SOUPS 2018 Poster Session

The following posters will be presented at the Poster Session on Sunday, August 12, 6:00 pm–7:00 pm in the Grand Ballroom Foyer.

Unpublished Work

Posters of unpublished research.

Visual Analysis of Photo Policy Misconfigurations Using Treemaps
Yousra Javed, Illinois State University; Mohamed Shehab, University of North Carolina Charlotte
Poster description PDF

Helping Johnny to Search: Encrypted Search on Webmail System
Tatsuya Midorikawa, Akihiro Tachikawa, and Akira Kanaoka, Toho University
Poster description PDF

Adapting the Transtheoretical Model for the Design of Security Interventions
Cori Faklaris, Laura Dabbish, and Jason Hong, Carnegie Mellon University
Poster description PDF

"Alexa, Stop Recording'': Mismatches between Smart Speaker Privacy Controls and User Needs
Josephine Lau, Benjamin Zimmerman, and Florian Schaub, University of Michigan
Poster description PDF

Profit loss for website administrators due to HTTPS misconfiguration
Tetsuya Okuda, Koha Kinjo, Kazuhiro Hayakawa, Toshinori Fukunaga, Ayako Hasegawa, and Mitsuaki Akiyama, NTT Secure Platform Laboratories
Poster description PDF

An Investigation of the Opt-Out State for Online Behavioral Advertising
Takahito Sakamoto, Naoki Watanabe, and Masahiro Matsunaga, Secom Co., Ltd.
Poster description PDF

The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-)Configurations
Christian Tiefenau and Emanuel von Zezschwitz, University of Bonn
Poster description PDF

Emotional Impact: How Stories Affect Password Behavior
Chris Fennell and Rick Wash, Michigan State University
Poster description PDF

Taking Student Data for Granted? A Multi-Stakeholder Privacy Analysis of a Learning Analytics System
Kaiwen Sun, Abraham H. Mhaidli, Sonakshi Watel, Christoper Brooks, and Florian Schaub, University of Michigan School of Information
Poster description PDF

Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies
Karoline Busse, University of Bonn; Dominik Wermke, Leibniz University of Hannover; Sabrina Amft, University of Bonn; Sascha Fahl, Ruhr-University Bochum; Emanuel von Zezschwitz and Matthew Smith, University of Bonn
Poster description PDF

Understanding the Propensity of Password Creation: Comparative Analysis of Three Language Spheres
Keika Mori, Yunao Zhou, and Tatsuya Mori, Waseda University
Poster description PDF

Heuristics for Assessing the Effective Control of Personal Data by Mobile Applications’ Users
Patrice Pena, I3S; Alain Giboin, Inria; Karima Boudaoud and Yoann Bertrand, I3S; Fabien Gandon, Inria
Poster description PDF

Introduction to the National Security Agency's Annual Paper Competition
Adam Tagert, National Security Agency
Poster description PDF

Redmorph Usability Study
Clare Lai, Jianlan Zhu, Sharada Boda, and Ting Lu, Carnegie Mellon University
Poster description PDF

Genomes On Demand: User Attitudes On Commercial DNA Testing
Debjani Saha, Brook Stacy, Kiran Javkar, Sushant Patkar, and Michelle L. Mazurek, University of Maryland, College Park
Poster description PDF

Co-Designing with Children to Address “Stranger Danger” on Musical.ly
Karla Badillo-Urquiola, University of Central Florida; Diva Smriti, Brenna McNally, Elizabeth Bonsignore, and Evan Golub, University of Maryland; Pamela Wisniewski, University of Central Florida
Poster description PDF

"Beacons Collect Information from Users'': Unpacking People's Misunderstandings of Bluetooth Beacon Technology
Yaxing Yao, Yun Huang, Yang Wang, Syracuse University
Poster description PDF

Making Retrospective Data Management Usable
Noah Hirsch, University of Chicago; Chris Kanich and Mohammad Taha Khan, University of Illinois at Chicago; Xuefeng Liu, Mainack Mondal, and Michael Tang, University of Chicago; Christopher Tran, University of Illinois at Chicago; Blase Ur, William Wang, and Günce Su Yılmaz, University of Chicago; Elena Zheleva, University of Illinois at Chicago
Poster description PDF

Privacy Support for Facebook: Empowering Users to Better Control Their Privacy
Moses Namara, Clemson University; Henry Sloan, Nyack High School, Nyack, NY, USA; Priyanka Jaiwal and Bart P. Knijnenburg, Clemson University
Poster description PDF

"I Tried to Buy Drugs Online Using Crypto but Failed": Understanding the Usability & Perceptions of Bitcoin
Chelse Swoopes, Daniel Stiffler, Saksham Chitkara, David Edelstein, and Lorrie Cranor, Carnegie Mellon University
Poster description PDF

Published Work

Posters of usable security papers published recently at other venues.

Keeping a Low Profile? Technology, Risk, and Privacy among Undocumented Immigrants
Tamy Guberek, Allison McDonald, Sylvia Simioni, Abraham Mhaidli, Kentaro Toyama, and Florian Schaub, University of Michigan
Poster description PDF (external site)

rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System
Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, and Wenke Lee, Georgia Institute of Technology
Poster description PDF (external site)

Work in Progress: Usable Security vs. Workflow Realities
Jim Blythe, Information Sciences Institute, University of Southern California; Vijay Kothari and Sean Smith, Dartmouth College; Ross Koppel, University of Pennsylvania
Poster description PDF (external site)

Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes
Daniel Votipka, Rock A. Stevens, Elissa M. Redmiles, Jeremy Hu, and Michelle L. Mazurek, University of Maryland
Poster description PDF (external site)

Understanding Users' Decision of Clicking on Posts in Facebook with Implications for Phishing
Sovantharith Seng, Rochester Institute of Technology; Mahdi Nasrullah Al-Ameen, Clemson University; Matthew Wright, Rochester Institute of Technology
Poster description PDF (external site)

How Do We Talk Ourselves Into These Things? Challenges with Adoption of Biometric Authentication for Expert and Non-Expert Users
Flynn Wolf and Ravi Kuber, UMBC; Adam J. Aviv, USNA
Poster description PDF (external site)

Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts
Shruti Sannon, Natalya N. Bazarova, and Dan Cosley, Cornell University
Poster description PDF (external site)

Addressing Misconceptions About Password Security Effectively
Peter Mayer and Melanie Volkamer, Karlsruhe Institute of Technology
Poster description PDF (external site)

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes
Ameya Hanamsagar, USC/ISI; Simon S. Woo, SUNY, Korea; Chris Kanich, U of I, Chicago; Jelena Mirkovic, USC/ISI
Poster description PDF (external site)

A Survey of the Privacy Preferences and Practices of Iranian Users of Telegram
Elham Vaziripour, Reza Farahbakhsh, Mark O’Neill, Justin Wu, Kent Seamons, and Daniel Zappala, Brigham Young University
Poster description PDF (external site)

Understanding User Tradeoffs for Search in Encrypted Communication
Wei Bai, Ciara Lynton, Charalampos (Babis) Papamanthou, and Michelle L. Mazurek, University of Maryland, College Park
Poster description PDF (external site)

Let's go in for a closer look: Observing passwords in their natural habitat
Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University; Serge Egelman, International Computer Science Institute; Alain Forget, Google, Inc.
Poster description PDF (external site)

"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Oksana Kulyk, SECUSO, Karlsruhe Institute of Technology; Annika Hilt, SECUSO, Technische Universität Darmstadt; Nina Gerber and Melanie Volkamer, SECUSO, Karlsruhe Institute of Technology
Poster description PDF (external site)

Contextualizing Privacy Decisions for Better Prediction (and Protection)
Primal Wijesekera, University of California, Berkeley, International Computer Science Institute; Joel Reardon, University of Calgary, Calgary; Irwin Reyes, International Computer Science Institute; Lynn Tsai, University of California, Berkeley; Jung-Wei Chen and Nathan Good, Good Research; David Wagner, University of California, Berkeley.; Konstantin Beznosov, University of British Columbia, Vancouver.; Serge Egelman, University of California, Berkeley, International Computer Science Institute
Poster description PDF (external site)

“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale
Irwin Reyes, International Computer Science Institute; Primal Wijesekera, University of California, Berkeley, International Computer Science Institute; Joel Reardon, University of Calgary; Amit Elazari Bar On, University of California - Berkeley; Abbas Razaghpanah, Stony Brook University; Narseo Vallina Rodriguez, International Computer Science Institute, IMDEA Networks; Serge Egelman, International Computer Science Institute, University of California - Berkeley
Poster description PDF (external site)

It's Not Actually that Horrible: Exploring Adoption of Two-Factor Authentication at a University
Jessica Colnago, Carnegie Mellon University; Summer Devlin, University of California, Berkeley; Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Cranor, and Nicolas Christin, Carnegie Mellon University
Poster description PDF (external site)

Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?
Brooke Bullek, Stephanie Garboski, Darakhshan J. Mir, and Evan M. Peck, Bucknell University
Poster description PDF (external site)

User Perception and Expectations on Deleting Instant Messages —or— “What Happens If I Press This Button?”
Theodor Schnitzler, Christine Utz, and Florian M. Farke, Ruhr-Universität Bochum; Christina Pöpper, New York University Abu Dhabi; Markus Dürmuth, Ruhr-Universität Bochum
Poster description PDF (external site)

User-Tailored Privacy by Design (Work in Progress)
Daricia Wilkinson, Saadhika Sivakumar, David Cherry, and Bart P. Knijnenburg, Clemson University; Elaine M. Raybourn, Sandia National Laboratories; Pamela Wisniewski, The University of Central Florida; Henry Sloan, Nyack High School
Poster description PDF (external site)

Balancing Privacy and Information Disclosure in Interactive Record Linkage with Visual Masking
Eric Ragan, Hye-Chung Kum, Gurudev Ilangovan, and Han Wang, Texas A&M University
Poster description PDF (external site)