default search action
IEEE Security & Privacy, Volume 7
Volume 7, Number 1, January-February 2009
- Marc Donner:
Reading (with) the Enemy. 3 - Brandi Ortega:
Shaking Up the Cybersecurity Landscape. 5-6 - Gary McGraw:
Silver Bullet Talks with Gunnar Peterson. 7-11 - Jaynarayan H. Lala, Fred B. Schneider:
IT Monoculture Security Risks and Defenses. 12-13 - Kenneth P. Birman, Fred B. Schneider:
The Monoculture Risk Put into Context. 14-17 - Angelos D. Keromytis:
Randomized Instruction Sets and Runtime Environments Past Research and Future Directions. 18-25 - Daniel W. Williams, Wei Hu, Jack W. Davidson, Jason Hiser, John C. Knight, Anh Nguyen-Tuong:
Security through Diversity: Leveraging Virtual Machine Technology. 26-33 - Kjell Jørgen Hole, André N. Klingsheim, Lars-Helge Netland, Yngve Espelid, Thomas Tjøstheim, Vebjørn Moen:
Risk Assessment of a National Security Infrastructure. 34-41 - Michel Cukier, Susmit Panjwani:
Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. 42-48 - William Enck, Machigar Ongtang, Patrick D. McDaniel:
Understanding Android Security. 50-57 - Susan Landau:
The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy. 58-62 - Bret Michael, Jeffrey M. Voas, Phillip A. Laplante:
Cyberpandemics: History, Inevitability, Response. 63-67 - Yuen-Yan Chan, Victor K.-W. Wei:
Teaching for Conceptual Change in Security Awareness: A Case Study in Higher Education. 68-71 - Patricia Kosseim, Khaled El Emam:
Privacy Interests in Prescription Data, Part I: Prescriber Privacy. 72-76 - Franco Callegati, Walter Cerroni, Marco Ramilli:
Man-in-the-Middle Attack to the HTTPS Protocol. 78-81 - Phillip A. Porras:
Directions in Network-Based Security Monitoring. 82-85 - Daniel E. Geer Jr., Daniel G. Conway:
The 0wned Price Index. 86-87 - Bruce Schneier:
Architecture of Privacy. 88
Volume 7, Number 2, March-April 2009
- Fred B. Schneider:
Accountability for Perfection. 3-4 - Brandi Ortega:
News Briefs. 8-9 - Gary McGraw:
Silver Bullet Talks with Jeremiah Grossman. 10-14 - Shari Lawrence Pfleeger:
Searching for You. 15 - Michael A. Caloyannides, Nasir D. Memon, Wietse Z. Venema:
Digital Forensics. 16-17 - Michael A. Caloyannides:
Forensics Is So "Yesterday". 18-25 - Brian D. Carrier:
Digital Forensics Works. 26-29 - Brian Hay, Matt Bishop, Kara L. Nance:
Live Analysis: Progress and Challenges. 30-37 - Simson L. Garfinkel, James J. Migletz:
New XML-Based Files Implications for Forensics. 38-44 - Gavin Wylie Manes, Elizabeth Downing:
Overview of Licensing and Legal Issues for Digital Forensic Investigators. 45-48 - Vassil Roussev:
Hashing and Data Fingerprinting in Digital Forensics. 49-55 - Sarah Spiekermann, Sergei Evdokimov:
Critical RFID Privacy-Enhancing Technologies. 56-62 - John Harauz, Lori M. Kaufman:
A New Era of Presidential Security: The President and His BlackBerry. 67-70 - Jungwoo Ryoo, Angsana A. Techatassanasoontorn, Dongwon Lee:
Security Education Using Second Life. 71-74 - Khaled El Emam, Patricia Kosseim:
Privacy Interests in Prescription Data, Part 2: Patient Privacy. 75-78 - Julien Brouchier, Tom Kean, Carol Marsh, David Naccache:
Temperature Attacks. 79-82 - Martin Gilje Jaatun, Jostein Jensen, Havard Vegge, Finn Michael Halvorsen, Rune Walso Nergard:
Fools Download Where Angels Fear to Tread. 83-86 - Michael Zhivich, Robert K. Cunningham:
The Real Cost of Software Errors. 87-90 - Gunnar Peterson:
Service-Oriented Security Indications for Use. 91-93 - Daniel E. Geer Jr., Daniel G. Conway:
Hard Data Is Good to Find. 94-95 - Steven M. Bellovin:
The Government and Cybersecurity. 96
Volume 7, Number 3, May-June 2009
- Carl E. Landwehr:
A National Goal for Cyberspace: Create an Open, Accountable Internet. 3-4 - James Figueroa:
News Briefs. 6-7 - James McGovern:
Silver Bullet Talks with Gary McGraw. 8-10 - Gary McGraw, Ming Chow:
Guest Editors' Introduction: Securing Online Games: Safeguarding the Future of Software Security. 11-12 - Stephen Bono, Dan Caselden, Gabriel Landau, Charlie Miller:
Reducing the Attack Surface in Massively Multiplayer Online Role-Playing Games. 13-19 - Aaron Portnoy, Ali Rizvi-Santiago:
Walking on Water: A Cheating Case Study. 20-22 - Sean F. Kane:
Virtual Judgment: Legal Implications of Online Gaming. 23-28 - Stefan Mitterhofer, Christopher Krügel, Engin Kirda, Christian Platzer:
Server-Side Bot Detection in Massively Multiplayer Online Games. 29-36 - Jeff Jianxin Yan, Brian Randell:
An Investigation of Cheating in Online Games. 37-44 - M. Eric Johnson, Eric Goetz, Shari Lawrence Pfleeger:
Security through Information Risk Management. 45-52 - Michael E. Locasto:
Helping Students 0wn Their Own Code. 53-56 - Vijay Varadharajan:
A Note on Trust-Enhanced Security. 57-59 - Marc Donner:
War Stories. 60-63 - Gregory J. Conti, Edward Sobiesk:
Malicious Interfaces and Personalization's Uninviting Future. 64-67 - Michael Howard:
Improving Software Security by Eliminating the CWE Top 25 Vulnerabilities. 68-71 - Bojan Zdrnja:
Malicious JavaScript Insertion through ARP Poisoning Attacks. 72-74 - Patrick D. McDaniel, Stephen E. McLaughlin:
Security and Privacy Challenges in the Smart Grid. 75-77 - Michael Lesk:
Reading Over Your Shoulder. 78-81 - Anton Chuvakin, Gunnar Peterson:
Logging in the Age of Web Services. 82-85 - Daniel E. Geer Jr., Daniel G. Conway:
A Doubt of the Benefit. 86-87 - Daniel E. Geer Jr.:
Digital Endosymbiosis. 88
Volume 7, Number 4, July-August 2009
- Marc Donner:
New Models for Old. 3-4 - Letters to the Editor. 6-7
- James Figueroa:
News Briefs. 8-10 - Gary McGraw:
Silver Bullet Talks with Virgil Gligor. 11-14 - Herbert Lin:
Lifting the Veil on Cyber Offense. 15-21 - Jeff Yan, Ahmad Salah El Ahmad:
CAPTCHA Security: A Case Study. 22-28 - Gordon F. Hughes, Tom Coughlin, Daniel M. Commins:
Disposal of Disk and Tape Data by Secure Sanitization. 29-34 - Qun Ni, Elisa Bertino, Jorge Lobo, Seraphin B. Calo:
Privacy-Aware Role-Based Access Control. 35-43 - Michael Meike, Johannes Sametinger, Andreas Wiesauer:
Security in Open Source Web Content Management Systems. 44-51 - Rachel Rue, Shari Lawrence Pfleeger:
Making the Best Use of Cybersecurity Economic Models. 52-60 - Lori M. Kaufman:
Data Security in the World of Cloud Computing. 61-64 - Janne Merete Hagen:
Human Relationships: A Never-Ending Security Education Challenge? 65-67 - Betsy Masiello:
Deconstructing the Privacy Experience. 68-70 - Justin Troutman, Vincent Rijmen:
Green Cryptography: Cleaner Engineering through Recycling. 71-73 - Ronda Henning:
Predictable Surprises. 74-76 - Patrick Traynor:
Securing Cellular Infrastructure: Challenges and Opportunities. 77-79 - Jeffrey K. MacKie-Mason:
Incentive-Centered Design for Security. 80-83 - Andy Steingruebl, Gunnar Peterson:
Software Assumptions Lead to Preventable Errors. 84-87 - Bruce Schneier:
Security, Group Size, and the Human Brain. 88
Volume 7, Number 5, September-October 2009
- Bret Michael:
In Clouds Shall We Trust? 3 - Gary McGraw:
Silver Bullet Talks with Bob Blakley. 5-8 - James Figueroa:
News Briefs. 9-10 - Daniel Massey, Dorothy E. Denning:
Guest Editors' Introduction: Securing the Domain Name System. 11-13 - Ioannis C. Avramopoulos, Martin Suchara:
Protecting the DNS from Routing Attacks: Two Alternative Anycast Implementations. 14-20 - D. Kevin McGrath, Andrew J. Kalafut, Minaxi Gupta:
Phishing Infrastructure Fluxes All the Way. 21-28 - Ramaswamy Chandramouli, Scott Rose:
Open Issues in Secure DNS Deployment. 29-35 - Wouter C. A. Wijngaards, Benno J. Overeinder:
Securing DNS: Extending DNS Servers with a DNSSEC Validator. 36-43 - Eric Osterweil, Lixia Zhang:
Interadministrative Challenges in Managing DNSKEYs. 44-51 - Kara L. Nance:
Teach Them When They Aren't Looking: Introducing Security in CS1. 53-55 - Scott Charney:
The Evolution of Online Identity. 56-59 - Fred H. Cate:
Security, Privacy, and the Role of Law. 60-63 - Justin Troutman, Vincent Rijmen:
Green Cryptography: Cleaner Engineering through Recycling, Part 2. 64-65 - Michael Howard:
Managing the Security Wall of Data. 66-68 - Stefano Zanero:
Wireless Malware Propagation: A Reality Check. 70-74 - Matt Blaze:
Taking Surveillance Out of the Shadows. 75-77 - Michael Lesk:
Incentives to Innovate: Improve the Past or Break with It? 78-81 - Ryan W. Gardner, Matt Bishop, Tadayoshi Kohno:
Are Patched Machines Really Fixed? 82-85 - Daniel E. Geer Jr., Daniel G. Conway:
Risk Concentration. 86-87 - Steven M. Bellovin, Daniel G. Conway:
Security as a Systems Property. 88
Volume 7, Number 6, November-December 2009
- Fred B. Schneider:
Labeling-in Security. 3 - Gary McGraw:
Silver Bullet Talks with Fred Schneider. 5-7 - James Figueroa:
News Briefs. 8-9 - Shari Lawrence Pfleeger, Salvatore J. Stolfo:
Addressing the Insider Threat. 10-13 - Deanna D. Caputo, Marcus A. Maloof, Greg Stephens:
Detecting Insider Theft of Trade Secrets. 14-21 - Felicia Duran, Stephen H. Conrad, Gregory N. Conrad, David P. Duggan, Edward Bruce Held:
Building A System For Insider Security. 30-38 - Brian M. Bowen, Malek Ben Salem, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo:
Designing Host and Network Sensors to Mitigate the Insider Threat. 22-29 - Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Failures of Tamper-Proofing in PIN Entry Devices. 39-45 - Eric A. Bier, Richard Chow, Philippe Golle, Tracy Holloway King, Jessica Staddon:
The Rules of Redaction: Identify, Protect, Review (and Repeat). 46-53 - Bruce Potter:
High Time for Trusted Computing. 54-56 - Adam Goldstein, David Bucciero:
The Dartmouth Cyber Security Initiative: Faculty, Staff, and Students Work Together. 57-59 - O. Sami Saydjari, Cynthia E. Irvine:
A Tale of Three Cyber-Defense Workshops. 60-64 - Nate Lawson:
Side-Channel Attacks on Cryptographic Software. 65-68 - Richard Ford, William H. Allen:
Malware Shall Greatly Increase .... 69-71 - Franco Callegati, Marco Ramilli:
Frightened by Links. 72-76 - Michael E. Locasto, Sergey Bratus, Brian Schulte:
Bickering In-Depth: Rethinking the Composition of Competing Security Systems. 77-81 - Alessandro Acquisti:
Nudging Privacy: The Behavioral Economics of Personal Information. 82-85 - Daniel E. Geer Jr., Daniel G. Conway:
Patch Grief with Proverbs. 86-87 - Daniel E. Geer Jr.:
Deskilling Digital Security. 88
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.