Conferences

Search results

    TitleConferenceSpeaker(s)
    "All of them claim to be the best": Multi-perspective study of VPN users and VPN providersUSENIX Security '23Reethika Ramesh, Anjali Vyas, Roya Ensafi
    GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMIUSENIX Security '23Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu
    Device Tracking via Linux’s New TCP Source Port Selection AlgorithmUSENIX Security '23Moshe Kol, Amit Klein, Yossi Gilad
    The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real EstateUSENIX Security '23Rachel McAmis, Tadayoshi Kohno
    PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov ModelsUSENIX Security '23Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang
    Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt BinariesUSENIX Security '23Haohuang Wen, Zhiqiang Lin
    Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice AttacksUSENIX Security '23Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu
    FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modulesUSENIX Security '23Ioannis Angelakopoulos, Gianluca Stringhini, Manuel Egele
    Decisions and Disruptions 2: Decide HarderSOUPS 2023
    Towards a more effective system for training tier 1 SOC analystsSOUPS 2023
    Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality: A Replication Study Proposal in the USSOUPS 2023
    De-identification in practice: professionals as end usersSOUPS 2023
    Lessons Learned in Communicating Differential Privacy to Data SubjectsSOUPS 2023
    TAM is not SAM: Acceptance of Security TechnologySOUPS 2023
    Getting the Message Out: Considering a Connected Products Transparency FrameworkSOUPS 2023
    Look before you Link: Privacy Risk Inspection of Open Data through a Visual Analytic WorkflowSOUPS 2023
    Lacking the Tools and Support to Fix Friction: Results from an Interview Study with Security ManagersSOUPS 2023Jonas Hielscher, Markus Schöps, Uta Menges, Marco Gutfleisch, Mirko Helbling, M. Angela Sasse
    Iterative Design of An Accessible Crypto Wallet for Blind UsersSOUPS 2023Zhixuan Zhou, Tanusree Sharma, Luke Emano, Sauvik Das, Yang Wang
    Understanding the Viability of Gmail's Origin Indicator for Identifying the SenderSOUPS 2023Enze Liu, Lu Sun, Alex Bellon, Grant Ho, Geoffrey M. Voelker, Stefan Savage, Imani N. S. Munyaka
    Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information SecuritySOUPS 2023Eva Gerlitz, Maximilian Häring, Matthew Smith, Christian Tiefenau
    Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security AdviceSOUPS 2023Lorenzo Neil, Harshini Sri Ramulu, Yasemin Acar, Bradley Reaves
    ImageAlly: A Human-AI Hybrid Approach to Support Blind People in Detecting and Redacting Private Image ContentSOUPS 2023Zhuohao (Jerry) Zhang, Smirity Kaushik, JooYoung Seo, Haolin Yuan, Sauvik Das, Leah Findlater, Danna Gurari, Abigale Stangl, Yang Wang
    Investigating Security Indicators for Hyperlinking Within the MetaverseSOUPS 2023Maximiliane Windl, Anna Scheidle, Ceenu George, Sven Mayer
    Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is LostSOUPS 2023Eva Gerlitz, Maximilian Häring, Charlotte Theresa Mädler, Matthew Smith, Christian Tiefenau
    SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable SecuritySOUPS 2023Anna-Marie Ortloff, Christian Tiefenau, Matthew Smith

Pages