Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
IEEE Security & Privacy
Current Issue
Past Issues
Issue 2015.02
Early Access
About
Write for Us
Peer Review
OtR Podcast
Get Access
Generate Citations
IEEE Security & Privacy
Volume 13, Issue 2
Mar.-Apr. 2015
Log in to access my content
Table of Contents
Table of Contents
Freely available from IEEE.
pp. 1-2
The Whole Is Less than the Sum of the Parts
Freely available from IEEE.
pp. 3-5
by
Jeremy Epstein
Masthead
Freely available from IEEE.
pp. 6-6
Silver Bullet Talks with Whitfield Diffie
Freely available from IEEE.
pp. 7-10
by
Gary McGraw
An Enduring Symposium for Leading Research in Security and Privacy
Freely available from IEEE.
pp. 12-13
by
Terry Benzel
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction]
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-21
by
Sai Teja Peddinti
,
Aleksandra Korolova
,
Elie Bursztein
,
Geetanjali Sampemane
An Overview of ANONIZE: A Large-Scale Anonymous Survey System
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-29
by
Susan Hohenberger
,
Steven Myers
,
Rafael Pass
,
abhi shelat
Automatic Software Diversity
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-37
by
Per Larsen
,
Stefan Brunthaler
,
Michael Franz
Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-46
by
Zongwei Zhou
,
Miao Yu
,
Virgil D. Gligor
Introspections on the Semantic Gap
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-55
by
Bhushan Jain
,
Mirza Basim Baig
,
Dongli Zhang
,
Donald E. Porter
,
Radu Sion
Be Prepared: The EMV Preplay Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-64
by
Mike Bond
,
Marios O. Choudary
,
Steven J. Murdoch
,
Sergei Skorobogatov
,
Ross Anderson
Gaining an Edge in Cyberspace with Advanced Situational Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-74
by
Vincent Lenders
,
Axel Tanner
,
Albert Blarer
Evaluation Theory and Practice Applied to Cybersecurity Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-80
by
Melissa Dark
,
Jelena Mirkovic
Automated Proof and Flaw-Finding Tools in Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-83
by
Graham Steel
Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2--Defenders and Victims
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-88
by
Budi Arief
,
Mohd Azeem Bin Adzmi
Information Hiding as a Challenge for Malware Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-93
by
Wojciech Mazurczyk
,
Luca Caviglione
Never Mind Pearl Harbor--What about a Cyber Love Canal?
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-98
by
Sean W. Smith
,
John S. Erickson
Safety Risks--Human Error or Mechanical Failure?: Lessons from Railways
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-102
by
Michael Lesk
Informed Consent: We Can Do Better to Defend Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-107
by
Frederik Zuiderveen Borgesius
The Security Value of Muddling Through
Freely available from IEEE.
pp. 108-108
by
Bruce Schneier
Showing 20 out of 20
Announcements
S&P Reviewer Thanks
Spread the Word about Your Research through Social Media
Seeking 2026 Editors in Chief
Calls for Papers
CLOSED: Special Issue on Cybercrime and Online Harms
Special Issue on Security and Privacy of Generative AI
IEEE Security & Privacy
Special Issue on Privacy As Contextual Integrity
Trending
Evaluating the Effectiveness of Memory Safety Sanitizers
Emanuel Q. Vintila, +2 more
PyLingual: Toward Perfect Decompilation of Evolving High-Level Languages
Josh Wiedemeier, +6 more
Understanding the Efficacy of Phishing Training in Practice
Grant Ho, +9 more
Proof-of-Learning: Definitions and Practice
Hengrui Jia, +6 more
Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media
Prakash L. Kharvi
Sniffing Location Privacy of Video Conference Users Using Free Audio Channels
Long Huang, +1 more
Contextual Integrity, Explained: A More Usable Privacy Definition
Nathan Malkin
WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem
Mona Wang, +4 more
SoK: A Framework and Guide for Human-Centered Threat Modeling in Security and Privacy Research
Warda Usman, +1 more
SoK: Eternal War in Memory
Laszlo Szekeres, +3 more
A Wall Behind A Wall: Emerging Regional Censorship in China
Mingshi Wu, +4 more
CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels
Yuanyuan Yuan, +6 more
Investigating Physical Latency Attacks Against Camera-Based Perception
Raymond Muller, +9 more
Examining Zero-Shot Vulnerability Repair with Large Language Models
Hammond Pearce, +4 more
CHERI: Hardware-Enabled C/C++ Memory Protection at Scale
Robert N. M. Watson, +11 more
Incident Response as a Lawyers’ Service
Daniel W. Woods, +1 more