SOUPS 2018 | When is a Tree Really a Truck? Exploring Mental Models of Encryption | Justin Wu, Daniel Zappala |
SOUPS 2018 | The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians | Elham Al Qahtani, Mohamed Shehab, Abrar Aljohani |
SOUPS 2018 | Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens | Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten |
SOUPS 2018 | Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal | Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, Daniel Zappala |
SOUPS 2018 | User Comfort with Android Background Resource Accesses in Different Contexts | Daniel Votipka, Seth M. Rabin, Kristopher Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster |
SOUPS 2018 | Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently | Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix Freiling, Zinaida Benenson |
SOUPS 2017 | Folk Risk Analysis: Factors Influencing Security Analysts’ Interpretation of Risk | |
SOUPS 2017 | The Shadow Warriors: In the no man’s land between industrial control systems and enterprise IT systems | |
SOUPS 2017 | Skills and Characteristics of Successful Cybersecurity Advocates | |
SOUPS 2017 | A Proposed Visualization for Vulnerability Scan Data | |
SOUPS 2017 | Ask Me Anything: A Conversational Interface to Augment Information Security Workers | |
SOUPS 2017 | Comparing Educational Approaches to Secure programming: Tool vs. TA | |
SOUPS 2017 | Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities | |
SOUPS 2017 | Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe | |
SOUPS 2017 | Formal Mental Models for Inclusive Privacy and Security | |
SOUPS 2017 | You Want Me To Do What? A Design Study of Two-Factor Authentication Messages | |
SOUPS 2017 | Smartwatches Locking Methods: A Comparative Study | |
SOUPS 2017 | A Gamified Approach to Improve Users’ Memorability of Fall-back Authentication | |
SOUPS 2017 | On the Design of Distributed Adaptive Authentication Systems | |
SOUPS 2017 | Touchscreen Biometrics Across Multiple Devices | |
SOUPS 2017 | Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques | |
SOUPS 2017 | Augmenting Centralized Password Management with Application-Specific Passwords | |
SOUPS 2017 | "I want my money back!" Limiting Online Password-Guessing Financially | |
SOUPS 2017 | Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics | Casey Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas |
SOUPS 2017 | DigiTally: Piloting Offline Payments for Phones | Khaled Baqer, Ross Anderson, Lorna Mutegi, Jeunese Adrienne Payne, Joseph Sevilla |