Security on Tap

May/June 2015

IEEE Security & Privacy magazine cover

In This Issue

This issue of IEEE Security & Privacy features articles on improving security with diversity, better cryptographic security protocols, and a new identity management model for pervasive computing environments. It also highlights the challenges of establishing cybersecurity in India and examines attacks specific to manufacturing machine parts and intelligent transport systems.

From the Editors

If we hope to provide an Internet of Things that's useful, we must understand users' privacy expectations of their smart devices and the environment in which they operate. Samsung's Smart TV situation throws that into clear relief. Read full article »

About IEEE Security & Privacy

IEEE Security & Privacy magazine provides articles with both a practical and research bent by the top thinkers in the field along with case studies, tutorials, columns, and in-depth interviews and podcasts for the information security industry.

Articles from IEEE Security & Privacy

Weakness in Depth: A Voting Machine's Demise

Weakness in Depth: A Voting Machine's Demise

Every voting system examined over the past decade has had severe security vulnerabilities, with some even allowing complete exploitation over a Wi-Fi network. The combination of vulnerabilities exhibits "weakness in depth," rather than the "defense in depth" frequently suggested as a model. Read full article »

Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2--Defenders and Victims

Understanding Cybercrime from Its Stakeholders' Perspectives: Part 2--Defenders and Victims

A comprehensive model and taxonomy of cybercrime, including all of its stakeholders, would contribute to better cybersecurity. Part 2 focuses on defenders and victims of cybercrime. Read full article »


Authentication at Scale

Arguing that it's time to give up on elaborate password rules, Google Vice President of Security Eric Grosse and engineer Mayank Upadhyay present a better way to achieve stronger user identification. Read full article »


Silver Bullet Security Podcast with Gary McGraw

Silver Bullet Security Podcast logo

Steve Bellovin and Matt Green discuss “Crypto Wars II”
We thought the “crypto wars” were resolved in the late 1990s. But the introduction of encrypted devices — specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat — has resurfaced the debate. FBI Director Comey and other law enforcement groups are concerned about what they call “going dark” and are stressing the need for back door access (called extraordinary access). But is this really a good idea? Didn’t we already fight this battle during the first crypto wars? Matthew Green and Steve Bellovin, two authors of the recently released Keys Under Doormats paper, discuss the dangerous ramifications of this request. More podcast episodes »