SOUPS 2020 | An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes | Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar |
SOUPS 2019 | Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage | Hye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit |
SOUPS 2019 | Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional Aspects | Oshrat Ayalon, Eran Toch |
SOUPS 2019 | From Usability to Secure Computing and Back Again | Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia |
SOUPS 2019 | Personal Information Leakage by Abusing the GDPR 'Right of Access' | Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries |
SOUPS 2019 | "We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks | Abraham H. Mhaidli, Yixin Zou, Florian Schaub |
SOUPS 2019 | A Self-Report Measure of End-User Security Attitudes (SA-6) | Cori Faklaris, Laura A. Dabbish, Jason I. Hong |
SOUPS 2019 | Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies | Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang |
SOUPS 2019 | An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites | Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub |
SOUPS 2019 | The Effect of Entertainment Media on Mental Models of Computer Security | Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek |
SOUPS 2019 | Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices | Lukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt |
SOUPS 2019 | Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices | Lukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt |
SOUPS 2019 | Why people (don't) use password managers effectively | Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
SOUPS 2019 | A Typology of Perceived Triggers for End-User Security and Privacy Behaviors | Sauvik Das, Laura A. Dabbish, Jason I. Hong |
SOUPS 2019 | The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings | Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson |
SOUPS 2019 | “There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness Data | Abdulmajeed Alqhatani, Heather Richter Lipford |
SOUPS 2019 | Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites | Vincent Drury, Ulrike Meyer |
SOUPS 2019 | Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice | Karoline Busse, Julia Schäfer, Matthew Smith |
SOUPS 2019 | Usability Smells: An Analysis of Developers’ Struggle With Crypto Libraries | Nikhil Patnaik, Joseph Hallett, Awais Rashid |
SOUPS 2019 | Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling | Stéphane Ciolino, Simon Parkin, Paul Dunphy |
SOUPS 2019 | System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces | Artem Voronkov, Leonardo A. Martucci, Stefan Lindskog |
SOUPS 2019 | "I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks | Madiha Tabassum, Tomasz Kosinski, Heather Richter Lipford |
SOUPS 2019 | "Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal | Justin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Daniel Zappala, Kent Seamons |
SOUPS 2019 | A Usability Study of Five Two-Factor Authentication Methods | Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, Kent Seamons |
SOUPS 2019 | More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants | Noura Abdi, Kopo M. Ramokapane, Jose M. Such |