. Moore Low-Energy Security: Limits and
Opportunities in the Internet of Things 14--21
David W. Archer and
Kurt Rohloff Computing with Data Privacy: Steps
toward Realization . . . . . . . . . . . 22--29
Logan O. Mailloux and
Michael R. Grimaila and
Douglas D. Hodson and
Gerald Baumgartner and
Colin McLaughlin Performance Evaluations of Quantum Key
Distribution System Architectures . . . 30--40
Ioana Boureanu and
Serge Vaudenay Challenges in Distance Bounding . . . . 41--48
Mark Maybury Toward the Assured Cyberspace Advantage:
Air Force Cyber Vision 2025 . . . . . . 49--56
Ricardo Padilha and
Fernando Pedone Confidentiality in the Cloud . . . . . . 57--60
Melissa Dark Thinking about Cybersecurity . . . . . . 61--65
Emil Simion The Relevance of Statistical Tests in
Cryptography . . . . . . . . . . . . . . 66--70
Budi Arief and
Mohd Azeem Bin Adzmi and
Thomas Gross Understanding Cybercrime from Its
Stakeholders' Perspectives: Part 1 ---
Attackers . . . . . . . . . . . . . . . 71--76
Rahul Telang Policy Framework for Data Breaches . . . 77--79
Daniel E. Geer, Jr. Less Is More: Saving the Internet from
Itself . . . . . . . . . . . . . . . . . 80--80
Anonymous 3rd Annual Best Scientific Cybersecurity
Paper Competition [House Advertisement] c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Mark Your Calendars [House
Advertisement] . . . . . . . . . . . . . c2--c2
Anonymous Startup Rock Stars [House Advertisement] c3--c3
Jeremy Epstein The Whole Is Less than the Sum of the
Parts . . . . . . . . . . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6--6
Gary McGraw Silver Bullet Talks with Whitfield
Diffie . . . . . . . . . . . . . . . . . 7--10
Anonymous 39th Annual International Computers,
Software & Applications Conference House
Advertisement . . . . . . . . . . . . . 11--11
Terry Benzel An Enduring Symposium for Leading
Research in Security and Privacy . . . . 12--13
Sai Teja Peddinti and
Aleksandra Korolova and
Elie Bursztein and
Geetanjali Sampemane Understanding Sensitivity by Analyzing
Anonymity [Guest Editor's introduction] 14--21
Susan Hohenberger and
Steven Myers and
Rafael Pass and
Abhi Shelat An Overview of ANONIZE: A Large-Scale
Anonymous Survey System . . . . . . . . 22--29
Per Larsen and
Stefan Brunthaler and
Michael Franz Automatic Software Diversity . . . . . . 30--37
Zongwei Zhou and
Miao Yu and
Virgil D. Gligor Dancing with Giants: Wimpy Kernels for
On-Demand I/O Isolation . . . . . . . . 38--46
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 47--47
Bhushan Jain and
Mirza Basim Baig and
Dongli Zhang and
Donald E. Porter and
Radu Sion Introspections on the Semantic Gap . . . 48--55
Mike Bond and
Marios O. Choudary and
Steven J. Murdoch and
Sergei Skorobogatov and
Ross Anderson Be Prepared: The EMV Preplay Attack . . 56--64
Vincent Lenders and
Axel Tanner and
Albert Blarer Gaining an Edge in Cyberspace with
Advanced Situational Awareness . . . . . 65--74
Melissa Dark and
Jelena Mirkovic Evaluation Theory and Practice Applied
to Cybersecurity Education . . . . . . . 75--80
Graham Steel Automated Proof and Flaw-Finding Tools
in Cryptography . . . . . . . . . . . . 81--83
Budi Arief and
Mohd Azeem Bin Adzmi Understanding Cybercrime from Its
Stakeholders' Perspectives: Part 2 ---
Defenders and Victims . . . . . . . . . 84--88
Wojciech Mazurczyk and
Luca Caviglione Information Hiding as a Challenge for
Malware Detection . . . . . . . . . . . 89--93
Sean W. Smith and
John S. Erickson Never Mind Pearl Harbor --- What about a
Cyber Love Canal? . . . . . . . . . . . 94--98
Michael Lesk Safety Risks --- Human Error or
Mechanical Failure?: Lessons from
Railways . . . . . . . . . . . . . . . . 99--102
Frederik Zuiderveen Borgesius Informed Consent: We Can Do Better to
Defend Privacy . . . . . . . . . . . . . 103--107
Bruce Schneier The Security Value of Muddling Through 108--108
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Get More, for Less! House Advertisement c4--c4
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Rock Stars of Cyber Security
[Advertisement] . . . . . . . . . . . . c2--c2
Susan Landau What Was Samsung Thinking? . . . . . . . 3--4
Gary McGraw Silver Bullet Talks with L. Jean Camp 5--7
Anonymous Masthead . . . . . . . . . . . . . . . . 8--8
Kleanthis Dellios and
Dimitrios Papanikas and
Despina Polemi Information Security Compliance over
Intelligent Transport Systems: Is IT
Possible? . . . . . . . . . . . . . . . 9--15
Nir Kshetri India's Cybersecurity Landscape: The
Roles of the Private Sector and
Public-Private Partnership . . . . . . . 16--23
David Basin and
Cas Cremers and
Kunihiko Miyazaki and
Sasa Radomirovic and
Dai Watanabe Improving the Security of Cryptographic
Protocol Standards . . . . . . . . . . . 24--31
Patricia Arias-Cabarcos and
Florina Almenarez and
Ruben Trapero and
Daniel Diaz-Sanchez and
Andres Marin Blended Identity: Pervasive IdM for
Continuous Authentication . . . . . . . 32--39
Hamilton Turner and
Jules White and
Jaime A. Camelio and
Christopher Williams and
Brandon Amos and
Robert Parker Bad Parts: Are Our Manufacturing Systems
at Risk of Silent Cyberattacks? . . . . 40--47
Kjell Jorgen Hole Diversity Reduces the Impact of Malware 48--54
Jeremy Epstein Weakness in Depth: A Voting Machine's
Demise . . . . . . . . . . . . . . . . . 55--58
Peter Y. A. Ryan and
Steve Schneider and
Vanessa Teague End-to-End Verifiability in Voting
Systems, from Theory to Practice . . . . 59--62
Jelena Mirkovic and
Melissa Dark and
Wenliang Du and
Giovanni Vigna and
Tamara Denning Evaluating Cybersecurity Education
Interventions: Three Case Studies . . . 63--69
Liam M. Mayron Biometric Authentication on Mobile
Devices . . . . . . . . . . . . . . . . 70--73
J. Adam Crain and
Sergey Bratus Bolt-On Security Extensions for
Industrial Control System Protocols: A
Case Study of DNP3 SAv5 . . . . . . . . 74--79
Angela Sasse Scaring and Bullying People into
Security Won't Work . . . . . . . . . . 80--83
Jonathan Margulies A Developer's Guide to Audit Logging . . 84--86
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 87--87
Kat Krol and
Soren Preibusch Effortless Privacy Negotiations . . . . 88--91
Steven M. Bellovin What a Real Cybersecurity Bill Should
Address . . . . . . . . . . . . . . . . 92--92
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Get more, for less! House Advertisement c4--c4
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Rock Stars of Cybersecurity House
Advertisement . . . . . . . . . . . . . c2--c2
Terry Benzel A Strategic Plan for Cybersecurity
Research and Development . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6--6
Gary McGraw Silver Bullet Talks with Katie
Moussouris . . . . . . . . . . . . . . . 7--9
Shari Lawrence Pfleeger Learning from Other Disciplines . . . . 10--11
Denise Anthony and
Timothy Stablein and
Emily K. Carian Big Brother in the Information Age:
Concerns about Government Information
Gathering over Time . . . . . . . . . . 12--19
Julie Steinke and
Balca Bolunmez and
Laura Fletcher and
Vicki Wang and
Alan J. Tomassetti and
Kristin M. Repchick and
Stephen J. Zaccaro and
Reeshad S. Dalal and
Lois E. Tetrick Improving Cybersecurity Incident
Response Team Effectiveness Using
Teams-Based Research . . . . . . . . . . 20--29
Bilal Al Sabbagh and
Stewart Kowalski A Socio-technical Framework for Threat
Modeling a Software Supply Chain . . . . 30--39
Kjell Jorgen Hole Toward Anti-fragility: A Malware-Halting
Technique . . . . . . . . . . . . . . . 40--46
Christos Dimitrakakis and
Aikaterini Mitrokotsa Distance-Bounding Protocols: Are You
Close Enough? . . . . . . . . . . . . . 47--51
David Gugelmann and
Pascal Studerus and
Vincent Lenders and
Bernhard Ager Can Content-Based Data Loss Prevention
Solutions Prevent Data Leakage in Web
Traffic? . . . . . . . . . . . . . . . . 52--59
Rohit Tyagi and
Tuhin Paul and
B. S. Manoj and
B. Thanudas Packet Inspection for Unauthorized OS
Detection in Enterprises . . . . . . . . 60--65
Jared DeMott Bypassing EMET 4.1 . . . . . . . . . . . 66--72
John Knight The Importance of Security Cases: Proof
Is Good, But Not Enough . . . . . . . . 73--75
Michael Lesk Ideas Ahead of Their Time: Digital Time
Stamping . . . . . . . . . . . . . . . . 76--79
Jonathan Margulies Garage Door Openers: An Internet of
Things Case Study . . . . . . . . . . . 80--83
Monica T. Whitty Mass-Marketing Fraud: A Growing Concern 84--87
Daniel E. Geer The Right to Be Unobserved . . . . . . . 88--88
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous 2016 Richard E. Merwin Distinguished
Service Award House Advertisement . . . c2--c2
Robin E. Bloomfield Autonomy, Robotics, and Dependability 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6--6
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 7--7
Gary McGraw Silver Bullet Talks with Bart Preneel 8--10
Anonymous 2016 Richard E. Merwin Distinguished
Service Award House Advertisement . . . 11--11
Massimo Felici and
Nick Wainwright and
Fabio Bisogni and
Simona Cavallini What's New in the Economics of
Cybersecurity?: Observational and
Empirical Studies . . . . . . . . . . . 12--15
Hadi Asghari and
Michel J. G. van Eeten and
Johannes M. Bauer Economics of Fighting Botnets: Lessons
from a Decade of Mitigation . . . . . . 16--23
Soren Preibusch The Value of Web Search Privacy . . . . 24--32
Anonymous IEEE Computer Society 2015 Call for
Major Award Nominations House
Advertisement . . . . . . . . . . . . . 33--33
Tristan Caulfield and
David Pym Improving Security Policy Decisions with
Models . . . . . . . . . . . . . . . . . 34--41
Clementina Bruno and
Luca Guidi and
Azahara Lorite-Espejo and
Daniela Pestonesi Assessing a Potential Cyberattack on the
Italian Electric System . . . . . . . . 42--51
Martina De Gramatica and
Fabio Massacci and
Woohyun Shim and
Alessandra Tedeschi and
Julian Williams IT Interdependence and the Economic
Fairness of Cybersecurity Regulations
for Civil Aviation . . . . . . . . . . . 52--61
Anonymous Call for Standards Award Nominations
House Advertisement . . . . . . . . . . 62--62
Zahid Akhtar and
Christian Micheloni and
Gian Luca Foresti Biometric Liveness Detection: Challenges
and Research Opportunities . . . . . . . 63--72
Anonymous Call for Nominees House Advertisement 73--73
Masooda Bashir and
April Lambert and
Boyi Guo and
Nasir Memon and
Tzipora Halevi Cybersecurity Competitions: The Human
Angle . . . . . . . . . . . . . . . . . 74--79
Katrine Evans Vidal--Hall and Risk Management for
Privacy Breaches . . . . . . . . . . . . 80--84
Anonymous Software Experts Summit House
Advertisement . . . . . . . . . . . . . 85--85
Gilles Barthe High-Assurance Cryptography:
Cryptographic Software We Can Trust . . 86--89
Juhee Kwon and
M. Eric Johnson Protecting Patient Data --- The Economic
Perspective of Healthcare Security . . . 90--95
Jonathan Margulies Securing Cloud-Based Applications, Part
1 . . . . . . . . . . . . . . . . . . . 96--98
David Modic and
Ross Anderson It's All Over but the Crying: The
Emotional and Financial Impact of
Internet Fraud . . . . . . . . . . . . . 99--103
Daniel E. Geer Children of the Magenta . . . . . . . . 104--104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Keep Your Career Moving Forward House
Advertisement . . . . . . . . . . . . . c3--c3
Anonymous Rock Stars of Cybersecurity House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
S. L. Pfleeger Spider-Man, Hubris, and the Future of
Security and Privacy . . . . . . . . . . 3--10
Anonymous Masthead . . . . . . . . . . . . . . . . 11
Gary McGraw Silver Bullet Talks with Steven M.
Bellovin and Matthew Green . . . . . . . 12--15
Shari Lawrence Pfleeger Lessons Learned by Our Editorial Board 16--17
R. Oppliger Quantitative Risk Analysis in
Information Security Management: A
Modern Fairy Tale . . . . . . . . . . . 18--21
C. P. Pfleeger Lesson Learned: Security is Inevitable 22--28
Anonymous Get the Recognition You Deserve House
Advertisement . . . . . . . . . . . . . 29
V. Bellandi and
S. Cimato and
E. Damiani and
G. Gianini and
A. Zilli Toward Economic-Aware Risk Assessment on
the Cloud . . . . . . . . . . . . . . . 30--37
P. H. Meland and
I. A. Tondel and
B. Solhaug Mitigating Risk with Cyberinsurance . . 38--43
A. D. Avgerou and
Y. C. Stamatiou Privacy Awareness Diffusion in Social
Networks . . . . . . . . . . . . . . . . 44--50
Anonymous Call for Papers House Advertisement . . 51
Jungwoo Ryoo and
R. Kazman and
P. Anand Architectural Analysis for Security . . 52--59
R. Verma and
M. Kantarcioglu and
D. Marchette and
E. Leiss and
T. Solorio Security Analytics: Essential Data
Analytics Knowledge for Cybersecurity
Professionals and Students . . . . . . . 60--65
J. Kosseff A New Legal Framework for Online
Anonymity: California's Privacy-Based
Approach . . . . . . . . . . . . . . . . 66--70
Anonymous Watch the World's Leading Experts Take
Multi-Core Strategies to New Heights
House Advertisement . . . . . . . . . . 71
Jia Song and
J. Alves-Foss The DARPA Cyber Grand Challenge: A
Competitor's Perspective . . . . . . . . 72--76
A. M. Memon and
A. Anwar Colluding Apps: Tomorrow's Mobile
Malware Threat . . . . . . . . . . . . . 77--81
H. Thimbleby and
R. Koppel The Healthtech Declaration . . . . . . . 82--84
M. Lesk License Creep . . . . . . . . . . . . . 85--88
A. A. Adams Possessing Mobile Devices . . . . . . . 89--95
Steven M. Bellovin The Key to the Key . . . . . . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . c3
Anonymous IEEE Computer Society: Be at the Center
of It All House Advertisement . . . . . c2
Anonymous Sponsor . . . . . . . . . . . . . . . . ??
Editor-in-Chief IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Ahmad-Reza Sadeghi Games without Frontiers: Whither
Information Security and Privacy? . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6--6
Gary McGraw Silver Bullet Talks with Peiter (Mudge)
Zatko . . . . . . . . . . . . . . . . . 7--10
Shari Lawrence Pfleeger Software Everywhere [Guest editors'
introduction] . . . . . . . . . . . . . 11--11
Eugene K. Ressler Mettle Fatigue: VW's
Single-Point-of-Failure Ethics . . . . . 12--30
Charles P. Pfleeger Looking into Software Transparency . . . 31--36
Richard Kuhn Learning Internet-of-Things Security
``Hands-On'' . . . . . . . . . . . . . . 37--46
Jeffrey H. Reed A communications jamming taxonomy . . . 47--54
Noboru Babaguchi Evaluating Protection Capability for
Visual Privacy Information . . . . . . . 55--61
Anonymous Special Issue on Real-World Cryptography
Call for Papers House Advertisement . . 62
David Naccache Fully Homomorphic Encryption:
Computations with a Blindfold . . . . . 63--67
Herbert Bos Binary Rejuvenation: Applications and
Challenges . . . . . . . . . . . . . . . 68--71
Laura Amo Addressing Gender Gaps in Teens'
Cybersecurity Engagement and
Self-Efficacy . . . . . . . . . . . . . 72--75
Jim Alves-Foss The DARPA Cyber Grand Challenge: A
Competitor's Perspective, Part 2 . . . . 76--81
Julian Williams Action, Inaction, Trust, and
Cybersecurity's Common Property Problem 82--86
Bruce Schneier Cryptography Is Harder than It Looks . . 87--88
Anonymous 4th Annual Best Scientific Cybersecurity
Paper Competition . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society: Be at the Center
of It All House Advertisement . . . . . c3--c3
Anonymous IEEE Security & Privacy Qmags
Subscription House Advertisement . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Jeremy Epstein Reflections of an NSF Program Officer 3--6
Anonymous Masthead . . . . . . . . . . . . . . . . 7--7
Gary McGraw Silver Bullet Talks with Jamie Butler 8--10
Anonymous Call for nominees . . . . . . . . . . . 11--11
Terry Benzel The IEEE Security and Privacy Symposium
Workshops . . . . . . . . . . . . . . . 12--14
Griffin Boyce Bake in .onion for Tear-Free and
Stronger Website Authentication . . . . 15--21
Dan Boneh Stickler: Defending against Malicious
Content Distribution Networks in an
Unmodified Browser . . . . . . . . . . . 22--28
Anonymous Rock Stars of Risk-Based Security House
Advertisement . . . . . . . . . . . . . 29
Anton Puzanov Analysis and Mitigation of NoSQL
Injections . . . . . . . . . . . . . . . 30--39
Jose M. del Alamo Privacy Engineering: Shaping an Emerging
Field of Research and Practice . . . . . 40--46
Anonymous IEEE Computer Society 2016 Call for
Major Award Nominations House
Advertisement . . . . . . . . . . . . . 47--47
Falko Dressler Cleaning up Web 2.0's Security Mess ---
at Least Partly . . . . . . . . . . . . 48--57
Chris Jay Hoofnagle Assessing the Federal Trade Commission's
Privacy Assessments . . . . . . . . . . 58--64
Anonymous Call for Papers Special Issue on Genome
Privacy and Security House Advertisement 65--65
Ali Sunyaev Dynamic Certification of Cloud Services:
Trust, but Verify! . . . . . . . . . . . 66--71
Anonymous IEEE Computer Society Richard E. Merwin
Student Leadership Scholarship House
Advertisement . . . . . . . . . . . . . 72--72
Sarah Zatko Rethinking the Role of Security in
Undergraduate Education . . . . . . . . 73--78
John Scott-Railton Security for the High-Risk User:
Separate and Unequal . . . . . . . . . . 79--87
Daniel E. Geer Provenance . . . . . . . . . . . . . . . 88--88
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Got flaws? House Advertisement . . . . . c2--c2
Anonymous IEEE Computer Society: Be at the Center
of It All House Advertisement . . . . . c3--c3
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Bill Horne Trust Me. Trust Me Not . . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6--6
Gary McGraw Silver Bullet Talks with Jacob West . . 7--10
Fabio Bisogni What's New in the Economics of
Cybersecurity? . . . . . . . . . . . . . 11--13
Ruud Verbij The Navigation Metaphor in Security
Economics . . . . . . . . . . . . . . . 14--21
Stephane Grumbach Chasing Data in the Intermediation Era:
Economy and Security at Stake . . . . . 22--31
Hongxin Hu Mules, Seals, and Attacking Tools:
Analyzing 12 Online Marketplaces . . . . 32--43
Panayotis A. Yannakogeorgos Designing Cybersecurity into Defense
Systems: An Information Economics
Approach . . . . . . . . . . . . . . . . 44--51
Julian Williams Economic Impacts of Rules- versus
Risk-Based Cybersecurity Regulations for
Critical Infrastructure Providers . . . 52--60
Michael Waidner HbbTV Security and Privacy: Issues and
Challenges . . . . . . . . . . . . . . . 61--67
Z. Berkay Celik Machine Learning in Adversarial Settings 68--72
Neeraj Suri Quantifiably Trusting the Cloud: Putting
Metrics to Work . . . . . . . . . . . . 73--77
Darren Lawrence Security Dialogues: Building Better
Relationships between Security and
Business . . . . . . . . . . . . . . . . 82--87
Steven M. Bellovin Attack Surfaces . . . . . . . . . . . . 88--88
Anonymous Call for Papers Special Issue on
Electronic Voting House Advertisement c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Got flaws? House Advertisement . . . . . c2--c2
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Table of Contents . . . . . . . . . . . 1--2
Terry Benzel The Growth of a Conference, a Community,
and an Industry . . . . . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6
Gary McGraw Silver Bullet Talks with Martin Hellman 7--11
Qing-Yun Li and
Lei Zhang The Public Security and Personal Privacy
Survey: Biometric Technology in Hong
Kong . . . . . . . . . . . . . . . . . . 12--21
Jussi Laakkonen and
Janne Parkkila and
Pekka Jappinen and
Jouni Ikonen and
Ahmed Seffah Incorporating Privacy into Digital Game
Platform Design: The What, Why, and How 22--32
Anonymous IEEE Computer Society: Be at the Center
of It All House Advertisement . . . . . 33
Madhusanka Liyanage and
Ahmed Bux Abro and
Mika Ylianttila and
Andrei Gurtov Opportunities and Challenges of
Software-Defined Mobile Networks in
Network Security . . . . . . . . . . . . 34--44
Anonymous Call for Papers Special Issue on
Electronic Voting . . . . . . . . . . . 45
Aditya K. Sood and
Sherali Zeadally A Taxonomy of Domain-Generation
Algorithms . . . . . . . . . . . . . . . 46--53
Diego A. Ortiz-Yepes A Review of Technical Approaches to
Realizing Near-Field Communication
Mobile Payments . . . . . . . . . . . . 54--62
Anonymous Call for Papers Special Issue on
Postquantum Cryptography . . . . . . . . 63
Craig Burton and
Chris Culnane and
Steve Schneider vVote: Verifiable Electronic Voting in
Practice . . . . . . . . . . . . . . . . 64--73
Baijian Justin Yang and
Brian Kirk Try-CybSI: A Platform for Trying Out
Cybersecurity . . . . . . . . . . . . . 74--75
Logan O. Mailloux and
Michael A. McEvilley and
Stephen Khou and
John M. Pecarina Putting the `Systems' in Security
Engineering: An Examination of NIST
Special Publication 800-160 . . . . . . 76--80
Anonymous IEEE Computer Society 2016 Call for
Major Award Nominations House
Advertisement . . . . . . . . . . . . . 81
Robert Cunningham and
Pamela Gupta and
Ulf Lindqvist and
Stelios Sidiroglou-Douskos and
Michael Hicks IEEE SecDev 2016: Prioritizing Secure
Development . . . . . . . . . . . . . . 82--84
Anonymous Computer Entrepreneur Award House
Advertisement . . . . . . . . . . . . . 85
Anonymous Call for Nominees Education Awards
Nominations House Advertisement . . . . 86
Daniel E. Geer Privacy's Paradigm . . . . . . . . . . . 87--88
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Got flaws? House Advertisement . . . . . c3--c3
Anonymous IEEE Security & Privacy House
Advertisement . . . . . . . . . . . . . c4--c4
Anonymous Rock Stars of Cybersecurity House
Advertisement . . . . . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Susan Landau Is It Legal? Is It Right? The Can and
Should of Use . . . . . . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6
Marcus Ranum Silver Bullet Talks with Gary McGraw . . 7--10
M. Angela Sasse and
Matthew Smith The Security--Usability Tradeoff Myth
[Guest Editors' introduction] . . . . . 11--13
Mary Theofanos and
Simson Garfinkel and
Yee-Yin Choong Secure and Usable Enterprise
Authentication: Lessons from the Field 14--21
Deanna D. Caputo and
Shari Lawrence Pfleeger and
M. Angela Sasse and
Paul Ammann and
Jeff Offutt and
Lin Deng Barriers to Usable Security? Three
Organizational Case Studies . . . . . . 22--32
M. Angela Sasse and
Matthew Smith and
Cormac Herley and
Heather Lipford and
Kami Vaniea Debunking Security--Usability Tradeoff
Myths . . . . . . . . . . . . . . . . . 33--39
Matthew Green and
Matthew Smith Developers are Not the Enemy!: The Need
for Usable Security APIs . . . . . . . . 40--46
Anonymous Rock Stars of Pervasive, Predictive
Analytics . . . . . . . . . . . . . . . 47
David W. Archer and
Dan Bogdanov and
Benny Pinkas and
Pille Pullonen Maturity and Performance of Programmable
Secure Computation . . . . . . . . . . . 48--56
Anonymous Call for Papers Special Issue on
Postquantum Cryptography . . . . . . . . 57
Ahmad-Reza Sadeghi and
Ghada Dessouky Security & Privacy Week Interviews, Part
1 . . . . . . . . . . . . . . . . . . . 58--67
Rita Heimes Global InfoSec and Breach Standards . . 68--72
Ivo Flammer Genteel Wearables: Bystander-Centered
Design . . . . . . . . . . . . . . . . . 73--79
Hui Xu and
Michael R. Lyu Assessing the Security Properties of
Software Obfuscation . . . . . . . . . . 80--83
Tina Ladabouche and
Steve LaFountain GenCyber: Inspiring the Next Generation
of Cyber Stars . . . . . . . . . . . . . 84--86
Anonymous Got flaws? . . . . . . . . . . . . . . . 87
Marc Beunardeau and
Aisling Connolly and
Remi Geraud and
David Naccache White-Box Cryptography: Security in an
Insecure Environment . . . . . . . . . . 88--92
Jonathan Margulies and
Michael Berg That Certificate You Bought Could Get
You Hacked . . . . . . . . . . . . . . . 93--95
Bruce Schneier Stop Trying to Fix the User . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Cybersecurity Development SecDev
2016 . . . . . . . . . . . . . . . . . . c2--c2
Anonymous IEEE Security & Privacy . . . . . . . . . c4--c4
Anonymous New Membership Options for A Better Fit c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Gary McGraw Silver Bullet Talks with Jim Manico . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6
Dan Boneh and
Kenny Paterson and
Nigel P. Smart Building a Community of Real-World
Cryptographers . . . . . . . . . . . . . 7--9
Phillip Rogaway Practice-Oriented Provable Security and
the Social Construction of Cryptography 10--17
Karthikeyan Bhargavan and
Cedric Fournet and
Markulf Kohlweiss miTLS: Verifying Protocol
Implementations against Real-World
Attacks . . . . . . . . . . . . . . . . 18--25
Aaron Tomb Automated Verification of Real-World
Cryptographic Implementations . . . . . 26--33
Neal Koblitz and
Alfred Menezes A Riddle Wrapped in an Enigma . . . . . 34--42
Lucas Dixon and
Thomas Ristenpart and
Thomas Shrimpton Network Traffic Obfuscation and
Automated Internet Censorship . . . . . 43--53
Shay Gueron Memory Encryption for General-Purpose
Processors . . . . . . . . . . . . . . . 54--62
Jingqiang Lin and
Bo Luo and
Le Guan and
Jiwu Jing Secure Computing Using Registers and
Caches: The Problem, Challenges, and
Solutions . . . . . . . . . . . . . . . 63--70
Ahmad-Reza Sadeghi and
Ghada Dessouky Security & Privacy Week Interviews, Part
2 . . . . . . . . . . . . . . . . . . . 71--80
Omer Tene Microsoft v. USA: Location of Data and
the Law of the Horse . . . . . . . . . . 81--85
Christof Fetzer Building Critical Applications Using
Microservices . . . . . . . . . . . . . 86--89
Portia Pusey and
Mark Gondree and
Zachary Peterson The Outcomes of Cybersecurity
Competitions and Implications for
Underrepresented Populations . . . . . . 90--95
Steven M. Bellovin Easy Email Encryption . . . . . . . . . 96--96
Anonymous Can You Invent a Better World through
Technologies? . . . . . . . . . . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous New Membership Options for a Better Fit c2--c2
Anonymous TechIgnite . . . . . . . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Ahmad-Reza Sadeghi Security and Privacy More Crucial than
Ever . . . . . . . . . . . . . . . . . . 3--4
Anonymous Masthead . . . . . . . . . . . . . . . . 5
Anonymous Reviewer Thanks . . . . . . . . . . . . 6--7
Gary McGraw Silver Bullet Talks with Marie Moe . . . 8--11
Jacob Bellatti and
Andrew Brunner and
Joseph Lewis and
Prasad Annadata and
Wisam Eltarjaman and
Rinku Dewri and
Ramakrishna Thurimella Driving Habits Data: Location Privacy
Implications and Solutions . . . . . . . 12--20
Anonymous Call for Papers: Special Issue on
Hacking without Humans . . . . . . . . . 21
Oyindamola Oluwatimi and
Daniele Midi and
Elisa Bertino Overview of Mobile Containerization
Approaches and Open Research Directions 22--31
Pawel Lubomski and
Henryk Krawczyk Practical Evaluation of Internet
Systems' Security Mechanisms . . . . . . 32--40
Anonymous Call for Papers: Special Issue on
Digital Forensics . . . . . . . . . . . 41
Manjur Kolhar and
Mosleh M. Abu-Alhaj and
Saied M. Abd El-atty Cloud Data Auditing Techniques with a
Focus on Privacy and Security . . . . . 42--51
Ezhil Kalaimannan and
Jatinder N. D. Gupta The Security Development Lifecycle in
the Context of Accreditation Policies
and Standards . . . . . . . . . . . . . 52--57
Hossein Homaei and
Hamid Reza Shahriari Seven Years of Software Vulnerabilities:
The Ebb and Flow . . . . . . . . . . . . 58--65
Ahmad-Reza Sadeghi and
Ghada Dessouky Security & Privacy Week Interviews, Part
3 . . . . . . . . . . . . . . . . . . . 66--74
Franziska Roesner Designing Application Permission Models
that Meet User Expectations . . . . . . 75--79
Nir Kshetri An Opinion on the ``Report on Securing
and Growing the Digital Economy'' . . . 80--85
Anonymous Focus on Your Job Search . . . . . . . . 86
Daniel E. Geer and
Richard Danzig Mutual Dependence Demands Mutual Sharing 87--88
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous TechIgnite . . . . . . . . . . . . . . . c2--c2
Anonymous New Membership Options for a Better Fit c3--c3
Anonymous IEEE Security & Privacy . . . . . . . . . c4--c4
Anonymous Unwavering Mission Unwavering Commitment
Advertisement . . . . . . . . . . . . . 1
Anonymous Not so Secure House Advertisement . . . 2
Anonymous Table of Contents . . . . . . . . . . . 3--4
Jeremy Epstein Privacy is Context Dependent . . . . . . 5--6
Anonymous Masthead . . . . . . . . . . . . . . . . 7
Gary McGraw Silver Bullet Talks with Lesley Carhart 8--10
Terry Benzel Selected Papers from the 2016 IEEE
Symposium on Security and Privacy . . . 11--13
Anonymous Prepose: Privacy, Security, and
Reliability for Gesture-Based
Programming . . . . . . . . . . . . . . 14--23
Anonymous Security Implications of Permission
Models in Smart-Home Application
Frameworks . . . . . . . . . . . . . . . 24--30
Anonymous Focus on Your Job Search House
Advertisement . . . . . . . . . . . . . 31
Anonymous The Perils of User Tracking Using
Zero-Permission Mobile Apps . . . . . . 32--41
Anonymous Apple ZeroConf Holes: How Hackers Can
Steal iPhone Photos . . . . . . . . . . 42--49
Anonymous How Internet Resources Might Be Helping
You Develop Faster but Less Securely . . 50--60
Anonymous 2017 B. Ramakrishna Rau Award Call for
Nominations House Advertisement . . . . 61
Anonymous The Danger of USB Drives . . . . . . . . 62--69
Anonymous Dawn of the Dead Domain: Measuring the
Exploitation of Residual Trust in
Domains . . . . . . . . . . . . . . . . 70--77
Anonymous Does the Online Card Payment Landscape
Unwittingly Facilitate Fraud? . . . . . 78--86
Anonymous myCS House Advertisement . . . . . . . . 87
Ahmad-Reza Sadeghi and
Shaza Zeitouni ACM CCS 2016 Interviews, Part 1 . . . . 88--91
Anonymous Does Industry Self-Regulation of
Consumer Data Privacy Work? . . . . . . 92--95
Anonymous Security Challenges and Opportunities of
Software-Defined Networking . . . . . . 96--100
Anonymous Call for Nominees Education Awards
Nominations House Advertisement . . . . 101
Anonymous How Businesses Can Speed Up
International Cybercrime Investigation 102--106
Anonymous IEEE Computer Society 2017 Call for
Major Award Nominations House
Advertisement . . . . . . . . . . . . . 107
Bruce Schneier The Internet of Things Will Upend Our
Industry . . . . . . . . . . . . . . . . 108
Anonymous Behind the Scenes at NSA Advertisement c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Security & Privacy . . . . . . . . . c4--c4
Anonymous New Membership Options for A Better Fit.
House Advertisement . . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Ethics in Information Security . . . . . 3--4
Anonymous Masthead . . . . . . . . . . . . . . . . 5
Gary McGraw Silver Bullet Talks with Kate Pearce . . 6--9
Anonymous New Membership Options for A Better Fit 10
Anonymous Achieve your career goals with the fit
that's right for you. . . . . . . . . . 11
Josh Benaloh and
Peter Y. A. Ryan and
Steve Schneider and
Vanessa Teague A Vote of Confidence? . . . . . . . . . 12--13
Aggelos Kiayias and
Thomas Zacharias and
Bingsheng Zhang An Efficient E2E Verifiable E-voting
System without Setup Assumptions . . . . 14--23
Oksana Kulyk and
Stephan Neumann and
Jurlind Budurushi and
Melanie Volkamer Nothing Comes for Free: How Much
Usability Can You Sacrifice for
Security? . . . . . . . . . . . . . . . 24--29
Aleksander Essex Detecting the Detectable: Unintended
Consequences of Cryptographic Election
Verification . . . . . . . . . . . . . . 30--38
Anonymous Call for Papers: Special Issue on AI
Ethics: The Privacy Challenge . . . . . 39
Jeroen van de Graaf Long-Term Threats to Ballot Privacy . . 40--47
Ronald L. Rivest and
Philip B. Stark When Is an Election Verifiable? . . . . 48--50
Anonymous Call for Nominees: Education Awards
Nominations . . . . . . . . . . . . . . 51
Aanjhan Ranganathan and
Srdjan Capkun Are We Really Close? Verifying Proximity
in Wireless Systems . . . . . . . . . . 52--58
Anonymous IEEE Computer Society 2017 Call for
Major Award Nominations . . . . . . . . 59
Jay Aikat and
Aditya Akella and
Jeffrey S. Chase and
Ari Juels and
Michael K. Reiter and
Thomas Ristenpart and
Vyas Sekar and
Michael Swift Rethinking Security in the Era of Cloud
Computing . . . . . . . . . . . . . . . 60--69
Ahmad-Reza Sadeghi and
Shaza Zeitouni ACM CCS 2016 Interviews, Part 2 . . . . 70--76
Anonymous IEEE Computer Society . . . . . . . . . 77
Chetan Gupta The Market's Law of Privacy: Case
Studies in Privacy and Security Adoption 78--83
Sai Teja Peddinti and
Keith W. Ross and
Justin Cappos User Anonymity on Twitter . . . . . . . 84--87
Anonymous myCS . . . . . . . . . . . . . . . . . . 88
Anonymous IEEE Computer Society Harlan D. Mills
Award . . . . . . . . . . . . . . . . . 89
Richard Weiss and
Franklyn Turbak and
Jens Mache and
Michael E. Locasto Cybersecurity Education and Assessment
in EDURange . . . . . . . . . . . . . . 90--95
Steven M. Bellovin Jurisdiction and the Internet . . . . . 96
Anonymous Call for Papers: Special Issue on
Hacking without Humans . . . . . . . . . c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Focus on Your Job Search . . . . . . . . c3--c3
Anonymous IEEE Security & Privacy . . . . . . . . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous Authorship Integrity and Attacks . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6
Gary McGraw Silver Bullet Talks with Kelly Lum . . . 7--10
Anonymous Looking for the BEST Tech Job for You?
[advertisement] . . . . . . . . . . . . 11
Johannes Buchmann and
Kristin Lauter and
Michele Mosca Postquantum Cryptography --- State of
the Art . . . . . . . . . . . . . . . . 12--13
John Mulholland and
Michele Mosca and
Johannes Braun The Day the Cryptography Dies . . . . . 14--21
Kristin Lauter Postquantum Opportunities: Lattices,
Homomorphic Encryption, and
Supersingular Isogeny Graphs . . . . . . 22--27
Jintai Ding and
Albrecht Petzoldt Current State of Multivariate
Cryptography . . . . . . . . . . . . . . 28--36
Denis Butin Hash-Based Signatures: State of Play . . 37--43
Nicolas Sendrier Code-Based Cryptography: State of the
Art and Perspectives . . . . . . . . . . 44--50
Lidong Chen Cryptography Standards in Quantum Time:
New Wine in an Old Wineskin? . . . . . . 51--57
Ahmad-Reza Sadeghi and
Shaza Zeitouni ACM CCS 2016 Interview, Part 3 . . . . . 58--61
Bart P. Knijnenburg Privacy? I Can't Even! Making a Case for
User-Tailored Privacy . . . . . . . . . 62--67
Bryan Reinicke and
Jeffrey Cummings and
Howard Kleinberg The Right to Digital Self-Defense . . . 68--71
Alan Sherman and
Melissa Dark and
Agnes Chan and
Rylan Chong and
Thomas Morris and
Linda Oliva and
John Springer and
Bhavani Thuraisingham and
Christopher Vatcher and
Rakesh Verma and
Susanne Wetzel INSuRE: Collaborating Centers of
Academic Excellence Engage Students in
Cybersecurity Research . . . . . . . . . 72--78
Earlence Fernandes and
Amir Rahmati and
Kevin Eykholt and
Atul Prakash Internet of Things Security Research: A
Rehash of Old Ideas or New Intellectual
Challenges? . . . . . . . . . . . . . . 79--84
Archer Batcheller and
Summer Craze Fowler and
Robert Cunningham and
Dinara Doyle and
Trent Jaeger and
Ulf Lindqvist Building on the Success of Building
Security In . . . . . . . . . . . . . . 85--87
Daniel E. Geer Attribution . . . . . . . . . . . . . . 88
Anonymous Call for Papers Special Issue on AI
Ethics: The Privacy Challenge . . . . . c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Security & Privacy . . . . . . . . . c4--c4
Anonymous New membership options for a better fit
[advertisement] . . . . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous AI Industrial Complex: The Challenge of
AI Ethics . . . . . . . . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6
Gary McGraw Silver Bullet Talks with Ksenia
Dmitrieva-Peguero . . . . . . . . . . . 7--9
Jean-Pierre Hubaux and
Stefan Katzenbeisser and
Bradley Malin Genomic Data Privacy and Security: Where
We Stand and Where We Are Heading . . . 10--12
Anonymous Call for Nominees Education Awards
Nominations . . . . . . . . . . . . . . 13
Sara Renee Savage Characterizing the Risks and Harms of
Linking Genomic Information to
Individuals . . . . . . . . . . . . . . 14--19
Marina Blanton and
Fattaneh Bayatbabolghani Improving the Security and Efficiency of
Private Genomic Computation Using Server
Aid . . . . . . . . . . . . . . . . . . 20--28
Erman Ayday and
Mathias Humbert Inference Attacks against Kin Genomic
Privacy . . . . . . . . . . . . . . . . 29--37
Tatiana Bradley and
Xuhua Ding and
Gene Tsudik Genomic Security (Lest We Forget) . . . 38--46
Adenekan Dedeke Cybersecurity Framework Adoption: Using
Capability Levels for Implementation
Tiers and Profiles . . . . . . . . . . . 47--54
Robert W. Reeder and
Iulia Ion and
Sunny Consolvo 152 Simple Steps to Stay Safe Online:
Security Advice for Non-Tech-Savvy Users 55--64
Alexander Kott and
Jackson Ludwig and
Mona Lange Assessing Mission Impact of
Cyberattacks: Toward a Model-Driven
Paradigm . . . . . . . . . . . . . . . . 65--74
Anonymous Take the CS Library wherever you go! . . 75
Tara Matthews and
Kathleen O'Leary and
Anna Turner and
Manya Sleeper and
Jill Palzkill Woelfer and
Martin Shelton and
Cori Manthorne and
Elizabeth F. Churchill and
Sunny Consolvo Security and Privacy Experiences and
Practices of Survivors of Intimate
Partner Abuse . . . . . . . . . . . . . 76--81
Rolf Oppliger Disillusioning Alice and Bob . . . . . . 82--84
Patrick Traynor and
Kevin Butler and
Jasmine Bowers and
Bradley Reaves FinTechSec: Addressing the Security
Challenges of Digital Financial Services 85--89
David O'Reilly Availability of Required Data to Support
Criminal Investigations Involving
Large-Scale IP Address-Sharing
Technologies . . . . . . . . . . . . . . 90--93
Sean Peisert and
Von Welch The Open Science Cyber Risk Profile: The
Rosetta Stone for Open Science and
Cybersecurity . . . . . . . . . . . . . 94--95
Bruce Schneier IoT Security: What's Plan B? . . . . . . 96
Anonymous Call for Papers Special Issue on
Security and Privacy Research in Brazil c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous \booktitleIEEE Security & Privacy . . . . c4--c4
Anonymous New Membership Options for a Better Fit c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Security Advice That Can Be Followed . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6
Gary McGraw Silver Bullet Talks with Nicole Perlroth 7--9
Wojciech Mazurczyk and
Luca Caviglione and
Steffen Wendzel Recent Advancements in Digital Forensics 10--11
Anonymous The Future of Digital Forensics:
Challenges and the Road Ahead . . . . . 12--17
Anonymous Programmable Logic Controller Forensics 18--24
Anonymous Botnet Fingerprinting: Anomaly Detection
in SMTP Conversations . . . . . . . . . 25--32
Anonymous PROFORMA: Proactive Forensics with
Message Analytics . . . . . . . . . . . 33--41
Anonymous Mobile Forensics: Advances, Challenges,
and Research Opportunities . . . . . . . 42--51
Anonymous An Exploration of the Effects of Sensory
Stimuli on the Completion of Security
Tasks . . . . . . . . . . . . . . . . . 52--60
Anonymous Faster Secure Cloud Computations with a
Trusted Proxy . . . . . . . . . . . . . 61--67
Anonymous Decision and Experienced Utility:
Computational Applications in Privacy
Decision Making . . . . . . . . . . . . 68--72
Anonymous The Last Mile for IoT Privacy . . . . . 73--76
Anonymous Securing Binary Code . . . . . . . . . . 77--81
Anonymous NAND Flash Memory Forensic Analysis and
the Growing Challenge of Bit Errors . . 82--87
Steven M. Bellovin Who Are You? . . . . . . . . . . . . . . 88
Anonymous Call for Papers Special Issue on
Security and Privacy Research in Brazil c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous Got flaws? . . . . . . . . . . . . . . . c4--c4
Anonymous #SP18 is back in San Francisco! . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Reviewer Thanks . . . . . . . . . . . . 3--4
Anonymous Masthead . . . . . . . . . . . . . . . . 5
Gary McGraw Silver Bullet Talks with Wafaa Mamilli 6--9
Terry Benzel and
Sean Peisert Selected Papers from the 2017 IEEE
Symposium on Security and Privacy . . . 10--11
Cormac Herley and
P. C. van Oorschot Science of Security: Combining Theory
and Measurement to Reflect the
Observable . . . . . . . . . . . . . . . 12--22
Anonymous Cross-pollinate your ideas . . . . . . . 23
Paul Pearce and
Roya Ensafi and
Frank Li and
Nick Feamster and
Vern Paxson Toward Continual Measurement of Global
Network-Level Censorship . . . . . . . . 24--33
Mathias Lecuyer and
Riley Spahn and
Roxana Geambasu and
Tzu-Kuo Huang and
Siddhartha Sen Enhancing Selectivity in Big Data . . . 34--42
Anonymous COMPSAC 2018 . . . . . . . . . . . . . . 43
Kiron Lebeck and
Kimberly Ruth and
Tadayoshi Kohno and
Franziska Roesner Arya: Operating System Support for
Securely Augmenting Reality . . . . . . 44--53
Eyal Ronen and
Adi Shamir and
Achi-Or Weingarten and
Colin O'Flynn IoT Goes Nuclear: Creating a Zigbee
Chain Reaction . . . . . . . . . . . . . 54--62
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 63
Primal Wijesekera and
Arjun Baokar and
Lynn Tsai and
Joel Reardon and
Serge Egelman and
David Wagner and
Konstantin Beznosov Dynamically Regulating Mobile
Application Permissions . . . . . . . . 64--71
Feng Hao and
Dylan Clarke and
Brian Randell and
Siamak F. Shahandashti Verifiable Classroom Voting in Practice 72--81
Rick Hofstede and
Aiko Pras and
Anna Sperotto and
Gabi Dreo Rodosek Flow-Based Compromise Detection: Lessons
Learned . . . . . . . . . . . . . . . . 82--89
Anonymous myCS . . . . . . . . . . . . . . . . . . 90
Anonymous Prepare to Connect . . . . . . . . . . . 91
Massimiliano Albanese and
Sushil Jajodia and
Sridhar Venkatesan Defending from Stealthy Botnets Using
Moving Target Defenses . . . . . . . . . 92--97
Siddharth Kaza and
Blair Taylor and
Kyle Sherbert Hello, World! --- Code Responsibly . . . 98--100
Anonymous IEEE Computer Society: Be at the Center
of It All . . . . . . . . . . . . . . . 101
Aisling Connolly Freedom of Encryption . . . . . . . . . 102--103
Daniel E. Geer Trading Places . . . . . . . . . . . . . 104
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Computer Society . . . . . . . . . c3--c3
Anonymous SP18 is back in San Francisco! . . . . . c2--c2
Anonymous Take the CS Library wherever you go! . . c4--c4
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous Introduction from the New EIC . . . . . 3--4
Anonymous Masthead . . . . . . . . . . . . . . . . 5
Gary McGraw Silver Bullet Talks with Craig Froelich 6--8
Anonymous IEEE Computer Society . . . . . . . . . 9
Timothy Vidas and
Per Larsen and
Hamed Okhravi and
Ahmad-Reza Sadeghi Changing the Game of Software Security 10--11
Yan Shoshitaishvili and
Antonio Bianchi and
Kevin Borgolte and
Amat Cama and
Jacopo Corbetta and
Francesco Disperati and
Audrey Dutcher and
John Grosen and
Paul Grosen and
Aravind Machiry and
Chris Salls and
Nick Stephens and
Ruoyu Wang and
Giovanni Vigna Mechanical Phish: Resilient Autonomous
Hacking . . . . . . . . . . . . . . . . 12--22
Benjamin Price and
Michael Zhivich and
Michael Thompson and
Chris Eagle House Rules: Designing the Scoring
Algorithm for Cyber Grand Challenge . . 23--31
Timothy Bryant and
Shaun Davenport A Honeybug for Automated Cyber Reasoning
Systems . . . . . . . . . . . . . . . . 32--36
Michael F. Thompson Effects of a Honeypot on the Cyber Grand
Challenge Final Event . . . . . . . . . 37--41
Anh Nguyen-Tuong and
David Melski and
Jack W. Davidson and
Michele Co and
William Hawkins and
Jason D. Hiser and
Derek Morris and
Ducson Nguyen and
Eric Rizzi Xandra: An Autonomous Cyber Battle
System for the Cyber Grand Challenge . . 42--51
Thanassis Avgerinos and
David Brumley and
John Davis and
Ryan Goulden and
Tyler Nighswander and
Alex Rebert and
Ned Williamson The Mayhem Cyber Reasoning System . . . 52--60
Peter Goodman and
Artem Dinaburg The Past, Present, and Future of
Cyberdyne . . . . . . . . . . . . . . . 61--69
Peter Blank and
Sabrina Kirrane and
Sarah Spiekermann Privacy-Aware Restricted Areas for
Unmanned Aerial Systems . . . . . . . . 70--79
Cliff Wang and
Zhuo Lu Cyber Deception: Overview and the Road
Ahead . . . . . . . . . . . . . . . . . 80--85
Pamela Wisniewski The Privacy Paradox of Adolescent Online
Safety: A Matter of Risk Prevention or
Risk Resilience? . . . . . . . . . . . . 86--90
Michael F. Thompson and
Cynthia E. Irvine Individualizing Cybersecurity Lab
Exercises with Labtainers . . . . . . . 91--95
Bruce Schneier Artificial Intelligence and the
Attack/Defense Balance . . . . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Security & Privacy . . . . . . . . . c4--c4
Anonymous Seymour Cray, Sidney Fernbach & Ken
Kennedy Awards . . . . . . . . . . . . . c2--c2
Anonymous Share the gift of knowledge: give your
favorite student a membership to the
IEEE Computer Society! . . . . . . . . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous How Many Is Too Many Candidates? . . . . 3--5
John D. McLean and
Cormac Herley and
P. C. Van Oorschot Letter to the Editor . . . . . . . . . . 6--10
Anonymous Masthead . . . . . . . . . . . . . . . . 11
Gary McGraw Silver Bullet Talks with Bruce Potter 12--14
Omer Tene and
Jules Polonetsky and
Ahmad-Reza Sadeghi Five Freedoms for the Homo Deus . . . . 15--17
Robert H. Sloan and
Richard Warner When Is an Algorithm Transparent?
Predictive Analytics, Privacy, and
Public Policy . . . . . . . . . . . . . 18--25
Bernd Carsten Stahl and
David Wright Ethics and Privacy in AI and Big Data:
Implementing Responsible Research and
Innovation . . . . . . . . . . . . . . . 26--33
Micah Altman and
Alexandra Wood and
Effy Vayena A Harm-Reduction Framework for
Algorithmic Fairness . . . . . . . . . . 34--45
Lilian Edwards and
Michael Veale Enslaving the Algorithm: From a ``Right
to an Explanation'' to a ``Right to
Better Decisions''? . . . . . . . . . . 46--54
Anonymous IEEE Computer Society . . . . . . . . . 55
Dawn E. Schrader and
Dipayan Ghosh Proactively Protecting Against the
Singularity: Ethical Decision Making in
AI . . . . . . . . . . . . . . . . . . . 56--63
Meg Leta Jones and
Ellen Kaufman and
Elizabeth Edenberg AI and the Ethics of Automating Consent 64--72
Reuben Binns What Can Political Philosophy Teach Us
about Algorithmic Fairness? . . . . . . 73--80
Jian Liu and
Wenting Li and
Ghassan O. Karame and
N. Asokan Toward Fairness of Cryptocurrency
Payments . . . . . . . . . . . . . . . . 81--89
Michael Franz Making Multivariant Programming
Practical and Inexpensive . . . . . . . 90--94
Anonymous Computing in Science & Engineering . . . 95
Awais Rashid and
George Danezis and
Howard Chivers and
Emil Lupu and
Andrew Martin and
Makayla Lewis and
Claudia Peersman Scoping the Cyber Security Body of
Knowledge . . . . . . . . . . . . . . . 96--102
Amin Kharraz and
William Robertson and
Engin Kirda Protecting against Ransomware: A New
Line of Research or Restating Classic
Ideas? . . . . . . . . . . . . . . . . . 103--107
Steven M. Bellovin Toward a National Cybersecurity Policy 108
Anonymous Connect on Interface . . . . . . . . . . c2--c2
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Security & Privacy . . . . . . . . . c4--c4
Anonymous One membership. Unlimited knowledge . . c3--c3
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Encouraging Diversity in Security and
Privacy Research . . . . . . . . . . . . 3--5
Anonymous Masthead . . . . . . . . . . . . . . . . 6
Gary McGraw Silver Bullet Talks with Nick Weaver . . 7--10
Ghassan Karame and
Srdjan Capkun Blockchain Security and Privacy . . . . 11--12
Sarah Meiklejohn Top Ten Obstacles along Distributed
Ledgers Path to Adoption . . . . . . . . 13--19
Paul Dunphy and
Fabien A. P. Petitcolas A First Look at Identity Management
Schemes on the Blockchain . . . . . . . 20--29
Lin Chen and
Lei Xu and
Zhimin Gao and
Yang Lu and
Weidong Shi Tyranny of the Majority: On the
(Im)possibility of Correctness of Smart
Contracts . . . . . . . . . . . . . . . 30--37
Ryan Henry and
Amir Herzberg and
Aniket Kate Blockchain Access Privacy: Challenges
and Directions . . . . . . . . . . . . . 38--45
Ilias Giechaskiel and
Cas Cremers and
Kasper B. Rasmussen When the Crypto in Cryptocurrencies
Breaks: Bitcoin Security under Broken
Primitives . . . . . . . . . . . . . . . 46--56
Rachid El Bansarkhani and
Matthias Geihs and
Johannes Buchmann PQChain: Strategic Design Decisions for
Distributed Ledger Technologies against
Future Threats . . . . . . . . . . . . . 57--65
Raffaello Perrotta and
Feng Hao Botnet in the Browser: Understanding
Threats Caused by Malicious Browser
Extensions . . . . . . . . . . . . . . . 66--81
Yang Wang Inclusive Security and Privacy . . . . . 82--87
Irfan Ahmed and
Vassil Roussev Peer Instruction Teaching Methodology
for Cybersecurity Education . . . . . . 88--91
Giannis Tziakouris Cryptocurrencies --- A Forensic
Challenge or Opportunity for Law
Enforcement? An INTERPOL Perspective . . 92--94
Anonymous IEEE Computer Society Information . . . 95
Daniel E. Geer You Are What You Eat . . . . . . . . . . 96
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous IEEE Security & Privacy . . . . . . . . . c2--c2
Anonymous Stay Connected . . . . . . . . . . . . . c4--c4
Anonymous Share The Gift Of Knowledge: Give Your
Favorite Student a Membership to the
IEEE Computer Society! . . . . . . . . . c3--c3
Anonymous Front Cover . . . . . . . . . . . . . . c1--c1
Anonymous \booktitleIEEE Security & Privacy Special
Issue Call for Papers . . . . . . . . . c2--c2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Internet of Things Security: Is Anything
New? . . . . . . . . . . . . . . . . . . 3--5
Anonymous [Masthead] . . . . . . . . . . . . . . . 6--6
G. McGraw Silver Bullet Talks with Tanya Janca . . 7--11
J. Buchmann and
K. Lauter and
M. Mosca Postquantum Cryptography, Part 2 . . . . 12--13
S. P. Jordan and
Y. Liu Quantum Cryptanalysis: Shor, Grover, and
Beyond . . . . . . . . . . . . . . . . . 14--21
M. Roetteler and
K. M. Svore Quantum Computing: Codebreaking and
Beyond . . . . . . . . . . . . . . . . . 22--36
Anonymous IEEE Computer Society . . . . . . . . . 37--37
M. Mosca Cybersecurity in an Era with Quantum
Computers: Will We Be Ready? . . . . . . 38--41
M. Sasaki Quantum Key Distribution and Its
Applications . . . . . . . . . . . . . . 42--48
Q. Gu and
D. Formby and
S. Ji and
H. Cam and
R. Beyah Fingerprinting for Cyber-Physical System
Security: Device Physics Matters Too . . 49--59
D. Kreutz and
J. Yu and
P. Esteves-Veríssimo and
C. Magalhães and
F. M. V. Ramos The KISS Principle in Software-Defined
Networking: A Framework for Secure
Communications . . . . . . . . . . . . . 60--70
Anonymous Impact a broader audience . . . . . . . 71--71
S. Winkler and
S. Zeadally and
K. Evans Privacy and Civilian Drone Use: The Need
for Further Regulation . . . . . . . . . 72--80
Anonymous \booktitleIEEE Transactions on Big Data 81--81
E. Stobert and
E. Cavar and
L. Malisa and
D. Sommer Teaching Authentication as a Life Skill 82--85
B. Schneier Cryptography after the Aliens Land . . . 86--88
Anonymous IEEE Letters of the Computer Society . . c3--c3
Anonymous \booktitleIEEE Security & Privacy . . . . c4--c4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Staff List . . . . . . . . . . . . . . . 3--3
G. McGraw Silver Bullet Talks With Kathleen Fisher
[Interview] . . . . . . . . . . . . . . 4--9
D. Seabra Oliveira and
J. Epstein and
J. Kurose and
A. Rocha Cybersecurity and Privacy Issues in
Brazil: Back, Now, and Then [Guest
Editors' Introduction] . . . . . . . . . 10--12
M. Barcellos and
D. F. Aranha Research in Security and Privacy in
Brazil . . . . . . . . . . . . . . . . . 14--21
D. F. Aranha and
J. van de Graaf The Good, the Bad, and the Ugly: Two
Decades of E-Voting in Brazil . . . . . 22--30
F. Ceschin and
F. Pinage and
M. Castilho and
D. Menotti and
L. S. Oliveira and
A. Gregio The Need for Speed: An Analysis of
Brazilian Malware Classifiers . . . . . 31--41
P. Matias and
P. Barbosa and
T. N. C. Cardoso and
D. M. Campos and
D. F. Aranha NIZKCTF: A Noninteractive Zero-Knowledge
Capture-the-Flag Platform . . . . . . . 42--51
P. Silva and
T. Basso and
N. Antunes and
R. Moraes and
M. Vieira and
P. Simoes and
E. Montiero A Europe--Brazil Context for Secure Data
Analytics in the Cloud . . . . . . . . . 52--60
J. A. Kroll Data Science Data Governance [AI Ethics] 61--70
X. Sun and
P. Liu and
A. Singhal Toward Cyberresiliency in the Context of
Cloud Computing [Resilient Security] . . 71--75
Anonymous IEEE Computer Society information . . . 77--77
S. M. Bellovin Unnoticed Consent [Last Word] . . . . . 80--79
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous 4th IEEE European Symposium on Security
and Privacy . . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
P. A. Schneck Cybersecurity Compliance Is Necessary
but Not Sufficient: Bad Guys Don't
Follow Laws . . . . . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 6--6
W. Mazurczyk and
L. Caviglione and
S. Wendzel Recent Advancements in Digital
Forensics, Part 2 . . . . . . . . . . . 7--8
Anonymous \booktitleIEEE Transactions on Big Data 8--8
Anonymous IEEE Computer Society Information . . . 9--9
H. Tian and
Y. Chen and
H. Jiang and
Y. Huang and
F. Nan and
Y. Chen Public Auditing for Trusted Cloud
Storage Services . . . . . . . . . . . . 10--22
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 22--22
A. Axenopoulos and
V. Eiselein and
A. Penta and
E. Koblents and
E. La Mattina and
P. Daras A Framework for Large-Scale Analysis of
Video ``in the Wild'' to Assist Digital
Forensic Examination . . . . . . . . . . 23--33
Anonymous \booktitleIEEE Security & Privacy
Subscribe . . . . . . . . . . . . . . . 33--33
J. Ricci and
I. Baggili and
F. Breitinger Blockchain-Based Distributed Cloud
Storage Digital Forensics: Where's the
Beef? . . . . . . . . . . . . . . . . . 34--42
R. Carvalho and
M. Goldsmith and
S. Creese Investigating Malware Campaigns With
Semantic Technologies . . . . . . . . . 43--54
Anonymous \booktitleIEEE CG&A Subscribe . . . . . . 54--54
S. Al-Haj Baddar and
A. Merlo and
M. Migliardi Behavioral-Anomaly Detection in
Forensics Analysis . . . . . . . . . . . 55--62
D. Maiorca and
B. Biggio Digital Investigation of PDF Files:
Unveiling Traces of Embedded Malware . . 63--71
Anonymous \booktitleIT Professional Call for
Articles . . . . . . . . . . . . . . . . 71--71
A. T. Sherman and
F. Javani and
H. Zhang and
E. Golaszewski On the Origins and Variations of
Blockchain Technologies . . . . . . . . 72--77
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 77--77
Matthias Payer The Fuzzing Hype-Train: How Random
Testing Triggers Thousands of Crashes 78--82
Bruce Schneier Cybersecurity for the Public Interest 84--83
Anonymous B. Ramkrishna Rau Award . . . . . . . . C3--C3
Anonymous IEEE Computer Society Jobs Boards . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous 4th IEEE European Symposium on Security
Privacy . . . . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
S. Peisert Some Experiences in Developing Security
Technology That Actually Get Used . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 7--7
D. M. Kyriazanos and
K. G. Thanos and
S. C. A. Thomopoulos Automated Decision Making in Airport
Checkpoints: Bias Detection Toward
Smarter Security and Fairness . . . . . 8--16
Anonymous 40th Symposium on IEEE Security Privacy 16--16
M. Abrams and
J. Abrams and
P. Cullen and
L. Goldstein Artificial Intelligence, Ethics, and
Enhanced Data Stewardship . . . . . . . 17--30
B. Darvish Rouani and
M. Samragh and
T. Javidi and
F. Koushanfar Safe Machine Learning and Defeating
Adversarial Attacks . . . . . . . . . . 31--38
M. S. Jalali and
J. P. Kaiser and
M. Siegel and
S. Madnick The Internet of Things Promises New
Benefits and Risks: A Systematic
Analysis of Adoption Dynamics of IoT
Products . . . . . . . . . . . . . . . . 39--48
M. Al-Rubaie and
J. M. Chang Privacy-Preserving Machine Learning:
Threats and Solutions . . . . . . . . . 49--58
Anonymous \booktitleIEEE & Security Privacy
Subscribe . . . . . . . . . . . . . . . 58--58
G. Horsman A Call for the Prohibition of
Encryption: Panacea or Problem? . . . . 59--66
Y. Zou and
F. Schaub Beyond Mandatory: Making Data Breach
Notifications Useful for Consumers . . . 67--72
Anonymous \booktitleIEEE Transactions on Big Data 72--72
V. Nestler and
T. Coulson and
J. D. Ashley III The NICE Challenge Project: Providing
Workforce Experience Before the
Workforce . . . . . . . . . . . . . . . 73--78
D. E. Geer, Jr. Unknowable Unknowns . . . . . . . . . . 80--79
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 79--79
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Jobs Boards . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE World Congress on Services 2019 . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
P. C. van Oorschot Software Security and Systematizing
Knowledge . . . . . . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 6--6
Anonymous Social Networking . . . . . . . . . . . 7--7
S. Barth and
P. Hartel and
M. Junger and
L. Montoya Teaching Empirical Social-Science
Research to Cybersecurity Students: The
Case of ``Thinking Like a Thief'' . . . 8--16
K. C. Toth and
A. Anderson-Priddy Self-Sovereign Digital Identity: A
Paradigm Shift for Identity . . . . . . 17--27
D. van der Linden and
A. Zamansky and
I. Hadar and
B. Craggs and
A. Rashid Buddy's Wearable Is Not Your Buddy:
Privacy Implications of Pet Wearables 28--39
J. Siegel and
S. Sarma A Cognitive Protection System for the
Internet of Things . . . . . . . . . . . 40--48
J. E. Siegel and
S. Sarma Using Open Channels to Trigger the
Invited, Unintended Consequences of the
Internet of Things . . . . . . . . . . . 49--55
A. Singla and
E. Bertino How Deep Learning Is Making Information
Security More Intelligent . . . . . . . 56--65
S. N. Matheu and
J. L. Hernandez-Ramos and
A. F. Skarmeta Toward a Cybersecurity Certification
Framework for the Internet of Things . . 66--76
A. M. Phillips Buying Your Genetic Self Online:
Pitfalls and Potential Reforms in DNA
Testing . . . . . . . . . . . . . . . . 77--81
A. T. Sherman and
P. A. H. Peterson and
E. Golaszewski and
E. LaFemina and
E. Goldschen and
M. Khan and
L. Mundy and
M. Rather and
B. Solis and
W. Tete and
E. Valdez and
B. Weber and
D. Doyle and
C. O'Brien and
L. Oliva and
J. Roundy and
J. Suess Project-Based Learning Inspires
Cybersecurity Students: A
Scholarship-for-Service Research Study 82--88
Anonymous Subscribe to \booktitleSecurity & Privacy
Magazine . . . . . . . . . . . . . . . . 88--88
Anonymous Letters of the Computer Society . . . . 89--89
R. Herardian The Soft Underbelly of Cloud Security 90--93
Anonymous \booktitleSecurity & Privacy Magazine . . 94--94
S. M. Bellovin Layered Insecurity . . . . . . . . . . . 96--95
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 95--95
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
J. Epstein A Horse's Rump and Cybersecurity . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 6--6
W. Enck and
T. Benzel Selected Papers From the 2018 USENIX
Security Symposium . . . . . . . . . . . 7--8
Anonymous IEEE Computer Society Social Networking 9--9
N. Scaife and
C. Peeters and
P. G. Traynor More Cowbell: Lessons Learned in
Developing the Skim Reaper . . . . . . . 10--17
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 17--17
D. Kumar and
R. Paccagnella and
P. Murley and
E. Hennenfent and
J. Mason and
A. Bates and
M. Bailey Emerging Threats in Internet of Things
Voice Services . . . . . . . . . . . . . 18--24
G. Franken and
T. Van Goethem and
W. Joosen Exposing Cookie Policy Flaws Through an
Extensive Evaluation of Browsers and
Their Extensions . . . . . . . . . . . . 25--34
R. Stevens and
D. Votipka and
E. M. Redmiles and
C. Ahern and
M. L. Mazurek Applied Digital Threat Modeling: It
Works . . . . . . . . . . . . . . . . . 35--42
M. Schneider and
S. Matetic and
A. Juels and
A. Miller and
S. Capkun Secure Brokered Delegation Through
DelegaTEE . . . . . . . . . . . . . . . 43--52
Anonymous \booktitleIEEE Security & Privacy
Magazine Subscribe . . . . . . . . . . . 52--52
L. Breidenbach and
P. Daian and
F. Tramer and
A. Juels The Hydra Framework for Principled,
Automated Bug Bounties . . . . . . . . . 53--61
C. Culnane and
A. Essex and
S. J. Lewis and
O. Pereira and
V. Teague Knights and Knaves Run Elections:
Internet Voting and Undetectable
Electoral Fraud . . . . . . . . . . . . 62--70
Anonymous \booktitleIEEE Transactions on Big Data 70--70
N. Sambasivan and
N. Ahmed and
A. Batool and
E. Bursztein and
E. Churchill and
L. Sanely Gaytan-Lugo and
T. Matthews and
D. Nemar and
K. Thomas and
S. Consolvo Toward Gender-Equitable Privacy and
Security in South Asia . . . . . . . . . 71--77
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 77--77
E. Beguin and
S. Besnard and
A. Cros and
B. Joannes and
O. Leclerc-Istria and
A. Noel and
N. Roels and
F. Taleb and
J. Thongphan and
E. Alata and
V. Nicomette Computer-Security-Oriented Escape Room 78--83
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 83--83
P. Gladyshev Cybercrime as a Consequence of
Unreasonable Expectations . . . . . . . 84--87
Anonymous \booktitleIEEE Computer Graphics
Applications Magazine . . . . . . . . . 87--87
A. Bates and
W. U. Hassan Can Data Provenance Put an End to the
Data Breach? . . . . . . . . . . . . . . 88--93
Anonymous \booktitleIEEE IT Professionals Call for
Articles . . . . . . . . . . . . . . . . 93--93
N. Kobeissi Selfie's Reflections on Formal
Verification for Transport Layer
Security 1.3: Largely Opaque . . . . . . 94--96
Anonymous \booktitleIEEE Internet Computing
Magazine . . . . . . . . . . . . . . . . 97--97
Anonymous IEEE Letters of the Computer Society . . 98--98
Anonymous \booktitleIEEE Intelligent Systems
Magazine . . . . . . . . . . . . . . . . 99--99
Anonymous \booktitleIEEE Multimedia Magazine . . . 99--99
D. E. Geer Ownership . . . . . . . . . . . . . . . 100--99
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Jobs Boards . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Jobs Board . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
L. Williams Science Leaves Clues . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 6--6
P. C. van Oorschot and
S. W. Smith The Internet of Things: Security
Challenges . . . . . . . . . . . . . . . 7--9
Anonymous 2019 IEEE Computer Society Election . . 9--9
J. Valente and
M. A. Wynn and
A. A. Cardenas Stealing, Spying, and Abusing:
Consequences of Attacks on Internet of
Things Devices . . . . . . . . . . . . . 10--21
Anonymous \booktitleIEEE IT Professionals Call for
Papers . . . . . . . . . . . . . . . . . 21--21
M. Balliu and
I. Bastys and
A. Sabelfeld Securing IoT Apps . . . . . . . . . . . 22--29
Z. B. Celik and
P. McDaniel and
G. Tan and
L. Babun and
A. S. Uluagac Verifying Internet of Things Safety and
Security in Physical Spaces . . . . . . 30--37
Anonymous \booktitleIEEE Pervasive Computing Call
for Papers . . . . . . . . . . . . . . . 37--37
G. Hernandez and
F. Fowze and
D. J. Tang and
T. Yavuz and
P. Traynor and
K. R. B. Butler Toward Automated Firmware Analysis in
the IoT Era . . . . . . . . . . . . . . 38--46
Anonymous \booktitleIEEE Security & Privacy
Subscribe . . . . . . . . . . . . . . . 46--46
H. Tschofenig and
E. Baccelli Cyberphysical Security for the Masses: A
Survey of the Internet Protocol Suite
for Internet of Things Security . . . . 47--57
Anonymous \booktitleIEEE Transactions on Big Data 57--57
R. S. Leon and
M. Kiperberg and
A. A. Leon Zabag and
A. Resh and
A. Algawi and
N. J. Zaidenberg Hypervisor-Based White Listing of
Executables . . . . . . . . . . . . . . 58--67
M. Jakobsson The Rising Threat of Launchpad Attacks 68--72
Anonymous IEEE DataPort . . . . . . . . . . . . . 73--73
S. Raaijmakers Artificial Intelligence for Law
Enforcement: Challenges and
Opportunities . . . . . . . . . . . . . 74--77
I. Linkov and
F. Baiardi and
M. Florin and
S. Greer and
J. H. Lambert and
M. Pollock and
J. Rickli and
L. Roslycky and
T. Seager and
H. Thorisson and
B. D. Trump Applying Resilience to Hybrid Threats 78--83
Anonymous \booktitleIEEE Software Magazine Call
For Articles . . . . . . . . . . . . . . 83--83
L. Arbuckle and
F. Ritchie The Five Safes of Risk-Based
Anonymization . . . . . . . . . . . . . 84--89
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 89--89
F. Massacci Is ``Deny Access'' a Valid ``Fail-Safe
Default'' Principle for Building
Security in Cyberphysical Systems? . . . 90--93
Anonymous IEEE Computer Society Social Networking 94--94
Anonymous 2019 IEEE Computer Society Election . . 95--95
E. Bertino It Takes a Village to Secure Cellular
Networks . . . . . . . . . . . . . . . . 96--95
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1
Anonymous \booktitleComputing Edge Magazine . . . C2--C2
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
J. B. Michael Trustworthiness of Autonomous Machines
in Armed Conflict . . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous \booktitleTransactions on Big Data . . . 6--6
O. Tene and
K. Evans and
B. Gencarelli and
G. Maldoff and
G. Zanfir-Fortuna GDPR at Year One: Enter the Designers
and Engineers . . . . . . . . . . . . . 7--9
N. Momen and
M. Hatamian and
L. Fritsch Did App Privacy Improve After the GDPR? 10--20
J. Singh and
J. Cobbe The Security Implications of Data
Subject Rights . . . . . . . . . . . . . 21--30
Anonymous \booktitleTransactions on Sustainable
Computing . . . . . . . . . . . . . . . 30--30
R. Petrlic The General Data Protection Regulation:
From a Data Protection Authority's
(Technical) Perspective . . . . . . . . 31--36
Anonymous \booktitleIEEE Computer Graphics and
Applications Magazine . . . . . . . . . 36--36
C. Bartolini and
G. Lenzini and
L. Robaldo The DAta Protection REgulation
COmpliance Model . . . . . . . . . . . . 37--45
B. Yener and
T. Gal Cybersecurity in the Era of Data
Science: Examining New Adversarial
Models . . . . . . . . . . . . . . . . . 46--53
M. S. Riazi and
B. Darvish Rouani and
F. Koushanfar Deep Learning on Private Data . . . . . 54--63
D. Boneh and
A. J. Grotto and
P. McDaniel and
N. Papernot How Relevant Is the Turing Test in the
Age of Sophisbots? . . . . . . . . . . . 64--71
S. Ruoti and
K. Seamons Johnny's Journey Toward Usable Secure
Email . . . . . . . . . . . . . . . . . 72--76
A. T. Sherman and
L. Oliva and
E. Golaszewski and
D. Phatak and
T. Scheponik and
G. L. Herman and
D. S. Choi and
S. E. Offenberger and
P. Peterson and
J. Dykstra and
G. V. Bard and
A. Chattopadhyay and
F. Sharevski and
R. Verma and
R. Vrecenar The CATS Hackathon: Creating and
Refining Test Items for Cybersecurity
Concept Inventories . . . . . . . . . . 77--83
A. Fasano and
T. Leek and
B. Dolan-Gavitt and
J. Bundt The Rode0day to Less-Buggy Programs . . 84--88
D. E. Geer and
D. Peterson Failure as Design . . . . . . . . . . . 90--89
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Compsac 2020 . . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
D. M. Nicol The Value of Useless Academic Research
to the Cyberdefense of Critical
Infrastructures . . . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 6--6
Anonymous \booktitleIEEE Transactions on Computers 7--7
K. Charlet and
H. King The Future of Cybersecurity Policy . . . 8--10
Anonymous Computer Society Technology Predictions 10--10
Anonymous \booktitleComputing Edge Magazine . . . 11--11
A. Grotto Deconstructing Cyber Attribution: A
Proposed Framework and Lexicon . . . . . 12--20
D. W. Woods and
T. Moore Does Insurance Have a Future in
Governing Cybersecurity? . . . . . . . . 21--27
J. L. Hernandez-Ramos and
D. Geneiatakis and
I. Kounelis and
G. Steri and
I. Nai Fovino Toward a Data-Driven Society: A
Technological Perspective on the
Development of Cybersecurity and
Data-Protection Policies . . . . . . . . 28--38
M. Klipstein and
A. Minter and
J. Pittman Understanding the Information
Environment to Win the Next Conflict
Without Firing a Shot . . . . . . . . . 39--45
P. Sterlini and
F. Massacci and
N. Kadenko and
T. Fiebig and
M. van Eeten Governance Challenges for European
Cybersecurity Policies: Stakeholder
Views . . . . . . . . . . . . . . . . . 46--54
B. M. Horowitz Cyberattack-Resilient Cyberphysical
Systems . . . . . . . . . . . . . . . . 55--60
W. Stallings Handling of Personal Information and
Deidentified, Aggregated, and
Pseudonymized Information Under the
California Consumer Privacy Act . . . . 61--64
J. P. Howard and
M. E. Vachino Blockchain Compliance With Federal
Cryptographic Information-Processing
Standards . . . . . . . . . . . . . . . 65--70
B. Schneier Technologists vs. Policy Makers . . . . 72--71
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
D. Carlin and
J. Burgess and
P. O'Kane and
S. Sezer You Could Be Mine(d): The Rise of
Cryptojacking . . . . . . . . . . . . . 16--22
B. Nour and
K. Sharif and
F. Li and
Y. Wang Security and Privacy Challenges in
Information-Centric Wireless Internet of
Things Networks . . . . . . . . . . . . 35--45
L. Allodi and
T. Chotza and
E. Panina and
N. Zannone The Need for New Antiphishing Measures
Against Spear-Phishing Attacks . . . . . 23--34
F. Farahmand Quantitative Issues in Cyberinsurance:
Lessons From Behavioral Economics,
Counterfactuals, and Causal Inference 8--15
Anonymous Errata . . . . . . . . . . . . . . . . . 55--55
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous IEEE Computer Society Information . . . C3--C3
T. R. Souvignet and
T. Heckmann and
T. Bolle From Lucky Luke to Lock Bits . . . . . . 61--66
Anonymous Reliability Society . . . . . . . . . . 6--6
Anonymous Table of Contents . . . . . . . . . . . 1--2
M. Jakobsson Permissions and Privacy . . . . . . . . 46--55
P. C. van Oorschot Untangling Security and Privacy . . . . 4--6
P. Jauernig and
A. Sadeghi and
E. Stapf Trusted Execution Environments:
Properties, Applications, and Challenges 56--60
S. M. Bellovin Policies on Privacy . . . . . . . . . . 76--76
D. Pencheva and
J. Hallett and
A. Rashid Bringing Cyber to School: Integrating
Cybersecurity Into Secondary School
Education . . . . . . . . . . . . . . . 68--74
S. Calzavara and
M. Conti and
R. Focardi and
A. Rabitti and
G. Tolomei Machine Learning for Web Vulnerability
Detection: The Case of Cross-Site
Request Forgery . . . . . . . . . . . . 8--16
G. Chen and
S. Chen and
Y. Xiao and
Y. Zhang and
Z. Lin and
T. Lai SgxPectre: Stealing Intel Secrets From
SGX Enclaves via Speculative Execution 28--37
E. van der Kouwe and
G. Heiser and
D. Andriesse and
H. Bos and
C. Giuffrida Benchmarking Flaws Undermine Security
Research . . . . . . . . . . . . . . . . 48--57
Y. Tian and
C. Herley and
S. Schechter StopGuessing: Using Guessed Passwords to
Thwart Online Password Guessing . . . . 38--47
F. Zhang and
W. He and
R. Cheng and
J. Kos and
N. Hynes and
N. Johnson and
A. Juels and
A. Miller and
D. Song The Ekiden Platform for
Confidentiality-Preserving, Trustworthy,
and Performant Smart Contracts . . . . . 17--27
D. M. Nicol In the Petri Dish: Cybersecurity Pushed
to the Edge . . . . . . . . . . . . . . 4--5
K. M. Berger Addressing Cyber Threats in Biology . . 58--61
Anonymous Errata . . . . . . . . . . . . . . . . . 61--61
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
E. Bertino The Quest for Data Transparency . . . . 67--68
Anonymous Table of Contents . . . . . . . . . . . 1--2
T. Benzel and
F. Stajano IEEE Euro S&P: The Younger Sibling Across
the Pond Following in Oakland's
Footsteps . . . . . . . . . . . . . . . 6--7
A. Kott and
P. Theron Doers, Not Watchers: Intelligent
Autonomous Agents Are a Path to Cyber
Resilience . . . . . . . . . . . . . . . 62--66
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Member Benefits C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
S. Peisert Isolating Insecurely: A Call to Arms for
the Security and Privacy Community
During the Time of COVID-19 . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
H. Okhravi and
N. Burow and
R. Skowyra and
B. C. Ward and
S. Jero and
R. Kazan and
H. Shrobe One Giant Leap for Computer Security . . 8--19
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 19--19
M. Dietz and
G. Pernul Unleashing the Digital Twin's Potential
for ICS Security . . . . . . . . . . . . 20--27
J. Camp and
R. Henry and
T. Kohno and
S. Mare and
S. Myers and
S. Patel and
J. Streiff Toward a Secure Internet of Things:
Directions for Research . . . . . . . . 28--37
Anonymous \booktitleIEEE Computer Graphics &
Applications . . . . . . . . . . . . . . 37--37
B. Momenzadeh and
H. Dougherty and
M. Remmel and
S. Myers and
L. J. Camp Best Practices Would Make Things Better
in the IoT . . . . . . . . . . . . . . . 38--47
I. A. Tondel and
M. Gilje Jaatun and
D. Soares Cruzes IT Security Is From Mars, Software
Security Is From Venus . . . . . . . . . 48--54
Anonymous AI's 10 to Watch Call for Nominations 55--55
K. El Emam Seven Ways to Evaluate the Utility of
Synthetic Data . . . . . . . . . . . . . 56--59
D. Shoemaker and
N. R. Mead and
A. Kohnke Teaching Secure Acquisition in Higher
Education . . . . . . . . . . . . . . . 60--66
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 66--66
E. Osterweil A Cybersecurity Terminarch: Use It
Before We Lose It . . . . . . . . . . . 67--70
Anonymous \booktitleIEEE Security & Privacy
[Advertisement] . . . . . . . . . . . . 70--70
Anonymous HOST 2020: 6--9 Dec. 2020, San Jose, CA 71--71
H. Mack and
T. Schroer Security Midlife Crisis: Building
Security in a New World . . . . . . . . 72--74
D. E. Geer Security Theater, the Beat Goes On . . . 75--76
Anonymous Submit today: \booktitleIEEE
Transactions on Big Data . . . . . . . . 75--75
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Table of Contents . . . . . . . . . . . C2--1
Anonymous Masthead . . . . . . . . . . . . . . . . 2--2
P. C. van Oorschot Blockchains and Stealth Tactics for
Teaching Security . . . . . . . . . . . 3--5
Anonymous Reliability Society . . . . . . . . . . 4--4
M. Mannan and
N. Asokan Confronting the Limitations of
Hardware-Assisted Security . . . . . . . 6--7
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 7--7
L. Zhao and
D. Lie Is Hardware More Secure Than Software? 8--17
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 17--17
M. Schwarz and
D. Gruss How Trusted Execution Environments Fuel
Research on Microarchitectural Attacks 18--27
K. Murdock and
D. Oswald and
F. D. Garcia and
J. Van Bulck and
F. Piessens and
D. Gruss Plundervolt: How a Little Bit of
Undervolting Can Create a Lot of Trouble 28--37
Anonymous \booktitleIEEE Computer Graphics &
Applications . . . . . . . . . . . . . . 37--37
K. Kostiainen and
A. Dhar and
S. Capkun Dedicated Security Chips in the Age of
Secure Enclaves . . . . . . . . . . . . 38--46
Anonymous IEEE Computer Society Call for Papers 46--46
D. Kohlbrenner and
S. Shinde and
D. Lee and
K. Asanovic and
D. Song Building Open Trusted Execution
Environments . . . . . . . . . . . . . . 47--56
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 56--56
G. Dessouky and
T. Frassetto and
P. Jauernig and
A.-R. Sadeghi and
E. Stapf With Great Complexity Comes Great
Vulnerability: From Stand-Alone Fixes to
Reconfigurable Security . . . . . . . . 57--66
R. Borum and
R. Sanders Preparing America's Cyber Intelligence
Workforce . . . . . . . . . . . . . . . 67--73
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 73--73
K. G. Crowther and
B. Rust Built-In Cybersecurity: Insights Into
Product Security for Cyberphysical
Systems at a Large Company . . . . . . . 74--79
B. Schneier Hacking the Tax Code . . . . . . . . . . 79--80
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous \booktitleIEEE Computing Edge Magazine C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Open Access journal of
the Computer Society . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
P. A. Schneck Cybersecurity During COVID-19 . . . . . 4--5
Anonymous Reliability Society . . . . . . . . . . 5--5
F. Hao and
S. Wang and
S. Bag and
R. Procter and
S. F. Shahandashti and
M. Mehrnezhad and
E. Toreini and
R. Metere and
L. Y. J. Liu End-to-End Verifiable E-Voting Trial for
Polling Station Voting . . . . . . . . . 6--13
C. M. Ahmed and
J. Zhou Challenges and Opportunities in
Cyberphysical Systems Security: a
Physics-Based Perspective . . . . . . . 14--22
Anonymous IEEE Computer Society Call for Papers 22--22
R. Padilha and
C. Mazini Rodrigues and
F. A. Andalo and
G. Bertocco and
Z. Dias and
A. Rocha Forensic Event Analysis: From Seemingly
Unrelated Data to Understanding . . . . 23--32
R. Maxion Reproducibility: Buy Low, Sell High . . 33--41
Q.-H. Wang and
S. M. Miller and
R. H. Deng Driving Cybersecurity Policy Insights
From Information on the Internet . . . . 42--50
R. Stevens and
J. Dykstra and
W. Knox Everette and
M. L. Mazurek It Lurks Within: a Look at the
Unexpected Security Implications of
Compliance Programs . . . . . . . . . . 51--58
J. M. Rodriguez and
B. J. Allison and
C. W. Apsey and
T. M. Boudreau Courseware as Code: Instituting Agile
Courseware Collaboration . . . . . . . . 59--62
S. M. Bellovin Security, Privacy, and Scale . . . . . . 63--64
Anonymous \booktitleIEEE IT Professional Call For
Articles . . . . . . . . . . . . . . . . 63--63
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
S. Peisert Reflections on the Past, Perspectives on
the Future [From the Editors] . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 7--7
S. Mohammed and
T.-H. Kim and
W. C. Fang Requirements for Security, Privacy, and
Trust in the Internet of Things [Guest
Editors' Introduction] . . . . . . . . . 8--10
D. M. Nicol Message from IEEE S&P's Outgoing Editor
in Chief . . . . . . . . . . . . . . . . 10--10
Anonymous Special Issue on Security and Privacy
Issues of Home Globalization . . . . . . 11--11
J. L. Hernandez-Ramos and
J. A. Martinez and
V. Savarino and
M. Angelini and
V. Napolitano and
A. F. Skarmeta and
G. Baldini Security and Privacy in Internet of
Things-Enabled Smart Cities: Challenges
and Future Directions . . . . . . . . . 12--23
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 23--23
B. Vaidya and
H. T. Mouftah Security for Shared Electric and
Automated Mobility Services in Smart
Cities . . . . . . . . . . . . . . . . . 24--33
Anonymous \booktitleIEEE Computer Graphics and
Applications . . . . . . . . . . . . . . 33--33
L. Campanile and
M. Iacono and
A. H. Levis and
F. Marulli and
M. Mastroianni Privacy Regulations, Smart Roads,
Blockchain, and Liability Insurance:
Putting Technologies to Work . . . . . . 34--43
Anonymous IEEE Computing Society Call for Papers 43--43
G. Amit and
A. Shabtai and
Y. Elovici A Self-Healing Mechanism for Internet of
Things Devices . . . . . . . . . . . . . 44--53
F. Massacci and
C. N. Ngo Distributed Financial Exchanges:
Security Challenges and Design
Principles . . . . . . . . . . . . . . . 54--64
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 64--64
R. Ben Netanel and
B. Nassi and
A. Shamir and
Y. Elovici Detecting Spying Drones . . . . . . . . 65--73
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 73--73
D. Mussington Calculating Risks: Understanding the
2020 Election Experience and Defining
the ``New Normal'' . . . . . . . . . . . 74--80
Anonymous \booktitleIEEE Transactions on Big Data 80--80
N. Dragoni and
A. Lluch Lafuente and
F. Massacci and
A. Schlichtkrull Are We Preparing Students to Build
Security In? A Survey of European
Cybersecurity in Higher Education
Programs [Education] . . . . . . . . . . 81--88
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 88--88
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 89--89
M. Said Elsayed and
N.-A. Le-Khac and
A. D. Jurcut Dealing With COVID-19 Network Traffic
Spikes [Cybercrime and Forensics] . . . 90--94
D. Genkin and
Y. Yarom Whack-a-Meltdown: Microarchitectural
Security Games [Systems Attacks and
Defenses] . . . . . . . . . . . . . . . 95--98
J. L. Hernandez-Ramos and
S. N. Matheu and
A. Skarmeta The Challenges of Software Cybersecurity
Certification [Building Security In] . . 99--102
E. Bertino Attacks on Artificial Intelligence [Last
Word] . . . . . . . . . . . . . . . . . 103--104
Anonymous Errata . . . . . . . . . . . . . . . . . 103--103
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Member Benefits C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Paul C. van Oorschot Toward Unseating the Unsafe C
Programming Language . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Sean Peisert and
Bruce Schneier and
Hamed Okhravi and
Fabio Massacci and
Terry Benzel and
Carl Landwehr and
Mohammad Mannan and
Jelena Mirkovic and
Atul Prakash and
James Bret Michael Perspectives on the SolarWinds Incident 7--13
Anonymous 42nd IEEE Symposium on Security & Privacy 13--13
Fabio Massacci and
Trent Jaeger and
Sean Peisert SolarWinds and the Challenges of
Patching: Can We Ever Stop Dancing With
the Devil? . . . . . . . . . . . . . . . 14--19
Malhar S. Jere and
Tyler Farnan and
Farinaz Koushanfar A Taxonomy of Attacks on Federated
Learning . . . . . . . . . . . . . . . . 20--28
Anonymous \booktitleIEEE Annals of the History
Computing . . . . . . . . . . . . . . . 28--28
Amir Herzberg and
Hemi Leibowitz and
Kent Seamons and
Elham Vaziripour and
Justin Wu and
Daniel Zappala Secure Messaging Authentication
Ceremonies Are Broken . . . . . . . . . 29--37
Wajeeha Ahmad and
David D. Clark A Systems Approach Toward Addressing
Anonymous Abuses: Technical and Policy
Considerations . . . . . . . . . . . . . 38--47
Anonymous \booktitleIEEE Computer Graphics &
Applications . . . . . . . . . . . . . . 47--47
Siam U. Hussain and
M. Sadegh Riazi and
Farinaz Koushanfar The Fusion of Secure Function Evaluation
and Logic Synthesis . . . . . . . . . . 48--55
Karen L. Sanzo and
Jay Paredes Scribner and
Hongyi Wu Designing a K-16 Cybersecurity
Collaborative: CIPHER . . . . . . . . . 56--59
Marco Simioni Investigative Techniques for the
De-Anonymization of Hidden Services . . 60--64
Samuel T. King and
Nolen Scaife and
Patrick Traynor and
Zainul Abi Din and
Christian Peeters and
Hari Venugopala Credit Card Fraud Is a Computer Security
Problem . . . . . . . . . . . . . . . . 65--69
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 69--69
Alfred Menezes and
Douglas Stebila Challenges in Cryptography . . . . . . . 70--73
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 73--73
Jonathan Spring and
Eric Hatleback and
Allen Householder and
Art Manion and
Deana Shick Time to Change the CVSS? . . . . . . . . 74--78
Anonymous \booktitleIEEE Transactions on Computers
Call for Papers . . . . . . . . . . . . 78--78
Daniel E. Geer Auto-Update Considered Harmful . . . . . 79--80
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 79--79
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Member Benefits C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge
[advertisement] . . . . . . . . . . . . C2--C2
Anonymous Table of contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Laurie Williams The People Who Live in Glass Houses Are
Happy the Stones Weren't Thrown at Them
[From the Editors] . . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous \booktitleIEEE Annals of the History of
Computing [advertisement] . . . . . . . 7--7
Hamed Okhravi A Cybersecurity Moonshot . . . . . . . . 8--16
Sameed Ali and
Prashant Anantharaman and
Zephyr Lucas and
Sean W. Smith What We Have Here Is Failure to
Validate: Summer of LangSec . . . . . . 17--23
David M. Nicol The Ransomware Threat to Energy-Delivery
Systems . . . . . . . . . . . . . . . . 24--32
Akond Rahman and
Laurie Williams Different Kind of Smells: Security
Smells in Infrastructure as Code Scripts 33--41
Shuwen Deng and
Wenjie Xiong and
Jakub Szefer Understanding the Insecurity of
Processor Caches Due to Cache
Timing-Based Vulnerabilities . . . . . . 42--49
Anonymous IEEE JobBoards . . . . . . . . . . . . . 50--50
Sangchul Park and
Gina J. Choi and
Haksoo Ko Privacy in the Time of COVID-19:
Divergent Paths for Contact Tracing and
Route-Disclosure Mechanisms in South
Korea . . . . . . . . . . . . . . . . . 51--56
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 57--57
Fabio Massacci and
Ivan Pashchenko Technical Leverage: Dependencies Are a
Mixed Blessing . . . . . . . . . . . . . 58--62
Anonymous Erratum [for ``A Taxonomy of Attacks on
Federated Learning''] . . . . . . . . . 62--62
Anonymous IEEE Computer Society Call for Papers 63--63
Bruce Schneier What Will It Take? . . . . . . . . . . . 63--64
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Member Benefits C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
James Bret Michael Security and Privacy for Edge Artificial
Intelligence . . . . . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Josh Benaloh and
Kammi Foote and
Philip B. Stark and
Vanessa Teague and
Dan S. Wallach VAULT-Style Risk-Limiting Audits and the
Inyo County Pilot . . . . . . . . . . . 8--18
Emiliano De Cristofaro A Critical Overview of Privacy in
Machine Learning . . . . . . . . . . . . 19--27
Amy Dettmer and
Hamed Okhravi and
Kevin Perry and
Nabil Schear and
Richard Shay and
Mary Ellen Zurko and
Paula Donovan Lessons Learned From Designing a
Security Architecture for Real-World
Government Agencies . . . . . . . . . . 28--36
Wenqiang Ruan and
Mingxin Xu and
Haoyang Jia and
Zhenhuan Wu and
LuShan Song and
Weili Han Privacy Compliance: Can Technology Come
to the Rescue? . . . . . . . . . . . . . 37--43
François Boechat and
Gabriel Ribas and
Lucas Senos and
Miguel Bicudo and
Mateus Schulz Nogueira and
Leandro Pfleger de Aguiar and
Daniel Sadoc Menasche Is Vulnerability Report Confidence
Redundant? Pitfalls Using Temporal Risk
Scores . . . . . . . . . . . . . . . . . 44--53
Anonymous IEEE Computer Society Call For Papers 53--53
Julie Haney and
Wayne Lutters and
Jody Jacobs Cybersecurity Advocates: Force
Multipliers in Security Behavior Change 54--59
Alfred Menezes and
Douglas Stebila End-to-End Security: When Do We Have It? 60--64
Anonymous \booktitleIEEE Computing in Science and
Engineering . . . . . . . . . . . . . . 64--64
Pollyanna Sanderson Balancing Public Health and Civil
Liberties: Privacy Aspects of
Contact-Tracing Technologies . . . . . . 65--69
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 69--69
Eric Vétillard Security Certification: Is It Box
Ticking? . . . . . . . . . . . . . . . . 70--74
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 75--75
Steven M. Bellovin The Law and Lawful Hacking . . . . . . . 76--76
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Member Benefits C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Elections . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Terry Benzel Research and Industry Partnerships in
Cybersecurity and Privacy Research: New
Frontiers or Fueling the Tech Sector? 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous Updates From \booktitleIEEE Security &
Privacy's Editor in Chief Sean Peisert 8--8
Bob Blakley and
Lorrie Cranor A Discussion of Public Health, Trust,
and Privacy With Susan Landau . . . . . 9--15
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 15--15
Yu-Tsung Lee and
Haining Chen and
Trent Jaeger Demystifying Android's Scoped Storage
Defense . . . . . . . . . . . . . . . . 16--25
Anonymous \booktitleIEEE Computing in Science &
Engineering . . . . . . . . . . . . . . 25--25
Ramona Trestian and
Guodong Xie and
Pintu Lohar and
Edoardo Celeste and
Malika Bendechache and
Rob Brennan and
Evgeniia Jayasekera and
Regina Connolly and
Irina Tal Privacy in a Time of COVID-19: How
Concerned Are You? . . . . . . . . . . . 26--35
Florian Skopik and
Markus Wurzenberger and
Max Landauer The Seven Golden Principles of Effective
Anomaly-Based Intrusion Detection . . . 36--45
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 45--45
Francesco Minna and
Agathe Blaise and
Filippo Rebecchi and
Balakrishnan Chandrasekaran and
Fabio Massacci Understanding the Security Implications
of Kubernetes Networking . . . . . . . . 46--56
Zheng Yang and
Sridhar Adepu and
Jianying Zhou Opportunities and Challenges in Securing
Critical Infrastructures Through
Cryptography . . . . . . . . . . . . . . 57--65
Sauvik Das and
W. Keith Edwards and
DeBrae Kennedy-Mayo and
Peter Swire and
Yuxi Wu Privacy for the People? Exploring
Collective Action as a Mechanism to
Shift Power to Consumers in End-User
Privacy . . . . . . . . . . . . . . . . 66--70
Anonymous \booktitleIEEE Computing Edge . . . . . 71--71
Blair Taylor and
Sidd Kaza and
Paige A. Zaleppa CLARK: A Design Science Research Project
for Building and Sharing High-Quality
Cybersecurity Curricula . . . . . . . . 72--76
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 77--77
Katja Tuma and
Mathias Widman Seven Pain Points of Threat Analysis and
Risk Assessment in the Automotive Domain 78--82
Paul C. van Oorschot Coevolution of Security's Body of
Knowledge and Curricula . . . . . . . . 83--89
Anonymous IEEE Computer Society Call for Papers 89--89
Sophie Stalla-Bourdillon A Maturity Spectrum for Data
Institutions . . . . . . . . . . . . . . 90--94
Elisa Bertino Zero Trust Architecture: Does It Help? 95--96
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 95--95
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computer Society Member Benefits C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous Toward Fail Safety for Security
Decisions . . . . . . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 7--7
Robert Cunningham and
Anita D. Carleton and
Tom Longstaff and
Forrest J. Shull A Research Road Map for Building Secure
and Resilient Software-Intensive Systems 8--14
Anonymous \booktitleIEEE Computer Graphics &
Applications . . . . . . . . . . . . . . 14--14
Anonymous A Discussion of Election Security,
Cryptography, and Exceptional Access
With Michael Alan Specter . . . . . . . 15--22
Danfeng Daphne Yao and
Terry Benzel ACSAC 2020: Furthering the Quest to
Tackle Hard Problems and Find Practical
Solutions . . . . . . . . . . . . . . . 23--24
Anonymous IEEE Computer Society Diversity and
Integrity Fund . . . . . . . . . . . . . 25--25
Dongkwan Kim and
Eunsoo Kim and
Mingeun Kim and
Yeongjin Jang and
Yongdae Kim Enabling the Large-Scale Emulation of
Internet of Things Firmware With
Heuristic Workarounds . . . . . . . . . 26--35
Suzan Ali and
Mounir Elgharabawy and
Quentin Duchaussoy and
Mohammad Mannan and
Amr Youssef Parental Controls: Safer Internet
Solutions or New Pitfalls? . . . . . . . 36--46
Stephan Wiefling and
Markus Dürmuth and
Luigi Lo Iacono Verify It's You: How Users Perceive
Risk-Based Authentication . . . . . . . 47--57
Carter Yagemann and
Pak Ho Chung and
Erkam Uzun and
Sai Ragam and
Brendan Saltaformaggio and
Wenke Lee Modeling Large-Scale Manipulation in
Open Stock Markets . . . . . . . . . . . 58--65
Song Liao and
Christin Wilson and
Cheng Long and
Hongxin Hu and
Huixing Deng Problematic Privacy Policies of Voice
Assistant Applications . . . . . . . . . 66--73
Assane Gueye and
Carlos E. C. Galhardo and
Irena Bojanova and
Peter Mell A Decade of Reoccurring Software
Weaknesses . . . . . . . . . . . . . . . 74--82
Cong Shi and
Yan Wang and
Yingying Jennifer Chen and
Nitesh Saxena Authentication of Voice Commands by
Leveraging Vibrations in Wearables . . . 83--92
Anonymous \booktitleIEEE Computing in Science and
Engineering . . . . . . . . . . . . . . 92--92
David Pujol and
Ashwin Machanavajjhala Equity and Privacy: More Than Just a
Tradeoff . . . . . . . . . . . . . . . . 93--97
Anonymous IEEE Computer Society Call for Papers 97--97
Alfred Menezes and
Douglas Stebila The Advanced Encryption Standard: 20
Years Later . . . . . . . . . . . . . . 98--102
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 102--102
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 103--103
Fariborz Farahmand Integrating Cybersecurity and Artificial
Intelligence Research in Engineering and
Computer Science Education . . . . . . . 104--110
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 110--110
Anonymous IEEE Computer Society Member Benefits 111--111
Emily Stark and
Joe DeBlasio and
Devon O'Brien Certificate Transparency in Google
Chrome: Past, Present, and Future . . . 112--118
Anonymous \booktitleIEEE Security and Privacy
Subscription . . . . . . . . . . . . . . 118--118
Jules Polonetsky and
Tim Sparapani A Review of the Privacy-Enhancing
Technologies Software Market . . . . . . 119--122
Anonymous \booktitleIEEE Transactions on Big Data 123--123
Daniel E. Geer Convergence . . . . . . . . . . . . . . 123--124
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Job Boards . . . . . . . . . . . . C4--C4
Anonymous [Front cover] . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Sean Peisert Unsafe at Any Clock Speed: The
Insecurity of Computer System Design,
Implementation, and Operation . . . . . 4--9
Anonymous Reliability Society . . . . . . . . . . 5--5
Luca Caviglione and
Steffen Wendzel and
Simon Vrhovec and
Aleksandra Mileva Security and Privacy Issues of Home
Globalization . . . . . . . . . . . . . 10--11
Yashothara Shanmugarasa and
Hye-young Paik and
Salil S. Kanhere and
Liming Zhu Automated Privacy Preferences for Smart
Home Data Sharing Using Personal Data
Stores . . . . . . . . . . . . . . . . . 12--22
Anonymous \booktitleIEEE Computing in Science and
Engineering . . . . . . . . . . . . . . 22--22
Ruben Rios and
Jose A. Onieva and
Rodrigo Roman and
Javier Lopez Personal IoT Privacy Control at the Edge 23--32
Anonymous IEEE Computer Society Member Benefits 32--32
Luca Ardito and
Luca Barbato and
Paolo Mori and
Andrea Saracino Preserving Privacy in the Globalized
Smart Home: The SIFIS-Home Project . . . 33--44
Daniele Bringhenti and
Fulvio Valenza and
Cataldo Basile Toward Cybersecurity Personalization in
Smart Homes . . . . . . . . . . . . . . 45--53
Ying Li and
Tong Xin and
Mikko Siponen Citizens Cybersecurity Behavior: Some
Major Challenges . . . . . . . . . . . . 54--61
Anonymous IEEE Computer Society Call for Papers 61--61
An\vze Miheli\vc and
Bo\vstjan \vZvanut (In)secure Smart Device Use Among Senior
Citizens . . . . . . . . . . . . . . . . 62--71
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 71--71
Joseph Bugeja and
Andreas Jacobsson and
Paul Davidsson The Ethical Smart Home: Perspectives and
Guidelines . . . . . . . . . . . . . . . 72--80
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 81--81
Florian Alt and
Stefan Schneegass Beyond Passwords: Challenges and
Opportunities of Future Authentication 82--86
Anonymous \booktitleIEEE Pervasive Computing Call
For Articles . . . . . . . . . . . . . . 86--86
Lata Nautiyal and
Awais Rashid and
Joseph Hallett and
Ben Shreeve and
Michael K. and
Chris E. and
Catherine H. The United Kingdom's Cyber Security
Degree Certification Program: a Cyber
Security Body of Knowledge Case Study 87--95
Anonymous \booktitleIEEE Computer Graphics and
Applications . . . . . . . . . . . . . . 95--95
Veronica Schmitt Medical Device Forensics . . . . . . . . 96--100
Anonymous IEEE Diversity and Inclusion Fund . . . 101--101
Paul C. van Oorschot A View of Security as 20 Subject Areas
in Four Themes . . . . . . . . . . . . . 102--108
Adam Shostack 25 Years in Application Security:
Looking Back, Looking Forward . . . . . 109--112
Anonymous \booktitleIEEE Transactions on Big Data 112--112
Adam Kardash and
Suzanne Morin The Practices and Challenges of
Generating Nonidentifiable Data . . . . 113--118
Anonymous \booktitleIEEE Transactions on Computers
Call for Papers . . . . . . . . . . . . 118--118
Bruce Schneier Robot Hacking Games . . . . . . . . . . 119--120
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 119--119
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE JobSite . . . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Anonymous Pseudo Ground-Truth Generators and
Large-Scale Studies . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Terry Benzel and
Thorsten Holz Selected Papers From the 2021 IEEE
Symposium on Security and Privacy . . . 8--9
Penghui Zhang and
Adam Oest and
Haehyun Cho and
Zhibo Sun and
R. C. Johnson and
Brad Wardman and
Shaown Sarker and
Alexandros Kapravelos and
Tiffany Bao and
Ruoyu Wang and
Yan Shoshitaishvili and
Adam Doupé and
Gail-Joon Ahn \pkgCrawlPhish: Large-Scale Analysis of
Client-Side Cloaking Techniques in
Phishing . . . . . . . . . . . . . . . . 10--21
Chen Ling and
Gianluca Stringhini and
Utkucan Balcì and
Jeremy Blackburn A First Look at Zoombombing . . . . . . 22--30
Pardis Emami-Naeini and
Janarth Dheenadhayalan and
Yuvraj Agarwal and
Lorrie Faith Cranor An Informative Security and Privacy
Nutrition Label for Internet of Things
Devices . . . . . . . . . . . . . . . . 31--39
Alaa Daffalla and
Lucy Simko and
Tadayoshi Kohno and
Alexandru G. Bardas Defensive Technology Use During the
2018--2019 Sudanese Revolution . . . . . 40--48
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 48--48
Nicolas Huaman and
Sabrina Amft and
Marten Oltrogge and
Yasemin Acar and
Sascha Fahl They Would Do Better If They Worked
Together: Interaction Problems Between
Password Managers and the Web . . . . . 49--60
Neal Mangaokar and
Atul Prakash Dispelling Misconceptions and
Characterizing the Failings of Deepfake
Detection . . . . . . . . . . . . . . . 61--67
Daniel W. Woods and
Rainer Böhme Incident Response as a Lawyers Service 68--74
Anonymous IEEE Computer Society Call for Special
issue Proposals . . . . . . . . . . . . 75--75
Felix Fischer and
Jens Grossklags Nudging Software Developers Toward
Secure Code . . . . . . . . . . . . . . 76--79
Fabrice Boudot and
Pierrick Gaudry and
Aurore Guillevic and
Nadia Heninger and
Emmanuel Thomé and
Paul Zimmermann The State of the Art in Integer
Factoring and Breaking Public-Key
Cryptography . . . . . . . . . . . . . . 80--86
Anonymous IEEE Open Access of the Computer Society 87--87
Elisa R. Heymann and
Barton P. Miller Software Security for the People: Free
and Open Resources for Software Security
Training . . . . . . . . . . . . . . . . 88--95
Anonymous \booktitleIEEE Computer Graphics and
Applications . . . . . . . . . . . . . . 95--95
William Enck and
Laurie Williams Top Five Challenges in Software Supply
Chain Security: Observations From 30
Industry and Government Organizations 96--100
Fabio Massacci and
Silvia Vidor Building Principles for Lawful Cyber
Lethal Autonomous Weapons . . . . . . . 101--106
Anonymous IEEE Computer Society Call for Papers 107--107
Steven M. Bellovin Open Source and Trust . . . . . . . . . 107--108
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleComputing Edge . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Mary Ellen Zurko Disinformation and Reflections From
Usable Security . . . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Tadayoshi Kohno Excerpts From the \booktitleNew
Dictionary of Cybersecurity, 2036 . . . 8--8
Anonymous Introducing \booktitleIEEE Security &
Privacy's ``Off by One'' Column . . . . 9--9
Tadayoshi Kohno Mx. President Has a Brain . . . . . . . 9--11
Anonymous Updates From \booktitleIEEE Security &
Privacy's Editor-in-Chief Sean Peisert:
And Now For Something Completely
Different . . . . . . . . . . . . . . . 11--11
Bob Blakley and
Lorrie Cranor High Assurance in the Twenty-First
Century With Roger Schell . . . . . . . 12--21
Anonymous \booktitleIEEE CGA . . . . . . . . . . . 21--21
William Martin and
Patrick Lincoln and
William Scherlis Formal Methods at Scale . . . . . . . . 22--23
Anonymous IEEE CS CFP filler . . . . . . . . . . . 23--23
David Basin and
Cas Cremers and
Jannik Dreier and
Ralf Sasse Tamarin: Verification of Large-Scale,
Real-World, Cryptographic Protocols . . 24--32
Anonymous IEEE CS IT Professional filler . . . . . 32--32
Gregory Malecha and
Gordon Stewart and
Franti ek Farka and
Jasper Haag and
Yoichi Hirai Developing With Formal Methods at
BedRock Systems, Inc. . . . . . . . . . 33--42
Anonymous IEEE SP Over the Rainbow filler2 . . . . 42--42
Calvin Deutschbein and
Andres Meza and
Francesco Restuccia and
Matthew Gregoire and
Ryan Kastner and
Cynthia Sturton Toward Hardware Security Property
Generation at Scale . . . . . . . . . . 43--51
Darren Cofer and
Isaac Amundson and
Junaid Babar and
David Hardin and
Konrad Slind and
Perry Alexander and
John Hatcliff and
Robby and
Gerwin Klein and
Corey Lewis and
Eric Mercer and
John Shackleton Cyberassured Systems Engineering at
Scale . . . . . . . . . . . . . . . . . 52--64
Mike Dodds Formally Verifying Industry Cryptography 65--70
Anonymous \booktitleIEEE Pervasive Computing . . . 70--70
Simone Raponi and
Savio Sciancalepore and
Gabriele Oligeri and
Roberto Di Pietro Road Traffic Poisoning of Navigation
Apps: Threats and Countermeasures . . . 71--79
Florian Skopik and
Max Landauer and
Markus Wurzenberger Online Log Data Analysis With Efficient
Machine Learning: A Review . . . . . . . 80--90
Anonymous IEEE tbd filler . . . . . . . . . . . . 90--90
Pietro Tedeschi and
Kang Eun Jeon and
James She and
Simon Wong and
Spiridon Bakiras and
Roberto Di Pietro Privacy-Preserving and Sustainable
Contact Tracing Using Batteryless
Bluetooth Low-Energy Beacons . . . . . . 91--100
Anonymous IEEE TC Generic CFP filler . . . . . . . 100--100
Anonymous IEEE OJ Computer Society filler . . . . 101--101
Josiah Dykstra and
Jamie Met and
Nicole Backert and
Rebecca Mattie and
Douglas Hough Action Bias and the Two Most Dangerous
Words in Cybersecurity Incident
Response: An Argument for More Measured
Incident Response . . . . . . . . . . . 102--106
Anonymous IEEE Trans Sustainable Comp filler . . . 107--107
Elisa Bertino The Persistent Problem of Software
Insecurity . . . . . . . . . . . . . . . 107--108
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE CS Job Boards . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous \booktitleIEEE Computing Edge . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Tadayoshi Kohno and
Camille Cobb and
Ada Lerner and
Michelle Lin and
Adam Shostack The Buffet Overflow Café . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
WooChul Shim and
Hyejin Shin and
Yong Ho Hwang On Data Licenses for Open Source Threat
Intelligence . . . . . . . . . . . . . . 8--22
Anonymous IEEE Computer Society Election . . . . . 22--22
Galina S. Rusman and
Yulia A. Morozova Measures to Ensure Cybersecurity of
Industrial Enterprises: a Legal
Perspective . . . . . . . . . . . . . . 23--28
Zhenpeng Shi and
Kalman Graffi and
David Starobinski and
Nikolay Matyunin Threat Modeling Tools: a Taxonomy . . . 29--39
Edy Kristianto and
Van-Linh Nguyen and
Po-Ching Lin Decentralized Public-Key Infrastructure
With Blockchain in V2X Communications:
Promising or Only Euphoria? . . . . . . 40--50
Anonymous IEEE Computer Society Call for Papers 50--50
Arslan Munir and
Erik Blasch and
Alexander Aved and
Edward Paul Ratazzi and
Joonho Kong Security Issues in Situational
Awareness: Adversarial Threats and
Mitigation Techniques . . . . . . . . . 51--60
Anonymous \booktitleIEEE Computing in Science and
Engineering . . . . . . . . . . . . . . 60--60
Jan Huck and
Frank Breitinger Wake Up Digital Forensics Community and
Help Combat Ransomware . . . . . . . . . 61--70
Anonymous 2023 IEEE Computer Society Nomination
for Watts S. Humphrey Award . . . . . . 70--70
Daniel E. Geer Identity . . . . . . . . . . . . . . . . 71--72
Anonymous \booktitleIEEE Security & Privacy
Subscribe . . . . . . . . . . . . . . . 71--71
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Job Boards . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Quantum Week 2022 . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
James Bret Michael Taking a Measured Approach to Investing
in Information Infrastructure for
Attaining Leading-Edge Trustworthy
Artificial Intelligence . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Laurie Williams Trusting Trust: Humans in the Software
Supply Chain Loop . . . . . . . . . . . 7--10
Anonymous IEEE Computer Society Call for Papers 10--10
Nathalie Baracaldo and
Alina Oprea Machine Learning Security and Privacy 11--13
Tadayoshi Kohno The Schuhmacher . . . . . . . . . . . . 14--15
Anonymous Welcome to the Latest Off by One Column 15--15
Fabio Massacci and
Antonino Sabetta and
Jelena Mirkovic and
Toby Murray and
Hamed Okhravi and
Mohammad Mannan and
Anderson Rocha and
Eric Bodden and
Daniel E. Geer Free as in Freedom to Protest? . . . . . 16--21
Minsu Cho and
Zahra Ghodsi and
Brandon Reagen and
Siddharth Garg and
Chinmay Hegde Sphynx: a Deep Neural Network Design for
Private Inference . . . . . . . . . . . 22--34
Anonymous \booktitleIEEE Security and Privacy
Subscribe . . . . . . . . . . . . . . . 34--34
Ehud Aharoni and
Nir Drucker and
Gilad Ezov and
Hayim Shaul and
Omri Soceanu Complex Encoded Tile Tensors:
Accelerating Encrypted Analytics . . . . 35--43
Martin Strobel and
Reza Shokri Data Privacy and Trustworthy Machine
Learning . . . . . . . . . . . . . . . . 44--49
Shaofeng Li and
Tian Dong and
Benjamin Zi Hao Zhao and
Minhui Xue and
Suguo Du and
Haojin Zhu Backdoors Against Natural Language
Processing: A Review . . . . . . . . . . 50--59
Tina Marjanov and
Ivan Pashchenko and
Fabio Massacci Machine Learning for Source Code
Vulnerability Detection: What Works and
What Isn't There Yet . . . . . . . . . . 60--76
Anonymous \booktitleIEEE Pervasive Computing Call
for Articles . . . . . . . . . . . . . . 76--76
Luca Demetrio and
Battista Biggio and
Fabio Roli Practical Attacks on Machine Learning: a
Case Study on Adversarial Windows
Malware . . . . . . . . . . . . . . . . 77--85
Dinil Mon Divakaran and
Adam Oest Phishing Detection Leveraging Machine
Learning and Deep Learning: a Review . . 86--95
Ben Hermann What Has Artifact Evaluation Ever Done
for Us? . . . . . . . . . . . . . . . . 96--99
Anonymous \booktitleIEEE Open Journal of the
Computing Society . . . . . . . . . . . 100--100
Luca Caviglione and
Wojciech Mazurczyk Never Mind the Malware, Here's the
Stegomalware . . . . . . . . . . . . . . 101--106
Anonymous \booktitleIEEE Security and Privacy Over
the Rainbow podcast . . . . . . . . . . 107--107
Bruce Schneier NIST's Post-Quantum Cryptography
Standards Competition . . . . . . . . . 107--108
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Diversity and
Inclusion . . . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Tadayoshi Kohno The Our Reality Privacy Policy . . . . . 4--7
Tadayoshi Kohno Welcome to the Latest Off by One Column 5--5
Anonymous Reliability Society . . . . . . . . . . 7--7
Charles Weir and
Sammy Migues and
Laurie Williams Exploring the Shift in Security
Responsibility . . . . . . . . . . . . . 8--17
Florian Skopik and
Max Landauer and
Markus Wurzenberger Blind Spots of Security Monitoring in
Enterprise Infrastructures: a Survey . . 18--26
Anonymous IEEE Computer Society Call For Papers 26--26
Charles Gouert and
Nektarios Georgios Tsoutsos Dirty Metadata: Understanding a Threat
to Online Privacy . . . . . . . . . . . 27--34
Dhiah el Diehn I. Abou-Tair and
Ala Khalifeh Distributed Self-Sovereign-Based Access
Control System . . . . . . . . . . . . . 35--42
Anonymous \booktitleIEEE Security and Privacy
Magazine Subscribe . . . . . . . . . . . 42--42
Danfeng Daphne Yao and
Sazzadur Rahaman and
Ya Xiao and
Sharmin Afrose and
Miles Frantz and
Ke Tian and
Na Meng and
Cristina Cifuentes and
Yang Zhao and
Nicholas Allen and
Nathan Keynes and
Barton P. Miller and
Elisa Heymann and
Murat Kantarcioglu and
Fahad Shaon Being the Developers Friend: Our
Experience Developing a High-Precision
Tool for Secure Coding . . . . . . . . . 43--52
Anonymous \booktitleIEEE Pervasive Computing Call
for Papers . . . . . . . . . . . . . . . 52--52
Howard D. Grimes and
Gabriela F. Ciocarlie and
Bo Yu and
Duminda Wijesekera and
Greg Shannon and
Wayne Austad and
Charles Fracchia and
Dongyan Xu and
Thomas R. Kurfess and
Lisa Strama and
Michael Mylrea and
Bill Reid PURE Biomanufacturing: Secure,
Pandemic-Adaptive Biomanufacturing . . . 53--65
Dustin Moody and
Angela Robinson Cryptographic Standards in the
Post-Quantum Era . . . . . . . . . . . . 66--72
Anonymous \booktitleIEEE IT Professional Call for
Articles . . . . . . . . . . . . . . . . 72--72
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 73--73
Paul C. van Oorschot Security as an Artificial Science,
System Administration, and Tools . . . . 74--78
Cédric Hebert Trust Me, I'm a Liar . . . . . . . . . . 79--82
Anonymous \booktitleIEEE Computing in Science and
Engineering . . . . . . . . . . . . . . 82--82
Anonymous Over the Rainbow Podcast . . . . . . . . 83--83
Steven M. Bellovin What Do We Owe? . . . . . . . . . . . . 83--84
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Jobs Board . . . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Benefits . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Terry Benzel Security and Privacy Research Artifacts:
Are We Making Progress? . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous IEEE Computer Society Publications Seek
2024 Editors in Chief . . . . . . . . . 7--7
Mary Ellen Zurko and
Julie Haney Usable Security and Privacy for Security
and Privacy Workers . . . . . . . . . . 8--10
Bob Blakley and
Lorrie Cranor Katie Moussouris: Vulnerability
Disclosure and Security Workforce
Development . . . . . . . . . . . . . . 11--18
Anonymous IEEE Job Boards . . . . . . . . . . . . 19--19
Peter Leo Gorski and
Luigi Lo Iacono and
Matthew Smith Eight Lightweight Usable Security
Principles for Developers . . . . . . . 20--26
Charles Weir and
Anna Dyson and
Dan Prince Do You Speak Cyber? Talking Security
With Developers of Health Systems and
Devices . . . . . . . . . . . . . . . . 27--36
Anonymous IEEE Computer Society Call for Papers 36--36
Mohamad Fazelnia and
Ahmet Okutan and
Mehdi Mirakhorli Supporting Artificial
Intelligence/Machine Learning Security
Workers Through an Adversarial
Techniques, Tools, and Common Knowledge
Framework . . . . . . . . . . . . . . . 37--48
Mohammad Tahaei and
Kami Vaniea and
Awais Rashid Embedding Privacy Into Design Through
Software Developers: Challenges and
Solutions . . . . . . . . . . . . . . . 49--57
Nathan Malkin Contextual Integrity, Explained: a More
Usable Privacy Definition . . . . . . . 58--65
Francesco Ciclosi and
Fabio Massacci The Data Protection Officer: a
Ubiquitous Role That No One Really Knows 66--77
Adam Shostack Nothing Is Good Enough: Fast and Cheap
Are Undervalued as Influencers of
Security Tool Adoption . . . . . . . . . 78--83
Sungmi Park and
Douglas Stebila The Future of Digital Investigation:
Automated Legal Inference . . . . . . . 84--90
Anonymous \booktitleIEEE Security and Privacy
Subscribe . . . . . . . . . . . . . . . 90--90
Elisa Bertino Privacy in the Era of 5G, IoT, Big Data,
and Machine Learning . . . . . . . . . . 91--92
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Member Benefits C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Sean Peisert The First 20 Years of \booktitleIEEE
Security & Privacy . . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Tadayoshi Kohno In Earth Until (Ready) . . . . . . . . . 7--8
Bob Blakley and
Lorrie Cranor A 20th Anniversary Episode Chat With S&P
Editors George Cybenko, Carl Landwehr,
Shari Lawrence Pfleeger, and Sean
Peisert . . . . . . . . . . . . . . . . 9--16
Anonymous IEEE CAI 2023: IEEE Conference on
Artificial Intelligence . . . . . . . . 17--17
Crispin Cowan Open and Closed Software Security Redux 18--23
Steve Lipner and
Michael Howard Inside the Windows Security Push: a
Twenty-Year Retrospective . . . . . . . 24--31
Carl Landwehr and
Michael K. Reiter and
Laurie Williams and
Gene Tsudik and
Trent Jaeger and
Tadayoshi Kohno and
Apu Kapadia Looking Backwards (and Forwards): NSF
Secure and Trustworthy Computing 20-Year
Retrospective Panel Transcription . . . 32--42
Anonymous Over the Rainbow Podcast . . . . . . . . 42--42
Terry Benzel and
Hilarie Orman \booktitleIEEE Security and Privacy
Symposium in the Year 2003 . . . . . . . 43--47
Anonymous 2024 IEEE Computer Society Watts S.
Humphery Software Quality Award Call For
Nominations . . . . . . . . . . . . . . 47--47
Elissa M. Redmiles and
Mia M. Bennett and
Tadayoshi Kohno Power in Computer Security and Privacy:
a Critical Lens . . . . . . . . . . . . 48--52
Lorenzo Cavallaro and
Johannes Kinder and
Feargus Pendlebury and
Fabio Pierazzi Are Machine Learning Models for Malware
Detection Ready for Prime Time? . . . . 53--56
Christopher A. Wood Hot Topics in Security and Privacy
Standardization at the IETF and Beyond 57--62
John True and
Navid Asadizanjani Physical Inspection and Attacks on
Electronics: an Academic Course for the
Hardware Cybersecurity Workforce . . . . 63--69
Paul C. van Oorschot Memory Errors and Memory Safety: C as a
Case Study . . . . . . . . . . . . . . . 70--76
Arvind Narayanan and
Kevin Lee Security Policy Audits: Why and How . . 77--81
Nusrat Zahan and
Elizabeth Lin and
Mahzabin Tamanna and
William Enck and
Laurie Williams Software Bills of Materials Are
Required. Are We There Yet? . . . . . . 82--88
Anonymous IEEE Job Boards . . . . . . . . . . . . 83--83
Daniel E. Geer Whither Software? . . . . . . . . . . . 89--90
Anonymous \booktitleIEEE Software Magazine Call
for Articles . . . . . . . . . . . . . . 89--89
Anonymous IEEE Computer Society . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Member Benefits C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Trent Jaeger On Bridges and Software . . . . . . . . 4--5
Anonymous Reliability Society . . . . . . . . . . 5--5
Trent Jaeger and
Brent ByungHoon Kang and
Nele Mentens and
Cynthia Sturton Impact of Emerging Hardware on Security
and Privacy . . . . . . . . . . . . . . 6--7
Soyeon Park and
Sangho Lee and
Taesoo Kim Memory Protection Keys: Facts, Key
Extension Perspectives, and Discussions 8--15
Anonymous Over the Rainbow Podcast . . . . . . . . 15--15
Vikram Narayanan and
Anton Burtsev The Opportunities and Limitations of
Extended Page Table Switching for
Fine-Grained Isolation . . . . . . . . . 16--26
Anonymous Watts S. Humphrey Software Quality Award
Nominations . . . . . . . . . . . . . . 26--26
Andres Meza and
Francesco Restuccia and
Jason Oberg and
Dominic Rizzo and
Ryan Kastner Security Verification of the OpenTitan
Hardware Root of Trust . . . . . . . . . 27--36
Anonymous IEEE Quantum Week . . . . . . . . . . . 36--36
Marc Lacoste and
Vincent Lefebvre Trusted Execution Environments for
Telecoms: Strengths, Weaknesses,
Opportunities, and Threats . . . . . . . 37--46
Adam Brian Turner and
Stephen McCombie and
Allon J. Uhlmann Ransomware-Bitcoin Threat Intelligence
Sharing Using Structured Threat
Information Expression . . . . . . . . . 47--57
Kacper T. Gradon Electric Sheep on the Pastures of
Disinformation and Targeted Phishing
Campaigns: The Security Implications of
ChatGPT . . . . . . . . . . . . . . . . 58--61
Paul C. van Oorschot Memory Errors and Memory Safety: a Look
at Java and Rust . . . . . . . . . . . . 62--68
Anonymous IEEE Computer Society . . . . . . . . . C3--C3
Anonymous IEEE Computer Society
\booktitleComputing Edge . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Quantum Week 2023 . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Sean Peisert On Software Infrastructure: Develop,
Prove, Profit? . . . . . . . . . . . . . 4--8
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous \booktitleIEEE Software Magazine Call
for Articles . . . . . . . . . . . . . . 8--8
Gabriela F. Ciocarlie and
Jianying Zhou Securing Critical Infrastructure Across
Cyber and Physical Dimensions . . . . . 9--9
Adeen Ayub and
Wooyeon Jo and
Syed Ali Qasim and
Irfan Ahmed How Are Industrial Control Systems
Insecure by Design? A Deeper Insight
Into Real-World Programmable Logic
Controllers . . . . . . . . . . . . . . 10--19
Luis Burbano and
Kunal Garg and
Santiago J. Leudo and
Alvaro A. Cardenas and
Ricardo G. Sanfelice Online Attack Recovery in Cyberphysical
Systems . . . . . . . . . . . . . . . . 20--28
Rodrigo Roman and
Cristina Alcaraz and
Javier Lopez and
Kouichi Sakurai Current Perspectives on Securing
Critical Infrastructures Supply Chains 29--38
Constantine Doumanidis and
Yongyu Xie and
Prashant H. N. Rajput and
Ryan Pickren and
Burak Sahin and
Saman Zonouz and
Michail Maniatakos Dissecting the Industrial Control
Systems Software Supply Chain . . . . . 39--50
Aditya P. Mathur Reconfigurable Digital Twin to Support
Research, Education, and Training in the
Defense of Critical Infrastructure . . . 51--60
Martin Strohmeier and
Mauro Leonardi and
Sergei Markochev and
Fabio Ricciato and
Matthias Schäfer and
Vincent Lenders In Pursuit of Aviation Cybersecurity:
Experiences and Lessons From a
Competitive Approach . . . . . . . . . . 61--73
Khaled Sarieddine and
Mohammad Ali Sayed and
Danial Jafarigiv and
Ribal Atallah and
Mourad Debbabi and
Chadi Assi A Real-Time Cosimulation Testbed for
Electric Vehicle Charging and Smart Grid
Security . . . . . . . . . . . . . . . . 74--83
Anonymous IEEE Computer Society Member Benefits 83--83
David M. Nicol and
Gregory Shannon and
Monika Akbar and
Matt Bishop and
Michael Chaney and
Matthew Luallen Toward Common Weakness Enumerations in
Industrial Control Systems . . . . . . . 84--93
Nigel Smart Computing on Encrypted Data . . . . . . 94--98
Anonymous Over the Rainbow Podcast . . . . . . . . 99--99
Steven M. Bellovin Is Cybersecurity Liability a Liability? 99--100
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous IEEE Computing Edge . . . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Tadayoshi Kohno In Your Eyes . . . . . . . . . . . . . . 4--5
Jingwei Wu and
Wanxi Mao and
Yuxin Deng and
Jinghong Xu Child Safety and Data Privacy in Smart
Homes With Speakers: Comparison of
Privacy Policies in the United States
and China . . . . . . . . . . . . . . . 6--17
Anonymous IEEE Computer Society Call for Papers 17--17
Abdul Majeed and
Seong Oun Hwang Rectification of Syntactic and Semantic
Privacy Mechanisms . . . . . . . . . . . 18--32
Priyanka Nanayakkara and
Jessica Hullman What's Driving Conflicts Around
Differential Privacy for the U.S. Census 33--42
Sebastian Obermeier and
Thomas Jösler and
Stephan Renggli and
Maurus Unternährer and
Bernhard M. Hämmerli Automating Recovery in Mixed Operation
Technology/IT Critical Infrastructures 43--54
Eric Ruzomberka and
David J. Love and
Christopher G. Brinton and
Arpit Gupta and
Chih-Chun Wang and
H. Vincent Poor Challenges and Opportunities for
Beyond-5G Wireless Security . . . . . . 55--66
Anonymous IEEE Career Center . . . . . . . . . . . 67--67
Padmanabhan Krishnan and
Cristina Cifuentes and
Li Li and
Tegawendé F. Bissyandé and
Jacques Klein Why Is Static Application Security
Testing Hard to Learn? . . . . . . . . . 68--72
Daniel Arp and
Erwin Quiring and
Feargus Pendlebury and
Alexander Warnecke and
Fabio Pierazzi and
Christian Wressnegger and
Lorenzo Cavallaro and
Konrad Rieck Lessons Learned on Machine Learning for
Computer Security . . . . . . . . . . . 72--77
Anonymous IEEE Reliability Society . . . . . . . . 77--77
Anonymous IEEE Computer Society Diversity and
Inclusion . . . . . . . . . . . . . . . 78--78
Frank Piessens Transient Execution Attacks . . . . . . 79--84
Konstantinos Adamos and
Fabio Di Franco and
Athanasios Grammatopoulos An Analysis of European Union
Cybersecurity Higher Education Programs
Through the Crowd-Sourced Database
CyberHEAD . . . . . . . . . . . . . . . 85--94
Daniel E. Geer Convergence: Ongoing . . . . . . . . . . 95--96
Anonymous IEEE Computer Society Member Benefits C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Diversity filler C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Mary Ellen Zurko Unusable Security for Attackers [From
the Editors] . . . . . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous \booktitleIEEE Security & Privacy
Subscribe filler . . . . . . . . . . . . 7--7
Fabio Massacci and
Laurie Williams Software Supply Chain Security [Guest
Editors Introduction] . . . . . . . . . 8--10
Anonymous IEEE Computer Society Has You Covered 10--10
Anonymous IEEE Computer Society Career Center
filler . . . . . . . . . . . . . . . . . 11--11
Musard Balliu and
Benoit Baudry and
Sofia Bobadilla and
Mathias Ekstedt and
Martin Monperrus and
Javier Ron and
Aman Sharma and
Gabriel Skoglund and
César Soto-Valero and
Martin Wittlinger Challenges of Producing Software Bill of
Materials for Java . . . . . . . . . . . 12--23
Anonymous IEEE Computer Society CFP filler . . . . 23--23
Ákos Milánkovich and
Katja Tuma Delta Security Certification for
Software Supply Chains . . . . . . . . . 24--33
Piergiorgio Ladisa and
Serena Elisa Ponta and
Antonino Sabetta and
Matias Martinez and
Olivier Barais Journey to the Center of Software Supply
Chain Attacks . . . . . . . . . . . . . 34--49
Santiago Torres-Arias and
Dan Geer and
John Speed Meyers A Viewpoint on Knowing Software: Bill of
Materials Quality When You See It . . . 50--54
Marcela S. Melara and
Santiago Torres-Arias A Viewpoint on Software Supply Chain
Security: Are We Getting Lost in
Translation? . . . . . . . . . . . . . . 55--58
Marcel Fourné and
Dominik Wermke and
Sascha Fahl and
Yasemin Acar A Viewpoint on Human Factors in Software
Supply Chain Security: a Research Agenda 59--63
Matthias Eckhart and
Andreas Ekelhart and
David Allison and
Magnus Almgren and
Katharina Ceesay-Seitz and
Helge Janicke and
Simin Nadjm-Tehrani and
Awais Rashid and
Mark Yampolskiy Security-Enhancing Digital Twins:
Characteristics, Indicators, and Future
Perspectives . . . . . . . . . . . . . . 64--75
Nusrat Zahan and
Parth Kanakiya and
Brian Hambleton and
Shohanuzzaman Shohan and
Laurie Williams OpenSSF Scorecard: On the Path Toward
Ecosystem-Wide Automated Security
Metrics . . . . . . . . . . . . . . . . 76--88
Anonymous IEEE Computer Society Seeks Applicants
for Editors in Chief . . . . . . . . . . 89--89
Florian Kerschbaum and
Nils Lukas Privacy-Preserving Machine Learning
[Cryptography] . . . . . . . . . . . . . 90--94
Anonymous \booktitleIEEE Annals filler . . . . . . 94--94
Anonymous 0 . . . . . . . . . . . . . . . . . . . 95--95
Bruce Schneier Trustworthy AI Means Public AI [Last
Word] . . . . . . . . . . . . . . . . . 95--96
Anonymous IEEE Computer Society Information . . . C3--C3
Anonymous \booktitleComputing Edge . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Diversity and
Inclusion Fund . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Fabio Massacci The Holy Grail of Vulnerability
Predictions . . . . . . . . . . . . . . 4--6
Anonymous IEEE Reliability Society . . . . . . . . 5--5
Franziska Roesner and
Tadayoshi Kohno Security and Privacy in the Metaverse 7--9
Anonymous IEEE Computer Society Benefits . . . . . 9--9
Derin Cayir and
Abbas Acar and
Riccardo Lazzeretti and
Marco Angelini and
Mauro Conti and
Selcuk Uluagac Augmenting Security and Privacy in the
Virtual Realm: an Analysis of Extended
Reality Devices . . . . . . . . . . . . 10--23
Vivek Nair and
Louis Rosenberg and
James F. O'Brien and
Dawn Song Truth in Motion: The Unprecedented Risks
and Opportunities of Extended Reality
Motion Data . . . . . . . . . . . . . . 24--32
Matthew Corbett and
Brendan David-John and
Jiacheng Shang and
Y. Charlie Hu and
Bo Ji Securing Bystander Privacy in Mixed
Reality While Protecting the User
Experience . . . . . . . . . . . . . . . 33--42
Anonymous IEEE Computer Society Call for Papers 42--42
Abraham Mhaidli and
Shwetha Rajaram and
Selin Fidan and
Gina Herakovic and
Florian Schaub Shockvertising, Malware, and a Lack of
Accountability: Exploring Consumer Risks
of Virtual Reality Advertisements and
Marketing Experiences . . . . . . . . . 43--52
Karoline Brehm and
Yan Shvartzshnaider Understanding Privacy in Virtual Reality
Classrooms: a Contextual Integrity
Perspective . . . . . . . . . . . . . . 53--62
Anonymous IEEE Over the Rainbow Podcast . . . . . 62--62
Anonymous Publications Seek 2025 Editors in Chief 63--63
Joseph O'Hagan and
Jan Gugenheimer and
Florian Mathis and
Jolie Bonner and
Richard Jones and
Mark McGill A Viewpoint on the Societal Impact of
Everyday Augmented Reality and the Need
for Perceptual Human Rights . . . . . . 64--68
Eric Bodden and
Jens Pottebaum and
Markus Fockel and
Iris Gräßler Evaluating Security Through Isolation
and Defense in Depth . . . . . . . . . . 69--72
Anonymous IEEE Computer Society Information . . . 73--73
Elissa M. Redmiles Friction Matters: Balancing the Pursuit
of Perfect Protection With Target
Hardening . . . . . . . . . . . . . . . 76--75
Anonymous \booktitleIEEE Annals in Computing . . . 75--75
Anonymous IEEE Career Center . . . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Diversity and
Inclusion Fund . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Laurie Williams Narrowing the Software Supply Chain
Attack Vectors: The SSDF Is Wonderful
but not Enough . . . . . . . . . . . . . 4--7
Anonymous IEEE Reliability Society . . . . . . . . 5--5
Anonymous \booktitleIEEE Transactions on Computers 7--7
Samuel Aiello and
Bhaskar P. Rimal Secure Access Service Edge Convergence:
Recent Progress and Open Issues . . . . 8--16
Vaughn Hamilton and
Gabriel Kaptchuk and
Allison McDonald and
Elissa M. Redmiles Safer Digital Intimacy for Sex Workers
and Beyond: a Technical Research Agenda 17--28
Gregory Lyon Trust in Data Security Protocols and
Knowledge of Privacy and Security
Technology . . . . . . . . . . . . . . . 29--37
Anonymous IEEE Computer Society --- Call for
Papers . . . . . . . . . . . . . . . . . 37--37
Winnie Mbaka and
Katja Tuma Role of Gender in the Evaluation of
Security Decisions . . . . . . . . . . . 38--48
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 48--48
Antonino Sabetta and
Serena Elisa Ponta and
Rocio Cabrera Lozoya and
Michele Bezzi and
Tommaso Sacchetti and
Matteo Greco and
Gerg Balogh and
Péter Heged s and
Rudolf Ferenc and
Ranindya Paramitha and
Ivan Pashchenko and
Aurora Papotti and
Ákos Milánkovich and
Fabio Massacci Known Vulnerabilities of Open Source
Projects: Where Are the Fixes? . . . . . 49--59
Anonymous \booktitleIEEE Computer Graphics and
Applications . . . . . . . . . . . . . . 59--59
Michele Bezzi Large Language Models and Security . . . 60--68
Anonymous \booktitleComputing in Science &
Engineering . . . . . . . . . . . . . . 68--68
Matilda Backendal and
Miro Haller and
Kenny Paterson End-to-End Encrypted Cloud Storage . . . 69--74
Anonymous \booktitleIEEE Transactions on Big Data 74--74
Frank Piessens and
Paul C. van Oorschot Side-Channel Attacks: a Short Tour . . . 75--80
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 80--80
Alice Hutchings The Amplification of Online Deviancy
Through the Language of Violent Crime,
War, and Aggression . . . . . . . . . . 81--84
Anonymous IEEE Computer Society Has You Covered! 85--85
Frank Pallas and
Katharina Koerner and
Isabel Barberá and
Jaap-Henk Hoepman and
Meiko Jensen and
Nandita Rao Narla and
Nikita Samarin and
Max-R. Ulbricht and
Isabel Wagner and
Kim Wuyts and
Christian Zimmermann Privacy Engineering From Principles to
Practice: a Roadmap . . . . . . . . . . 86--92
Anonymous IEEE Computer Society Information . . . 93--93
Helen Nissenbaum AI Safety: a Poisoned Chalice? . . . . . 94--96
Anonymous \booktitleIEEE Pervasive Computing ---
Call for Articles . . . . . . . . . . . 95--95
Anonymous IEEE Computer Society Career Center . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Diversity and
Inclusion Fund . . . . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Nele Mentens Hardware Security in the Era of Emerging
Device and System Technologies . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Daniel Moreira and
Sébastien Marcel and
Anderson Rocha Synthetic Realities and Artificial
Intelligence-Generated Contents . . . . 7--10
Anonymous IEEE Computer Society Call for Papers 10--10
Anonymous IEEE Computer Society Benefits . . . . . 11--11
Yeali S. Sun and
Zhi-Kang Chen and
Yi-Ting Huang and
Meng Chang Chen Unleashing Malware Analysis and
Understanding With Generative AI . . . . 12--23
Javier Pastor-Galindo and
Pantaleone Nespoli and
José A. Ruipérez-Valiente Large-Language-Model-Powered Agent-Based
Framework for Misinformation and
Disinformation Research: Opportunities
and Open Challenges . . . . . . . . . . 24--36
Diangarti Tariang and
Riccardo Corvi and
Davide Cozzolino and
Giovanni Poggi and
Koki Nagano and
Luisa Verdoliva Synthetic Image Verification in the Era
of Generative Artificial Intelligence:
What Works and What Isn't There yet . . 37--49
Can Yavuz A Multidisciplinary Look at History and
Future of Deepfake With Gartner Hype
Cycle . . . . . . . . . . . . . . . . . 50--61
Anonymous \booktitleIEEE Computers In Science &
Engineering . . . . . . . . . . . . . . 61--61
Emiliano De Cristofaro Synthetic Data: Methods, Use Cases, and
Risks . . . . . . . . . . . . . . . . . 62--67
Anonymous \booktitleIEEE Pervasive Computing . . . 67--67
Meike Ramon and
Matthew Vowels and
Matthew Groh Deepfake Detection in Super-Recognizers
and Police Officers . . . . . . . . . . 68--76
Luca Maiano and
Alexandra Benova and
Lorenzo Papa and
Mara Stockner and
Michela Marchetti and
Gianmarco Convertino and
Giuliana Mazzoni and
Irene Amerini Human Versus Machine: a Comparative
Analysis in Detecting Artificial
Intelligence-Generated Images . . . . . 77--86
Anonymous IEEE Computer Society Information . . . 87--87
Steven M. Bellovin Degenerative AI? . . . . . . . . . . . . 88--88
Anonymous IEEE Career Center . . . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Get Published in the New \booktitleIEEE
Transactions on Privacy . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Jianying Zhou The Need of Testbeds for Cyberphysical
System Security . . . . . . . . . . . . 4--6
Anonymous IEEE Reliability Society . . . . . . . . 5--5
Tadayoshi Kohno The Task Piper . . . . . . . . . . . . . 7--12
Hamed Okhravi Memory Safety . . . . . . . . . . . . . 13--15
Dan S. Wallach and
Bob Lord A Viewpoint: a Memory Safety Manifesto 18--21
Anonymous IEEE Computer Society Has You Covered! 21--21
Per Larsen Migrating C to Rust for Memory Safety 22--29
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 29--29
Santosh Nagarakatte Full Spatial and Temporal Memory Safety
for C . . . . . . . . . . . . . . . . . 30--39
Anonymous IEEE Computer Society: Call for Papers 39--39
Kaiming Huang and
Mathias Payer and
Zhiyun Qian and
Jack Sampson and
Gang Tan and
Trent Jaeger Comprehensive Memory Safety Validation:
an Alternative Approach to Memory Safety 40--49
Robert N. M. Watson and
David Chisnall and
Jessica Clarke and
Brooks Davis and
Nathaniel Wesley Filardo and
Ben Laurie and
Simon W. Moore and
Peter G. Neumann and
Alexander Richardson and
Peter Sewell and
Konrad Witaszczyk and
Jonathan Woodruff CHERI: Hardware-Enabled C/C++ Memory
Protection at Scale . . . . . . . . . . 50--61
Anonymous \booktitleIEEE Transactions on Computers 61--61
William Robertson and
Manuel Egele A Viewpoint: Safer Heaps With Practical
Architectural Security Primitives . . . 62--65
Anonymous \booktitleIEEE Transactions on Big Data 65--65
André Rösti and
Alexios Voulimeneas and
Michael Franz The Astonishing Evolution of
Probabilistic Memory Safety: From Basic
Heap-Data Attack Detection Toward Fully
Survivable Multivariant Execution . . . 66--75
Anonymous \booktitleIEEE Pervasive Computing: Call
for Articles . . . . . . . . . . . . . . 75--75
Mohamadreza Rostami and
Chen Chen and
Rahul Kande and
Huimin Li and
Jeyavijayan Rajendran and
Ahmad-Reza Sadeghi Fuzzerfly Effect: Hardware Fuzzing for
Memory Safety . . . . . . . . . . . . . 76--86
Anonymous \booktitleIT Professional: Call for
Articles . . . . . . . . . . . . . . . . 86--86
Tobias Cloosters and
Oussama Draissi and
Johannes Willbold and
Thorsten Holz and
Lucas Davi Memory Corruption at the Border of
Trusted Execution . . . . . . . . . . . 87--96
Hans Liljestrand and
Jan-Erik Ekberg A Viewpoint: Harmonizing the Diverse
Memory Safety Fronts . . . . . . . . . . 97--100
Anonymous \booktitleComputing in Science &
Engineering . . . . . . . . . . . . . . 100--100
Daniel Moreira and
Sébastien Marcel and
Anderson Rocha Synthetic Realities and Artificial
Intelligence-Generated Contents . . . . 101--102
Anonymous \booktitleIEEE Intelligent Systems . . . 102--102
Anonymous \booktitleIEEE Multimedia . . . . . . . 102--102
Zander W. Blasingame and
Chen Liu Fast-DiM: Towards Fast Diffusion Morphs 103--114
Prakash L. Kharvi Understanding the Impact of AI-Generated
Deepfakes on Public Opinion, Political
Discourse, and Personal Security in
Social Media . . . . . . . . . . . . . . 115--122
Anonymous \booktitleIEEE Computer Graphics and
Applications . . . . . . . . . . . . . . 122--122
Anonymous IEEE Computer Society Volunteer Service
Awards . . . . . . . . . . . . . . . . . 123--123
Francis Kofi Andoh-Baidoo and
Martin Otu Offei and
Emmanuel W. Ayaburi and
Mikko Siponen and
Pavel Gladyshev How Do Real Cybercrime Syndicates
Operate?: The Case of Online Romance
Fraud Syndicates . . . . . . . . . . . . 124--128
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 128--128
Anonymous Get Published in the New \booktitleIEEE
Open Journal of the Computer Society . . 129--129
Roberto Baldoni Global Cybercrime Requires a Collective
Response: Are We Prepared to Ban Ransom
Payments? . . . . . . . . . . . . . . . 130--132
Anonymous IEEE Computer Society Information . . . 133--133
Anonymous IEEE Computer Society Diversity &
Inclusion Fund . . . . . . . . . . . . . 134--134
Daniel E. Geer What I've Learned . . . . . . . . . . . 135--136
Anonymous IEEE Computer Society Career Center . . C3--C3
Anonymous \booktitleComputing Edge . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous Get Published in the New \booktitleIEEE
Transactions on Privacy . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Trent Jaeger Has Access Control Become the Weak Link? 4--7
Anonymous IEEE Reliability Society . . . . . . . . 5--5
Apu Kapadia and
Yang Wang Inclusive Privacy and Security . . . . . 10--12
Anonymous IEEE Computer Society: Call for Papers 12--12
Filipo Sharevski Inclusive Involvement of At-Risk Users
in Cybersecurity Research . . . . . . . 13--22
Anonymous IEEE Computer Society Has You Covered! 22--22
Partha Das Chowdhury and
Karen Renaud Advocating a Policy Push Toward
Inclusive and Secure ``Digital-First''
Societies . . . . . . . . . . . . . . . 23--31
Kopo M. Ramokapane and
Maria Sameen and
Zaina Dkaidek Inclusive Internet of Things Privacy
Labels . . . . . . . . . . . . . . . . . 32--39
Anonymous \booktitleIT Professional: Call for
Articles . . . . . . . . . . . . . . . . 39--39
Chen Zhong and
J. B. Joo Baek Kim and
Hong Liu The Art of Inclusive Gamification in
Cybersecurity Training . . . . . . . . . 40--51
Jinkyung Katie Park and
Mamtaj Akter and
Pamela Wisniewski and
Karla Badillo-Urquiola It's Still Complicated: From
Privacy-Invasive Parental Control to
Teen-Centric Solutions for Digital
Resilience . . . . . . . . . . . . . . . 52--62
João Janeiro and
Sérgio Alves and
Tiago Guerreiro and
Florian Alt and
Verena Distler Understanding Phishing Experiences of
Screen Reader Users . . . . . . . . . . 63--72
Roberto Natella and
Pietro Liguori and
Cristina Improta and
Bojan Cukic and
Domenico Cotroneo AI Code Generators for Security: Friend
or Foe? . . . . . . . . . . . . . . . . 73--81
Anonymous \booktitleIEEE Pervasive Computing: Call
for Articles . . . . . . . . . . . . . . 81--81
Liliana Pasquale and
Kushal Ramkumar and
Wanling Cai and
John McCarthy and
Gavin Doherty and
Bashar Nuseibeh The Rocky Road to Sustainable Security 82--86
Anonymous IEEE Computer Society Information . . . 87--87
Zaina Dkaidek and
Awais Rashid Bridging the Cybersecurity Skills Gap:
Knowledge Framework Comparative Study 88--95
Kenneth G. Crowther Blending Shared Responsibility and Zero
Trust to Secure the Industrial Internet
of Things . . . . . . . . . . . . . . . 96--102
Anonymous IEEE Computer Society Career Center . . C3--C3
Anonymous \booktitleComputing Edge . . . . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Author's Choice . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Sean Peisert Adapting a Publicly Focused Individual
Health-Care Model to Cybersecurity . . . 4--8
Anonymous IEEE Reliability Society . . . . . . . . 5--5
Feng Hao Real-World Security Protocols . . . . . 9--10
Anonymous IEEE Computer Society Information . . . 11--11
Martin R. Albrecht and
Kenneth G. Paterson Analyzing Cryptography in the Wild: a
Retrospective . . . . . . . . . . . . . 12--18
Konstantin Fischer and
Ivana Trummová and
Phillip Gajland and
Yasemin Acar and
Sascha Fahl and
M. Angela Sasse Adoption Challenges for Cryptographic
Protocols . . . . . . . . . . . . . . . 19--29
Anonymous IEEE Computer Society Call for Papers 29--29
Diana A. Vasile and
Fahim Kawsar and
Chulhong Min Emerging Paradigms in Wearable Security:
Adaptable and Secure Sandboxing for
On-the-Fly Collaboration Among Wearables 30--39
Anonymous \booktitleIEEE Transactions on Privacy 39--39
Güliz Seray Tuncay Android Permissions: Evolution, Attacks,
and Best Practices . . . . . . . . . . . 40--49
Anonymous IEEE \booktitleIT Professionals . . . . 49--49
Andrea Bisegna and
Matteo Bitussi and
Roberto Carbone and
Silvio Ranise Enhancing Security Testing for Identity
Management Implementations: Introducing
Micro-Id-Gym Language and Micro-Id-Gym
Testing Tool . . . . . . . . . . . . . . 50--61
Anonymous \booktitleIEEE Computer Graphics and
Applications . . . . . . . . . . . . . . 61--61
Syed Rafiul Hussain and
Patrick McDaniel and
Anshul Gandhi and
Kanad Ghose and
Kartik Gopalan and
Dongyoon Lee and
Yu David Liu and
Zhenhua Liu and
Shuai Mu and
Erez Zadok Verifiable Sustainability in Data
Centers . . . . . . . . . . . . . . . . 62--74
Timothy J. Pierson and
Cesar Arguello and
Beatrice Perez and
Wondimu Zegeye and
Kevin Kornegay and
Carl A. Gunter and
David Kotz We Need a ``Building Inspector for IoT''
When Smart Homes Are Sold . . . . . . . 75--84
Chelsea Komlo Threshold Signatures . . . . . . . . . . 85--88
James Crabb and
Clemente Izurieta and
Bernard Van Wie and
Olusola Adesope and
Assefaw Gebremedhin Cybersecurity Education: Insights From a
Novel Cybersecurity Summer Workshop . . 89--98
Margaret Cunningham and
Calvin Nobles and
Nikki Robinson and
Julie Haney Leveraging the Human Factors Discipline
for Better Cybersecurity Outcomes: a
Roundtable Discussion . . . . . . . . . 99--104
Anonymous \booktitleIEEE Annals of the History of
Computing . . . . . . . . . . . . . . . 104--104
Anonymous IEEE Career Center . . . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Author's Choice . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Fabio Massacci Exploding Pagers and the Birth of State
Cyberterrorism . . . . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous IEEE Computer Society Information . . . 7--7
David D. Clark and
Simson Garfinkel and
KC Claffy Differential Privacy, Firm-Level Data,
and the Binomial Pathology . . . . . . . 8--16
Anonymous IEEE Computer Society Call for Papers 16--16
Giuseppe Cascavilla The Rise of Cybercrime and Cyber-Threat
Intelligence: Perspectives and
Challenges From Law Enforcement . . . . 17--26
Rachel McAmis and
Betül Durak and
Melissa Chase and
Kim Laine and
Franziska Roesner and
Tadayoshi Kohno Handling Identity and Fraud in the
Metaverse . . . . . . . . . . . . . . . 27--37
Sean Oesch and
Phillipe Austria and
Amul Chaulagain and
Brian Weber and
Cory Watson and
Matthew Dixson and
Amir Sadovnik The Path to Autonomous Cyberdefense . . 38--46
Dominik Schneider and
Jannik Zeitschner and
Michael Kloos and
Kerstin Lemke-Rust and
Luigi Lo Iacono Developers: Beware of Timing
Side-Channels . . . . . . . . . . . . . 47--52
Pranet Sharma and
Zhenpeng Shi and
\cSevval \cSim\csek and
David Starobinski and
David Sastre Medina Understanding Similarities and
Differences Between Software Composition
Analysis Tools . . . . . . . . . . . . . 53--63
Mustafa Abdallah and
Saurabh Bagchi and
Shaunak D. Bopardikar and
Kevin Chan and
Xing Gao and
Murat Kantarcioglu and
Congmiao Li and
Peng Liu and
Quanyan Zhu Game Theory in Distributed Systems
Security: Foundations, Challenges, and
Future Directions . . . . . . . . . . . 64--74
Anonymous \booktitleIEEE Transactions on Privacy 75--75
Tamara Lopez Securing Code: a View on the Cultural
Aspects of Resilience . . . . . . . . . 76--78
Anonymous IEEE Computer Society Benefits . . . . . 79--79
Alice Hutchings Police Behaving Badly . . . . . . . . . 80--82
Cristina Alcaraz and
Javier Lopez Digital Twin Security: a Perspective on
Efforts From Standardization Bodies . . 83--90
Anonymous \booktitleIEEE Pervasive Computing . . . 90--90
Roberto Baldoni and
Giuseppe Di Luna Sovereignty in the Digital Era: The
Quest for Continuous Access to
Dependable Technological Capabilities 91--96
Anonymous Publications Seek 2026 Editors in Chief 97--97
Anonymous IEEE \booktitleIT Professionals Call for
Articles . . . . . . . . . . . . . . . . 99--99
Daniel E. Geer Data . . . . . . . . . . . . . . . . . . 98--100
Anonymous IEEE Career Center . . . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Author's Choice . . . . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Mary Ellen Zurko Cyber Hard Problems: The Next Generation
[From the Editors] . . . . . . . . . . . 4--9
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous IEEE Computer Society Call for Papers 9--9
Tamara Lopez and
Bashar Nuseibeh and
Eric Bodden Security Requirements and Secure
Software Design . . . . . . . . . . . . 10--12
Anonymous IEEE Computer Society Benefits . . . . . 12--12
Anonymous IEEE Computer Society Information . . . 13--13
Taylor R. Schorlemmer and
Ethan H. Burmane and
Kelechi G. Kalu and
Santiago Torres-Arias and
James C. Davis Establishing Provenance Before Coding:
Traditional and Next-Generation Software
Signing . . . . . . . . . . . . . . . . 14--22
Pavel Chuprikov and
Patrick Eugster and
Shamiek Mangipudi Security Policy as Code . . . . . . . . 23--31
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 31--31
Avi Shaked and
Tom Melham Contextualizing Formal Verification for
Systems Security Engineering . . . . . . 32--41
Manuel Maarek and
Daisy Abbott and
Olga Chatzifoti and
Ryan Shah and
Sheung Chi Chan and
Hans-Wolfgang Loidl and
Robert J. Stewart and
Jamie Iona Ferguson and
Sandy Louchart and
Shenando Stals and
Lynne Baillie Empower New Code Citizens to Reflect and
Communicate on Code Security . . . . . . 42--51
Harun Oz and
Daniele Cono D'Elia and
Güliz Seray Tuncay and
Abbas Acar and
Riccardo Lazzeretti and
Selcuk Uluagac With Great Power Comes Great
Responsibility: Security and Privacy
Issues of Modern Browser Application
Programming Interfaces . . . . . . . . . 52--60
Shunsuke Sato and
Ryoichi Shinkuma and
Kensei Hirai and
Masataka Nakahara and
Norihiro Okui and
Ayumu Kubota and
Yasuaki Kobayashi and
Keizo Sugiyama and
Takayuki Nishio Data Acquisition Framework for
Micromobility Vehicles Toward Driving
Risk Prediction Against Cyberphysical
Security Attack . . . . . . . . . . . . 61--70
Corey M. Hartman and
Bhaskar P. Rimal and
Daniel Conte de Leon and
Nirmal Budhathoki Cross-Architecture Binary Function
Fingerprinting . . . . . . . . . . . . . 71--80
Liliana Pasquale and
Antonino Sabetta and
Marcelo d'Amorim and
Péter Heged\Hus and
Mehdi Tarrit Mirakhorli and
Hamed Okhravi and
Mathias Payer and
Awais Rashid and
Joanna C. S. Santos and
Jonathan M. Spring and
Lin Tan and
Katja Tuma Challenges to Using Large Language
Models in Code Generation and Repair . . 81--88
Anonymous \booktitleIEEE Pervasive Computing . . . 88--88
Abdul Majeed and
Seong Oun Hwang The Dual Role of Machine Learning in
Data Anonymization: Top 10 Benefits and
Risks . . . . . . . . . . . . . . . . . 89--94
Anonymous \booktitleIEEE Security and Privacy
Subscription . . . . . . . . . . . . . . 94--94
Jessica McClearn and
Reem Talhouk and
Rikke Bjerg Jensen The Everyday Security of Living With
Conflict . . . . . . . . . . . . . . . . 95--100
Anonymous IEEE \booktitleIT Professionals Call for
Articles . . . . . . . . . . . . . . . . 100--100
Hamed Okhravi and
Nathan Burow and
Fred B. Schneider Software Bill of Materials as a
Proactive Defense . . . . . . . . . . . 101--106
Jonathan M. Spring Secure by Design for Everyone . . . . . 107--108
Anonymous IEEE Career Center . . . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Computer Society Grants for
Emerging Technology Activities . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--1
Anonymous Masthead . . . . . . . . . . . . . . . . 2--3
Sean Peisert Software Development and the
Near-Ubiquitous Acceptance of Mystery
Meat . . . . . . . . . . . . . . . . . . 4--6
Anonymous Reliability Society . . . . . . . . . . 5--5
Awais Rashid Cybercrime and Online Harms . . . . . . 7--8
Anonymous IEEE Computer Society Information . . . 9--9
Arjun Arunasalam and
Z. Berkay Celik Characterizing E-Commerce Harm by
Investigating Online Communities: a Case
Study With Abusive Dropshipping . . . . 10--19
Anonymous IEEE Computer Society Benefits . . . . . 19--19
Alyssa Chan and
Joseph Hallett and
Matthew Edwards Why Is Johnny Getting Groomed in Roblox? 20--30
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 30--30
Alina D. Machande and
Laura G. E. Smith and
Adam N. Joinson Trajectories of Piracy and Cyberbullying
Across Adolescence . . . . . . . . . . . 31--39
Anonymous IEEE Computer Society Call for Papers 39--39
Zubair Baig and
Sri Harsha Mekala and
Adnan Anwar and
Naeem Syed and
Sherali Zeadally Digital Forensics and Jurisdictional
Challenges for the Industrial Internet
of Things . . . . . . . . . . . . . . . 40--50
Awais Rashid and
Corinne May-Chahal and
Claudia Peersman Weakening End-to-End Encryption
Considered Harmful . . . . . . . . . . . 51--54
Jacopo Franceschini and
Ayhan Gücüyener Evren and
Salih Bìçakcì Fault Lines and Bytes: Cybersecurity
Challenges Amid Türkiye's February 2023
Earthquakes . . . . . . . . . . . . . . 55--63
Sophie Hawkes and
Christian Weinert and
Teresa Almeida and
Maryam Mehrnezhad Perceptual Hash Inversion Attacks on
Image-Based Sexual Abuse Removal Tools 64--73
Hamid Bostani and
Veelasha Moonsamy Beyond Learning Algorithms: The Crucial
Role of Data in Robust Malware Detection 74--78
Anonymous \booktitleIEEE Pervasive Computing . . . 78--78
Marcel Böhme How to Solve Cybersecurity Once and For
All . . . . . . . . . . . . . . . . . . 79--82
Roberto Baldoni The Artificial Intelligence Paradox:
Among Global Power, Errors, and
Regulatory Shifts . . . . . . . . . . . 83--90
Kevin Butler and
Kurt Hugenberg and
Eakta Jain and
Apu Kapadia and
Tadayoshi Kohno and
Elissa M. Redmiles and
Franziska Roesner and
Mattea Sim and
Patrick Traynor and
Hanna Barakat Extending the Heilmeier Catechism to
Evaluate Security and Privacy Systems:
Who is Left Out? . . . . . . . . . . . . 91--95
Bruce Schneier The Age of Integrity . . . . . . . . . . 96--96
Anonymous IEEE Career Center . . . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4
Anonymous Front Cover . . . . . . . . . . . . . . C1--C1
Anonymous IEEE Emerging Technologies . . . . . . . C2--C2
Anonymous Table of Contents . . . . . . . . . . . 1--2
Anonymous Masthead . . . . . . . . . . . . . . . . 3--3
Jianying Zhou Maritime Cybersecurity: a Big Change
Ahead . . . . . . . . . . . . . . . . . 4--7
Anonymous Reliability Society . . . . . . . . . . 5--5
Anonymous IEEE Computer Society Call for Papers 7--7
Kovila P. L. Coopamootoo and
Elissa M. Redmiles and
Miranda Wei Online Safety Through the Lens of Gender
and Sexuality . . . . . . . . . . . . . 8--10
Lelia Marie Hampton and
Alicia E. Boyd Centering Reproductive Justice in Online
Safety Research . . . . . . . . . . . . 11--14
Anonymous IEEE Computer Society Benefits . . . . . 14--14
Sara M. Abdulla Are Deepfakes ``Ab''Normal Enough? On
Using Norm Shifts in Gender and
Sexuality Safety Measures . . . . . . . 15--20
Anonymous \booktitleIEEE Pervasive Computing . . . 20--20
Anonymous IEEE Computer Society Information . . . 21--21
Becca Wood and
Kristina Kocsis and
Pam Briggs Exploring Public Attitudes on
Technology-Facilitated Intimate Partner
Violence . . . . . . . . . . . . . . . . 22--31
Eduard Fosch-Villaronga and
Mariana de Hoyos and
Sabine K. Witting Swiping Safely in Online Dating
Platforms . . . . . . . . . . . . . . . 32--40
Nazanin Sabri and
Kristen Vaccaro and
Mai ElSherief The Double Burden of Moderators:
Safeguarding Communities While Facing
Identity-Based Harassment . . . . . . . 41--47
Anonymous \booktitleIEEE Transactions on Big Data 47--47
Diana Freed and
Reid McIlroy-Young and
Sarah Radway and
Gabriela Becher and
Diane Bernabei and
Christina Lee and
Cynthia Dwork Medical Data for Sale: Accessing
Reproductive Health Information via the
Data Brokerage Landscape . . . . . . . . 48--59
Anonymous \booktitleIEEE Transactions on Computers 59--59
Isabella Wilkinson and
Laura Shipp Queering FemTech: Understanding ``Queer
Use'' in Gendered Technologies . . . . . 60--70
Cassidy Gibson and
Logan Blue and
Patrick Traynor and
Kevin Butler Copycat Crimes: Characterizing Code
Reuse in the Mobile Android Stalkerware
Ecosystem . . . . . . . . . . . . . . . 71--79
Monica. T. Whitty and
Garry Young Relational Cybercrimes: a New Way
Forward in Classifying Cybercrimes . . . 80--90
Anonymous \booktitleIEEE Open Journal of the
Computer Society . . . . . . . . . . . . 91--91
Hanshen Xiao and
Srinivas Devadas PAC Privacy and Black-Box Privatization 2--7
Anonymous \booktitleIEEE Transactions on
Sustainable Computing . . . . . . . . . 97--97
Wongyu Hwangbo and
Jisoo Jang and
Jaeil Lee and
Dongkyoo Shin Improvement of Data Protection Practices
During the Cell Phone Activation Process
in South Korea . . . . . . . . . . . . . 98--102
Ruba Abu-Salma and
Pauline Anthonysamy and
Zinaida Benenson and
Benjamin Berens and
Kovila P. L. Coopamootoo and
Andreas Gutmann and
Adam Jenkins and
Sameer Patil and
Sören Preibusch and
Florian Schaub and
William Seymour and
Jose Such and
Mohammad Tahaei and
Aybars Tuncdogan and
Max Van Kleek and
Daricia Wilkinson Grand Challenges in Human-Centered
Privacy . . . . . . . . . . . . . . . . 103--110
Anonymous IEEE \booktitleIT Professionals Call for
Articles . . . . . . . . . . . . . . . . 110--110
Anonymous \booktitleIEEE Transactions on Privacy 111--111
Steven M. Bellovin Trust Binding . . . . . . . . . . . . . 112--112
Anonymous IEEE Career Center . . . . . . . . . . . C3--C3
Anonymous \booktitleIEEE Computing Edge . . . . . C4--C4