WOOT '19 | A better zip bomb | David Fifield |
WOOT '19 | D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation | Jithin Pavithran, Milan Patnaik, Chester Rebeiro |
WOOT '19 | Alternative (ab)uses for HTTP Alternative Services | Trishita Tiwari, Ari Trachtenberg |
WOOT '19 | MIN()imum Failure: EMFI Attacks against USB Stacks | Colin O'Flynn |
WOOT '19 | Taking a Look into Execute-Only Memory | Marc Schink, Johannes Obermaier |
WOOT '19 | Two methods for exploiting speculative control flow hijacks | Andrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus |
WOOT '19 | Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation | Jatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui |
WOOT '19 | Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing | Dominik Maier, Benedikt Radtke, Bastian Harren |
WOOT '19 | Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO | Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim |
WOOT '19 | Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem | Fabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick |
CSET '19 | An Assessment of the Usability of Cybercrime Datasets | Ildiko Pete, Yi Ting Chua |
SOUPS 2019 | Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage | Hye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit |
SOUPS 2019 | Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional Aspects | Oshrat Ayalon, Eran Toch |
SOUPS 2019 | From Usability to Secure Computing and Back Again | Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia |
SOUPS 2019 | Personal Information Leakage by Abusing the GDPR 'Right of Access' | Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries |
SOUPS 2019 | "We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks | Abraham H. Mhaidli, Yixin Zou, Florian Schaub |
SOUPS 2019 | A Self-Report Measure of End-User Security Attitudes (SA-6) | Cori Faklaris, Laura A. Dabbish, Jason I. Hong |
SOUPS 2019 | Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies | Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang |
SOUPS 2019 | An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites | Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub |
SOUPS 2019 | The Effect of Entertainment Media on Mental Models of Computer Security | Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek |
SOUPS 2019 | Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices | Lukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt |
SOUPS 2019 | Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices | Lukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt |
SOUPS 2019 | Why people (don't) use password managers effectively | Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
SOUPS 2019 | A Typology of Perceived Triggers for End-User Security and Privacy Behaviors | Sauvik Das, Laura A. Dabbish, Jason I. Hong |
SOUPS 2019 | The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings | Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson |