Papers

Search results

    ConferenceTitleAuthor(s)
    CSET '20UBCIS: Ultimate Benchmark for Container Image ScanningShay Berkovich, Jeffrey Kam, Glenn Wurster
    CSET '20HAI 1.0: HIL-based Augmented ICS Security DatasetHyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim
    CSET '20Towards Adversarial Phishing DetectionThomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen
    CSET '20Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)Kayla Afanador, Cynthia Irvine
    CSET '20Toward Orchestration of Complex Networking ExperimentsAlefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel
    CSET '20APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack SequencesYusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka
    CSET '20ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security ResourceBenjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince, David Hutchison
    SOUPS 2020Passworld: A Serious Game to Promote Password Awareness and Diversity in an EnterpriseGokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Premsukh Lodha, Sankalp Suneel Pandit
    SOUPS 2020User Mental Models of Cryptocurrency Systems - A Grounded Theory ApproachAlexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar Weippl, Katharina Krombholz
    SOUPS 2020Knock, Knock. Who’s There? On the Security of LG’s Knock CodesRaina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu
    SOUPS 2020How Risky Are Real Users' IFTTT Applets?Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, Limin Jia
    SOUPS 2020From Intent to Action: Nudging Users Towards Secure Mobile PaymentsPeter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub
    SOUPS 2020Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and AffectAgnieszka Kitkowska, Mark Warner, Yefim Shulman, Erik Wästlund, Leonardo A. Martucci
    SOUPS 2020An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software DevelopmentHernan Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, Xinming Ou
    SOUPS 2020"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the WildNoura Alomar, Primal Wijesekera, Edward Qiu, Serge Egelman
    SOUPS 2020Towards Understanding Privacy and Trust in Online Reporting of Sexual AssaultBorke Obada-Obieh, Lucrezia Spagnolo, Konstantin Beznosov
    SOUPS 2020Blind and Human: Exploring More Usable Audio CAPTCHA DesignsValerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, Sauvik Das
    SOUPS 2020Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home CamerasGeorge Chalhoub, Ivan Flechais, Norbert Nthala, Ruba Abu-Salma
    SOUPS 2020An Empirical Study of Wireless Carrier Authentication for SIM SwapsKevin Lee, Benjamin Kaiser, Jonathan Mayer, Arvind Narayanan
    SOUPS 2020“You still use the password after all” – Exploring FIDO2 Security Keys in a Small CompanyFlorian M. Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, Markus Dürmuth
    SOUPS 2020Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System AdministratorsChristian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz
    SOUPS 2020Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian PopulationsJayati Dev, Pablo Moriano, L. Jean Camp
    SOUPS 2020Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing HistoriesSarah Bird, Ilana Segall, Martin Lopatka
    SOUPS 2020Usable Sexurity: Studying People’s Concerns and Strategies When SextingChristine Geeng, Jevan Hutson, Franziska Roesner
    SOUPS 2020"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-PerceptionsEmilee Rader, Samantha Hautea, Anjali Munasinghe

Pages