SOUPS 2019 Poster Session

Website Maintenance Alert

Due to scheduled maintenance, the USENIX website will not be available on Tuesday, December 17, from 10:00 am to 2:00 pm Pacific Daylight Time (UTC -7). We apologize for the inconvenience.

If you are trying to register for Enigma 2020, please complete your registration before or after this time period.

The following posters will be presented at the Poster Session on Sunday, August 11, 6:00 pm–7:00 pm in the Grand Ballroom Foyer.

Unpublished Work

Posters of unpublished research.

Hidden in Plain Sight: Using Lockscreen Content for Authentication on Mobile Devices
Sarah Prange and Yasmeen Abdrabou, Bundeswehr University Munich; Lukas Mecke, University of Applied Sciences Munich; Florian Alt, Bundeswehr University Munich
Poster description PDF

Evaluating the Usefulness of Subject Access Requests
Tobias Urban, Institute for Internet Security; Westphalian University of Applied Sciences; Martin Degeling, Ruhr University Bochum; Horst Görtz Institute for IT Security; Dennis Tatang and Thorsten Holz, Ruhr-University Bochum; Horst Görtz Institute for IT Security; Norbert Pohlmann, Institute for Internet Security; Westphalian University of Applied Sciences
Poster description PDF

[Demo] TrueNews: Decentralized Photography Verification
Nathalie Dittrich and Florian Echtler, Bauhaus-Universität Weimar
Poster description PDF

Cyber Security Awareness Via Gamification: Lessons From Decisions & Disruptions
Ben Shreeve, Joseph Hallett, and Awais Rashid, University of Bristol; Richard Atkins, Metropolitan Police Service
Poster description PDF

Making Privacy Graspable: Can we Nudge Users to use Privacy Enhancing Techniques?
Christian Tiefenau, University of Bonn; Maximilian Häring and Eva Gerlitz, Fraunhofer FKIE; Emanuel von Zezschwitz, University of Bonn
Poster description PDF

On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies
Ehimare Okoyomon and Nikita Samarin, UC Berkeley; Primal Wijesekera, UC Berkeley / ICSI; Amit Elazari Bar On, UC Berkeley; Narseo Vallina-Rodriguez, IMDEA Networks Institute / ICSI; Irwin Reyes, ICSI; Alvaro Feal, IMDEA Networks Institute; Serge Egelman, ICSI / UC Berkeley
Poster description PDF

A Privacy Infrastructure for Notice and Choice in the Internet of Things
Norman Sadeh, Yuanyuan Feng, Justin Donnell, and Gaurav Misra, Carnegie Mellon University
Poster description PDF

Surviving the Cryptojungle: Perception and Management of Risk and Trust Among Cryptocurrency (Non)Users
Artemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, and Konstantin (Kosta) Beznosov, University of British Columbia
Poster description PDF

Testing A Comic-Based Privacy Policy
Reza Ghaiumy Anaraky, David Cherry, Marie Jarrell, and Bart knijnenburg, Clemson University
Poster description PDF

Seamless Interaction Across Roles
Chris Long, Sophie Kim, Chris Hill, Wole Omitowoju, Kyle Drumm, and Kevin Aranyi, Next Century
Poster description PDF

Usability Is Not the Dark Side: Secure Usable Design Seen Through Star Wars
Ann-Marie Horcher and Walter Dula, Central Michigan University
Poster description PDF

Technical Tools for Legal Consent: Do Not Track Meets the Needs of GDPR & CCPA Consent Rights
Frederik J. Zuiderveen Borgesius, Radboud University, Nijmegen & University of Amsterdam; Aleecia M. McDonald, Carnegie Mellon University
Poster description PDF

That’s Not Me! Designing Fictitious Profiles to Answer Security Questions
Nicholas Micallef, University of New South Wales; Nalin Asanka Gamagedara Arachchilage, La Trobe University, Victoria 3086, Australia
Poster description PDF

Incentives for Enabling Two-Factor Authentication in Online Gaming
Kyle Crichton, Jason Lee, and Meihan Li, Carnegie Mellon University
Poster description PDF

Should I Answer? Measuring User Responses To Anti-Robocall Application Indicators
Imani N. Sherman, Jasmine D. Bowers, Keith McNamara Jr., Juan Gilbert, and Patrick Traynor, University of Florida
Poster description PDF

Messaging Campaigns for Motivating Users to Adopt Duo at a University
Elham Al Qahtani and Mohamed Shehab, University of North Carolina at Charlotte
Poster description PDF

On Smartphone Users' Perception of Smart Lock for Android
Masoud Mehrabi Koushki and Borke Obada-Obieh, University of British Columbia; Jun Ho Huh, Samsung Electronics; Konstantin (Kosta) Beznosov, University of British Columbia
Poster description PDF

"Please enter your PIN"—On the Risk of Bypass Attacks on Biometric Authentication on Mobile Devices
Christian Tiefenau, University of Bonn; Maximilian Häring, Fraunhofer FKIE; Mohamed Khamis, University of Glasgow; Emanuel von Zezschwitz, University of Bonn, Fraunhofer FKIE
Poster description PDF

Choose Your Own Hacking Adventure: Contextualized Storytelling to Enhance Security Education and Training
Ersin Dincelli, University of Colorado Denver; InduShobha Chengalur Smith, University at Albany, SUNY
Poster description PDF

Studying Passwords to Create Domain-Specific Blacklists
Kentrell Owens, Mengchen Yong, Neha Sridhar, Ziheng Ni, Joshua Tan, and Lorrie Faith Cranor, Carnegie Mellon University
Poster description PDF

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, and Michael Hicks, University of Maryland
Poster description PDF

The Enduring Mystery of the Repeat Clickers
Matthew Canham, Michael Constantino, Stephen Fiore, Bruce Caulkins, and Lauren Reinerman-Jones, University of Central Florida
Poster description PDF

Perceptions of Smart Home Privacy and Security Responsibility, Concerns, and Mitigations
Julie M. Haney and Susanne Furman, National Institute of Standards and Technology; Yasemin Acar, University of Hannover; Mary Theofanos, National Institute of Standards and Technology
Poster description PDF

TrueNews: Decentralized Photography Verification
Nathalie J. Dittrich and Florian Echtler, Bauhaus-Universität Weimar
Poster description PDF

Privacy Implications of Assistive Tools for Visually Impaired People
Taslima Akter and Bryan Dosono, Student; Tousif Ahmed, Post-doc; Apu Kapadia, Associate Professor; Bryan Semaan, Assistant Professor
Poster description PDF

Do Stories Help People Adopt Two-factor Authentication
Chris Fennell and Rick Wash, Michigan State University
Poster description PDF

Ongoing Research: Trust in Automation in the Context of Privacy
Alina Stöver, Technische Universität Darmstadt
Poster description PDF

Emokey: Tangible Online Authentication Interface for Novice Users in a Low-resourced Community
Saebom April Kwon, Chetan Keshav, Florian Schaub, and Tawanna Dillahunt, School of Information, University of Michigan
Poster description PDF

Is Two Better Than One? Extending Android Unlock Patterns to Utilize Multiple Patterns
Tim Forman, United States Naval Academy; Adam J. Aviv, The George Washington University
Poster description PDF

A Closer Look at Account Sharing: How Sharing Ends, Why, & What Makes it Hard?
Borke Obada-Obieh, Yue Huang, and Konstantin (Kosta) Beznosov, University of British Columbia
Poster description PDF

Security Implications of Online Accessibility Obstacles for Users with Visual Impairments
Daniela Napoli, Khadija Baig, Paulina Chametka, and Sonia Chiasson, Carleton University
Poster description PDF

Do You Get What You Pay For? Comparing the Privacy Behaviors of Free vs. Paid Apps
Catherine Han, University of California, Berkeley; Irwin Reyes, International Computer Science Institute; Amit Elazari Bar On, University of California, Berkeley; Joel Reardon, University of Calgary; Alvaro Feal, IMDEA Networks Institute; Kenneth A. Bamberger, University of California, Berkeley; Serge Egelman, International Computer Science Institute / University of California, Berkeley; Narseo Vallina-Rodriguez, IMDEA Networks Institute / International Computer Science Institute
Poster description PDF

Bug Bounty Hunter, Red Teamer, or Pen tester? A Closer Look at the Roles of Security Teams in Vulnerability Discovery
Noura Alomar, University of California, Berkeley; Primal Wijesekera and Serge Egelman, University of California, Berkeley and International Computer Science Institute; Edward Qiu and Amit Elazari, University of California, Berkeley
Poster description PDF

A Case Study on (Security) Update Processes in Working Environments: Understanding the Context
Maximilian Häring, Fraunhofer FKIE; Christian Tiefenau, University of Bonn; Eva Gerlitz, Fraunhofer FKIE; Ronald Brenner and Emanuel von Zezschwitz, University of Bonn
Poster description PDF

Designing a Smartphone Interface Causing Discomfort for Awareness of Risks
Ami Otsuka, Tsuda University; Yasuhiro Fujihara, Hyogo College of Medicine; Yuko Murayama and Tatsuya Aoyagi, Tsuda University
Poster description PDF

Published Work

Posters of usable security papers published recently at other venues.

‘Internet of Things’: how abuse is getting smarter
Isabel Lopez-Neira, Trupti Patel, Simon Parkin, and Leonie Tanczer, University College London
Poster description PDF (external site)

On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials
Peter Mayer, Karlsruhe Institute of Technology; Christian Schwartz, usd AG; Melanie Volkamer, Karlsruhe Institute of Technology
Poster description PDF (external site)

"What was that site doing with my Facebook password?" Designing Password-Reuse Notifications
Miranda Wei, University of Chicago; Maximilian Golla, Ruhr University Bochum; Juliette Hainline and Lydia Filipe, University of Chicago; Markus Dürmuth, Ruhr University Bochum; Elissa Redmiles, University of Maryland; Blase Ur, University of Chicago
Poster description PDF (external site)

Beware the Downgrading of Secure Electronic Mail
Oliver Wiese, Joscha Lausch, Jakob Bode, and Volker Roth, Freie Universität Berlin
Poster description PDF (external site)

Privacy Attitudes of Smart Speaker Users
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner, University of California, Berkeley
Poster description PDF (external site)