Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2020An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive ProcessesSteffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar
    SOUPS 2019Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record LinkageHye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit
    SOUPS 2019Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional AspectsOshrat Ayalon, Eran Toch
    SOUPS 2019From Usability to Secure Computing and Back AgainLucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
    SOUPS 2019Personal Information Leakage by Abusing the GDPR 'Right of Access'Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries
    SOUPS 2019"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer RisksAbraham H. Mhaidli, Yixin Zou, Florian Schaub
    SOUPS 2019A Self-Report Measure of End-User Security Attitudes (SA-6)Cori Faklaris, Laura A. Dabbish, Jason I. Hong
    SOUPS 2019Cooperative Privacy and Security: Learning from People with Visual Impairments and Their AlliesJordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang
    SOUPS 2019An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 WebsitesHana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub
    SOUPS 2019The Effect of Entertainment Media on Mental Models of Computer SecurityKelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek
    SOUPS 2019Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile DevicesLukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt
    SOUPS 2019Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen DevicesLukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt
    SOUPS 2019Why people (don't) use password managers effectivelySarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    SOUPS 2019A Typology of Perceived Triggers for End-User Security and Privacy BehaviorsSauvik Das, Laura A. Dabbish, Jason I. Hong
    SOUPS 2019The Fog of Warnings: How Non-essential Notifications Blur with Security WarningsAnthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson
    SOUPS 2019“There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness DataAbdulmajeed Alqhatani, Heather Richter Lipford
    SOUPS 2019Certified Phishing: Taking a Look at Public Key Certificates of Phishing WebsitesVincent Drury, Ulrike Meyer
    SOUPS 2019Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and AdviceKaroline Busse, Julia Schäfer, Matthew Smith
    SOUPS 2019Usability Smells: An Analysis of Developers’ Struggle With Crypto LibrariesNikhil Patnaik, Joseph Hallett, Awais Rashid
    SOUPS 2019Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience SamplingStéphane Ciolino, Simon Parkin, Paul Dunphy
    SOUPS 2019System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall InterfacesArtem Voronkov, Leonardo A. Martucci, Stefan Lindskog
    SOUPS 2019"I don't own the data": End User Perceptions of Smart Home Device Data Practices and RisksMadiha Tabassum, Tomasz Kosinski, Heather Richter Lipford
    SOUPS 2019"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in SignalJustin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Daniel Zappala, Kent Seamons
    SOUPS 2019A Usability Study of Five Two-Factor Authentication MethodsKen Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, Kent Seamons
    SOUPS 2019More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal AssistantsNoura Abdi, Kopo M. Ramokapane, Jose M. Such

Pages