Search results

    WOOT '19Who Spent My EOS? On the (In)Security of Resource Management of EOS.IOSangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim
    CSET '19Evaluating the Long-term Effects of Parameters on the Characteristics of the Tranco Top Sites RankingVictor Le Pochat, Tom Van Goethem, Wouter Joosen
    WOOT '19Taking a Look into Execute-Only MemoryMarc Schink, Johannes Obermaier
    CSET '19A Multi-level Fidelity Microgrid Testbed Model for Cybersecurity ExperimentationAditya Ashok, Siddharth Sridhar, Tamara Becejac, Theora Rice, Matt Engels, Scott Harpool, Mark Rice, Thomas Edgar
    WOOT '19Alternative (ab)uses for HTTP Alternative ServicesTrishita Tiwari, Ari Trachtenberg
    WOOT '19Automatic Wireless Protocol Reverse EngineeringJohannes Pohl, Andreas Noack
    CSET '19Lessons Learned from 10k Experiments to Compare Virtual and Physical TestbedsJonathan Crussell, Thomas M. Kroeger, David Kavaler, Aaron Brown, Cynthia Phillips
    WOOT '19Unicorefuzz: On the Viability of Emulation for Kernelspace FuzzingDominik Maier, Benedikt Radtke, Bastian Harren
    WOOT '19D-TIME: Distributed Threadless Independent Malware Execution for Runtime ObfuscationJithin Pavithran, Milan Patnaik, Chester Rebeiro
    SOUPS 2019Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record LinkageHye-Chung Kum, Eric D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, Cason Schmit
    SOUPS 2019Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional AspectsOshrat Ayalon, Eran Toch
    SOUPS 2019From Usability to Secure Computing and Back AgainLucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
    SOUPS 2019Personal Information Leakage by Abusing the GDPR 'Right of Access'Mariano Di Martino, Pieter Robyns, Winnie Weyts, Peter Quax, Wim Lamotte, Ken Andries
    SOUPS 2019"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer RisksAbraham H. Mhaidli, Yixin Zou, Florian Schaub
    SOUPS 2019A Self-Report Measure of End-User Security Attitudes (SA-6)Cori Faklaris, Laura A. Dabbish, Jason I. Hong
    SOUPS 2019Cooperative Privacy and Security: Learning from People with Visual Impairments and Their AlliesJordan Hayes, Smirity Kaushik, Charlotte Emily Price, Yang Wang
    SOUPS 2019An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 WebsitesHana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub
    SOUPS 2019The Effect of Entertainment Media on Mental Models of Computer SecurityKelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek
    SOUPS 2019Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile DevicesLukas Mecke, Sarah Delgado Rodriguez, Daniel Buschek, Sarah Prange, Florian Alt
    SOUPS 2019Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen DevicesLukas Mecke, Daniel Buschek, Mathias Kiermeier, Sarah Prange, Florian Alt
    SOUPS 2019Why people (don’t) use password managers effectivelyShikun Aerin Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin
    SOUPS 2019A Typology of Perceived Triggers for End-User Security and Privacy BehaviorsSauvik Das, Laura A. Dabbish, Jason I. Hong
    SOUPS 2019The Fog of Warnings: How Non-essential Notifications Blur with Security WarningsAnthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson
    SOUPS 2019“There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness DataAbdulmajeed Alqhatani, Heather Richter Lipford
    SOUPS 2019Certified Phishing: Taking a Look at Public Key Certificates of Phishing WebsitesUlrike Meyer, Vincent Drury