Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
IEEE Security & Privacy
Current Issue
Past Issues
Issue 2014.04
Early Access
About
Write for Us
Peer Review
OtR Podcast
Get Access
Generate Citations
IEEE Security & Privacy
Volume 12, Issue 4
Jul.-Aug. 2014
Log in to access my content
Table of Contents
Seeking IEEE Security & Security Editor in Chief
Freely available from IEEE.
pp. c2-c2
Table of contents
Freely available from IEEE.
pp. 1-2
Security and Privacy: Facing Ethical Choices
Freely available from IEEE.
pp. 3-6
by
Susan Landau
[Masthead]
Freely available from IEEE.
pp. 7-7
Security, Privacy, Policy, and Dependability Roundup
Freely available from IEEE.
pp. 8-10
by
Lee Garber
Silver Bullet Talks with Nate Fick
Freely available from IEEE.
pp. 11-13
by
Gary McGraw
Adapting Law Enforcement Frameworks to Address the Ethical Problems of CCTV Product Propagation
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-21
by
Michael Kerr
,
Ron van Schyndel
Can We Sniff Wi-Fi?: Implications of Joffe v. Google
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-28
by
Simson L. Garfinkel
,
Michael McCarrin
The Untapped Potential of Trusted Execution Environments on Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-37
by
Jan-Erik Ekberg
,
Kari Kostiainen
,
N. Asokan
China's Data Privacy Regulations: A Tricky Tradeoff between ICT's Productive Utilization and Cybercontrol
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-45
by
Nir Kshetri
Inviting More Heartbleed
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-50
by
Daniel E. Geer
,
Poul-Henning Kamp
Willis Ware's Lasting Contribution to Privacy: Fair Information Practices
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-54
by
Robert Gellman
Improving App Privacy: Nudging App Developers to Protect User Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-58
by
Rebecca Balebako
,
Lorrie Cranor
Honey Encryption: Encryption beyond the Brute-Force Barrier
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-62
by
Ari Juels
,
Thomas Ristenpart
Heartbleed 101
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-67
by
Marco Carvalho
,
Jared DeMott
,
Richard Ford
,
David A. Wheeler
Toward a Science of Secure Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-70
by
Patrick McDaniel
,
Brian Rivera
,
Ananthram Swami
Staffing for Security: Don't Optimize
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-73
by
Michael Lesk
The Eyes Have It: Surveillance and How It Evolved
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-79
by
Shari Lawrence Pfleeger
By Any Means Possible: How Intelligence Agencies Have Gotten Their Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-84
by
Steven M. Bellovin
Aligning the Compasses: A Journey through Compliance and Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-89
by
John DeLong
Personal Data and Government Surveillance
Freely available from IEEE.
pp. 90-96
by
Daniel E. Geer
Showing 21 out of 21
Announcements
S&P Reviewer Thanks
Spread the Word about Your Research through Social Media
Seeking 2026 Editors in Chief
Calls for Papers
CLOSED: Special Issue on Cybercrime and Online Harms
Special Issue on Security and Privacy of Generative AI
IEEE Security & Privacy
Special Issue on Privacy As Contextual Integrity
Trending
Evaluating the Effectiveness of Memory Safety Sanitizers
Emanuel Q. Vintila, +2 more
PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages
Josh Wiedemeier, +6 more
Understanding the Efficacy of Phishing Training in Practice
Grant Ho, +9 more
Proof-of-Learning: Definitions and Practice
Hengrui Jia, +6 more
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
Sniffing Location Privacy of Video Conference Users Using Free Audio Channels
Long Huang, +1 more
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem
Mona Wang, +4 more
SoK: A Framework and Guide for Human-Centered Threat Modeling in Security and Privacy Research
Warda Usman, +1 more
SoK: Eternal War in Memory
Laszlo Szekeres, +3 more
A Wall Behind A Wall: Emerging Regional Censorship in China
Mingshi Wu, +4 more
CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels
Yuanyuan Yuan, +6 more
Investigating Physical Latency Attacks Against Camera-Based Perception
Raymond Muller, +9 more
Examining Zero-Shot Vulnerability Repair with Large Language Models
Hammond Pearce, +4 more
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale
Robert N. M. Watson, +11 more
Incident Response as a Lawyers’ Service
Daniel W. Woods, +1 more