Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2020Blind and Human: Exploring More Usable Audio CAPTCHA DesignsValerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, Sauvik Das
    SOUPS 2020Passworld: A Serious Game to Promote Password Awareness and Diversity in an EnterpriseGokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Premsukh Lodha, Sankalp Suneel Pandit
    SOUPS 2020User Mental Models of Cryptocurrency Systems - A Grounded Theory ApproachAlexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar Weippl, Katharina Krombholz
    SOUPS 2020Knock, Knock. Who’s There? On the Security of LG’s Knock CodesRaina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu
    SOUPS 2020Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System AdministratorsChristian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz
    SOUPS 2020Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian PopulationsJayati Dev, Pablo Moriano, L. Jean Camp
    SOUPS 2020How Risky Are Real Users' IFTTT Applets?Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, Limin Jia
    SOUPS 2020Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing HistoriesSarah Bird, Ilana Segall, Martin Lopatka
    SOUPS 2020From Intent to Action: Nudging Users Towards Secure Mobile PaymentsPeter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, Florian Schaub
    SOUPS 2020Usable Sexurity: Studying People’s Concerns and Strategies When SextingChristine Geeng, Jevan Hutson, Franziska Roesner
    SOUPS 2020"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-PerceptionsEmilee Rader, Samantha Hautea, Anjali Munasinghe
    SOUPS 2020An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive ProcessesSteffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar
    SOUPS 2020Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructuresOla Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, Awais Rashid
    SOUPS 2020Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and AffectAgnieszka Kitkowska, Mark Warner, Yefim Shulman, Erik Wästlund, Leonardo A. Martucci
    SOUPS 2020Realizing Choice: Online Safeguards for Couples Adapting to Cognitive ChallengesNora McDonald, Alison Larsen, Allison Battisti, Galina Madjaroff, Aaron Massey, Helena Mentis
    SOUPS 2020Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office SuitesDominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, Sascha Fahl
    SOUPS 2020An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software DevelopmentHernan Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, Xinming Ou
    SOUPS 2020Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for SecurityJustin Smith, Lisa Nguyen Quang Do, Emerson Murphy-Hill
    SOUPS 2020"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the WildNoura Alomar, Primal Wijesekera, Edward Qiu, Serge Egelman
    SOUPS 2020Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device AdoptionNatã M. Barbosa, Zhuohao Zhang, Yang Wang
    SOUPS 2020Towards Understanding Privacy and Trust in Online Reporting of Sexual AssaultBorke Obada-Obieh, Lucrezia Spagnolo, Konstantin Beznosov
    SOUPS 2020An investigation of phishing awareness and education over time: When and how to best remind usersBenjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana von Landesberger, Melanie Volkamer
    SOUPS 2020Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with FreelancersAnastasia Danilova, Alena Naiakshina, Johanna Deuter, Matthew Smith
    OpML '20Finding Bottleneck in Machine Learning Model Life CycleChandra Mohan Meena, Sarwesh Suman, Vijay Agneeswaran
    OpML '20DLSpec: A Deep Learning Task Exchange SpecificationAbdul Dakkak, Cheng Li, Jinjun Xiong, Wen-mei Hwu

Pages