IEEE Security & Privacy

Volume 16 Issue 4 • July/August 2018

Filter Results

Displaying Results 1 - 21 of 21
  • Front Covers 
  • Front Cover

    Publication Year: 2018, Page(s): c1
    Request permission for reuse | PDF file iconPDF (622 KB)
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Security & Privacy

    Publication Year: 2018, Page(s): c2
    Request permission for reuse | PDF file iconPDF (790 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2018, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (1986 KB)
    Freely Available from IEEE
  • From the Editors 
  • Encouraging Diversity in Security and Privacy Research

    Publication Year: 2018, Page(s):3 - 5
    Request permission for reuse | PDF file iconPDF (1303 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2018, Page(s): 6
    Request permission for reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Interview 
  • Silver Bullet Talks with Nick Weaver

    Publication Year: 2018, Page(s):7 - 10
    Request permission for reuse | PDF file iconPDF (184 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors’ Introduction 
  • Blockchain Security and Privacy

    Publication Year: 2018, Page(s):11 - 12
    Request permission for reuse | PDF file iconPDF (1441 KB) | HTML iconHTML
    Freely Available from IEEE
  • Blockchain Security and Privacy 
  • Top Ten Obstacles along Distributed Ledgers Path to Adoption

    Publication Year: 2018, Page(s):13 - 19
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    This article presents the top ten obstacles towards the adoption of distributed ledgers, ranging from identifying the right ledger to use for the right use case to developing scalable consensus protocols that provide some meaningful notion of public verifiability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A First Look at Identity Management Schemes on the Blockchain

    Publication Year: 2018, Page(s):20 - 29
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    The emergence of distributed ledger technology (DLT) based on a blockchain data structure has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance de-centralization, transparency, and user control in transactions that involve identity information;... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts

    Publication Year: 2018, Page(s):30 - 37
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Many consensus protocols are based on the assumption that participants are either “good” or “bad” but ignore the fact that they may be affected by direct or indirect economic interests involved in the corresponding smart contracts. We analyze consensus in decentralized environments and demonstrate that the system cannot guarantee correct execution results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blockchain Access Privacy: Challenges and Directions

    Publication Year: 2018, Page(s):38 - 45
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2250 KB) | HTML iconHTML

    Privacy, facilitated by a confluence of cryptography and decentralization, is one of the primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy promise has proven illusory, and despite growing interest in privacy-centric blockchains, most blockchain users remain susceptible to privacy attacks that exploit network-layer information and access patterns that lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives

    Publication Year: 2018, Page(s):46 - 56
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Digital currencies such as Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computational power and advanced cryptanalysis cause primitives to break and motivate the development of new ones. It is therefore crucial for maintaining trust in a cryptocurrency to anticipate such breakage. We present the fir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats

    Publication Year: 2018, Page(s):57 - 65
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    Blockchain technology has arisen as a promising protocol to replace centralized and less efficient systems. In fact, for the first time, it is possible to achieve decentralized consensus without the need for trusted authorities, resulting in more efficient processes and saving both money and time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Botnets 
  • Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions

    Publication Year: 2018, Page(s):66 - 81
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    Browser extension systems risk exposing APIs, which are too permissive and cohesive with the browser's internal structure, leaving a hole for malicious developers to exploit security critical functionality. We present a botnet framework based on malicious browser extensions and provide an exhaustive range of attacks that can be launched in this framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sociotechnical Security and Privacy 
  • Inclusive Security and Privacy

    Publication Year: 2018, Page(s):82 - 87
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    The mainstream security and privacy mechanisms often do not consider the wide variety of users. As a result, these mechanisms fall short of empowering many under-served populations such as children, older adults, people with disabilities, and people from non-Western developing countries to effectively protect their security and privacy. In this article, I advocate for a new wave of research that c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Education 
  • Peer Instruction Teaching Methodology for Cybersecurity Education

    Publication Year: 2018, Page(s):88 - 91
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    Over the past few years, a team at the University of New Orleans has worked to develop, and evaluate the effectiveness of, a set of 280 questions for three common cybersecurity courses—Introduction to Computer Security, Digital Forensics, and Network Penetration Testing. We performed a pilot study on a subset of the forensics questions in a workshop and found promising evidence of gains in student... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybercrime and Forensics 
  • Cryptocurrencies—A Forensic Challenge or Opportunity for Law Enforcement? An INTERPOL Perspective

    Publication Year: 2018, Page(s):92 - 94
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1734 KB) | HTML iconHTML

    The anonymous and decentralized nature of cryptocurrencies has turned them into a powerful weapon in the cyberarsenal of national and international criminal groups by facilitating their illicit activities while evading prosecution. However, despite the numerous challenges that the international law enforcement community faces when investigating cryptocurrencies, a number of investigation opportuni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society Information

    Publication Year: 2018, Page(s): 95
    Request permission for reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Last Word 
  • You Are What You Eat

    Publication Year: 2018, Page(s): 96
    Request permission for reuse | PDF file iconPDF (217 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • Share The Gift Of Knowledge: Give Your Favorite Student a Membership to the IEEE Computer Society!

    Publication Year: 2018, Page(s): c3
    Request permission for reuse | PDF file iconPDF (4535 KB)
    Freely Available from IEEE
  • Stay Connected

    Publication Year: 2018, Page(s): c4
    Request permission for reuse | PDF file iconPDF (1046 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David M. Nicol
University of Illinois at Urbana Champaign
dmnicol@illinois.edu