Software Everywhere

January/February 2016

IEEE Security & Privacy magazine cover

In This Issue

IEEE Security & Privacy's readers are concerned with not only security and privacy but also safety and dependability. In this issue, we focus on all four aspects of the technology we use daily. Read full article »

About IEEE Security & Privacy

IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.

Articles from IEEE Security & Privacy

A New Legal Framework for Online Anonymity: California’s Privacy-Based Approach

Mettle Fatigue: VW's Single-Point-of-Failure Ethics

After a year of denials, Volkswagen admitted in September 2015 that multiple makes and models of its diesel vehicles contained defeat device software. The decisions leading to "Dieselgate" involved a corruption of engineering ethics that the profession ought to address. Read full article »

Lesson Learned: Security is Inevitable

Lesson Learned: Security is Inevitable

Designers must document the expectations and limitations of products so that adapters will know when an expanded use threatens security. Developers must accept responsibility for the security of their products. Read full article »

A New Legal Framework for Online Anonymity: California’s Privacy-Based Approach

A New Legal Framework for Online Anonymity: California’s Privacy-Based Approach

California’s privacy-based approach to online anonymity, part of a fundamental right to privacy, is providing a legal framework for courts in other states and nations. Read full article »

Announcements

Authentication at Scale

Arguing that it's time to give up on elaborate password rules, Google Vice President of Security Eric Grosse and engineer Mayank Upadhyay present a better way to achieve stronger user identification. Read full article »

Multimedia

Silver Bullet Security Podcast with Gary McGraw

Silver Bullet Security Podcast logo

Steve Bellovin and Matt Green discuss “Crypto Wars II”
We thought the “crypto wars” were resolved in the late 1990s. But the introduction of encrypted devices — specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat — has resurfaced the debate. FBI Director Comey and other law enforcement groups are concerned about what they call “going dark” and are stressing the need for back door access (called extraordinary access). But is this really a good idea? Didn’t we already fight this battle during the first crypto wars? Matthew Green and Steve Bellovin, two authors of the recently released Keys Under Doormats paper, discuss the dangerous ramifications of this request. More podcast episodes »