Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '19A better zip bombDavid Fifield
    WOOT '19D-TIME: Distributed Threadless Independent Malware Execution for Runtime ObfuscationJithin Pavithran, Milan Patnaik, Chester Rebeiro
    WOOT '19Alternative (ab)uses for HTTP Alternative ServicesTrishita Tiwari, Ari Trachtenberg
    WOOT '19MIN()imum Failure: EMFI Attacks against USB StacksColin O'Flynn
    WOOT '19Taking a Look into Execute-Only MemoryMarc Schink, Johannes Obermaier
    WOOT '19Two methods for exploiting speculative control flow hijacksAndrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus
    WOOT '19Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream ManipulationJatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui
    WOOT '19Unicorefuzz: On the Viability of Emulation for Kernelspace FuzzingDominik Maier, Benedikt Radtke, Bastian Harren
    WOOT '19Who Spent My EOS? On the (In)Security of Resource Management of EOS.IOSangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim
    WOOT '19Vacuums in the Cloud: Analyzing Security in a Hardened IoT EcosystemFabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick
    CSET '19An Assessment of the Usability of Cybercrime DatasetsIldiko Pete, Yi Ting Chua
    SOUPS 2019Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record LinkageHye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit
    SOUPS 2019Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional AspectsOshrat Ayalon, Eran Toch
    SOUPS 2019From Usability to Secure Computing and Back AgainLucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
    SOUPS 2019Personal Information Leakage by Abusing the GDPR 'Right of Access'Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries
    SOUPS 2019"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer RisksAbraham H. Mhaidli, Yixin Zou, Florian Schaub
    SOUPS 2019A Self-Report Measure of End-User Security Attitudes (SA-6)Cori Faklaris, Laura A. Dabbish, Jason I. Hong
    SOUPS 2019Cooperative Privacy and Security: Learning from People with Visual Impairments and Their AlliesJordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang
    SOUPS 2019An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 WebsitesHana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub
    SOUPS 2019The Effect of Entertainment Media on Mental Models of Computer SecurityKelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek
    SOUPS 2019Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile DevicesLukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt
    SOUPS 2019Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen DevicesLukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt
    SOUPS 2019Why people (don't) use password managers effectivelySarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
    SOUPS 2019A Typology of Perceived Triggers for End-User Security and Privacy BehaviorsSauvik Das, Laura A. Dabbish, Jason I. Hong
    SOUPS 2019The Fog of Warnings: How Non-essential Notifications Blur with Security WarningsAnthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson

Pages