SOUPS 2018 | Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens | Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten |
SOUPS 2018 | Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal | Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, Daniel Zappala |
SOUPS 2018 | User Comfort with Android Background Resource Accesses in Different Contexts | Daniel Votipka, Seth M. Rabin, Kristopher Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster |
SOUPS 2018 | Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently | Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix Freiling, Zinaida Benenson |
SOUPS 2018 | Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse | Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl |
SOUPS 2018 | "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach | Yixin Zou, Abraham H. Mhaidli, Austin McCall, Florian Schaub |
SOUPS 2017 | Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics | Casey Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas |
SOUPS 2017 | DigiTally: Piloting Offline Payments for Phones | Khaled Baqer, Ross Anderson, Lorna Mutegi, Jeunese Adrienne Payne, Joseph Sevilla |
SOUPS 2017 | Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture | Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent Seamons |
SOUPS 2017 | Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences | Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David Wagner, Nathan Good, Jung-Wei Chen |
SOUPS 2017 | How Effective is Anti-Phishing Training for Children? | Elmer Lastdrager, Inés Carvajal Gallardo, Pieter Hartel, Marianne Junger |
SOUPS 2017 | A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016 | Peter Mayer, Jan Kirchner, Melanie Volkamer |
SOUPS 2017 | Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates | Arunesh Mathur, Marshini Chetty |
SOUPS 2017 | A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing | Dan Conway, Ronnie Taib, Mitch Harris, Kun Yu, Shlomo Berkovsky, Fang Chen |
SOUPS 2017 | Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications | Elham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala |
SOUPS 2017 | Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics | Heather Crawford, Ebad Ahmadzadeh |
SOUPS 2017 | The importance of visibility for folk theories of sensor data | Emilee Rader, Janine Slaker |
SOUPS 2017 | “I feel stupid I can’t delete...”: A Study of Users’ Cloud Deletion Practices and Coping Strategies | Kopo Marvin Ramokapane, Awais Rashid, Jose Miguel Such |
SOUPS 2017 | Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions | Sonam Samat, Alessandro Acquisti |
SOUPS 2017 | New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network | Kevin Gallagher, Sameer Patil, Nasir Memon |
SOUPS 2017 | Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions | Sonam Samat, Alessandro Acquisti, Linda Babcock |
SOUPS 2017 | End User Security and Privacy Concerns with Smart Homes | Eric Zeng, Shrirang Mare, Franziska Roesner |
SOUPS 2017 | Diversify to Survive: Making Passwords Stronger with Adaptive Policies | Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek |
SOUPS 2017 | Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services | Jasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin Butler |
SOUPS 2017 | Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection | James Nicholson, Lynne Coventry, Pam Briggs |