obren.io / curated reads

History of Security & Privacy in 137 Chapters

About

  • This is a curated and experimental site, offering historical and visual index of all collected sources.
  • The site does not host any of the files. It only provides an index and links to full text files.
  • Full text of many sources is behind a paywall. You may need to obtain a subscription to read full text.

Latest Issue

2025
2025, no. 5: Generative AI

Latest Issue:
Generative AI

  • Employee Privacy Protection in Enterprise Generative Artificial Intelligence Deployment
  • Cyber Ranges: Five Use Cases for Improving Cybersecurity Skills Development in Organizations
  • Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
  • Anonymization Did Not Fail: Misconceptions and Overstatements on Data Anonymization Failures
  • ThreatScout: Automated Threat Hunting Solution Using Machine Reasoning
  • ...

History

·
2024
2024, no. 5: Inclusive Privacy and Security

A Year Ago:
Inclusive Privacy and Security

  • The Art of Inclusive Gamification in Cybersecurity Training
  • Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study
  • It's Still Complicated: From Privacy-Invasive Parental Control to Teen-Centric Solutions for Digital Resilience
  • Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things
  • Inclusive Privacy and Security
  • ...
·
·
·
·
2020
2020, no. 5: Hardware-Assisted Security

5 Years Ago:
Hardware-Assisted Security

  • Is Hardware More Secure Than Software?
  • Confronting the Limitations of Hardware-Assisted Security
  • Building Open Trusted Execution Environments
  • Built-In Cybersecurity: Insights Into Product Security for Cyberphysical Systems at a Large Company
  • Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble
  • ...
·
·
·
·
·
2015
2015, no. 5: Economics of Cybersecurity, Part 1

10 Years Ago:
Economics of Cybersecurity, Part 1

  • What's New in the Economics of Cybersecurity?: Observational and Empirical Studies
  • IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation
  • Securing Cloud-Based Applications, Part 1
  • Economics of Fighting Botnets: Lessons from a Decade of Mitigation
  • Autonomy, Robotics, and Dependability
  • ...
·
·
·
·
·
2010
2010, no. 5: Embedded Systems Reliability

15 Years Ago:
Embedded Systems Reliability

  • Not So Great Expectations: Why Application Markets Haven't Failed Security
  • Do the Luddites Ever Win?
  • Kernel Service Protection for Client Security
  • Necessary but Not Sufficient
  • Roundtable: Reliability of Embedded and Cyber-Physical Systems
  • ...
·
·
·
·
·
2005
2005, no. 5: The Value of Privacy

20 Years Ago:
The Value of Privacy

  • When Is a Product a Security Product?
  • Biometric Security Solutions
  • Trends in Process Control Systems Security
  • Exploring a National Cybersecurity Exercise for Universities
  • Finding Faults
  • ...
·
·
·
2003
2003, no. 1: Fact over Fiction

Premiere Issue:
Fact over Fiction

  • What Is Computer Security?
  • A Critical Need, An Ambitious Mission, A New Magazine
  • Software Security for Open-Source Systems
  • AI Bites Man?
  • Copyright Extension: Eldred v. Ashcroft
  • ...