参考:代表的な国際会議で発表されたUSP論文3
※USP論文読破会、USP読破会2で紹介された論文は除いています
Asking for a Friend: Evaluating Response Biases in Security User Studies
Elissa M. Redmiles (University of Maryland), Ziyun Zhu (University of Maryland), Sean Kross (University of California San Diego), Dhruv Kuchhal (Maharaja Agrasen Institute of Technology), Tudor Dumitras (University of Maryland), Michelle L. Mazurek (University of Maryland)
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses
Mauro Cherubini (UNIL – HEC Lausanne), Alexandre Meylan (UNIL – HEC Lausanne), Bertil Chapuis (UNIL – HEC Lausanne), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), Igor Bilogrevic (Google Inc.), Kévin Huguenin (UNIL – HEC Lausanne)
Investigating System Operators’ Perspective on Security Misconfigurations
Constanze Dietrich (Berliner Hochschule für Technik), Katharina Krombholz (CISPA Helmholtz Center (i.G.)), Kevin Borgolte (Princeton University), Tobias Fiebig (TU Delft)
Detecting User Experience Issues of the Tor Browser In The Wild
Kevin Gallagher (New York University), Sameer Patil (Indiana University Bloomington), Brendan Dolan-Gavitt (New York University), Damon McCoy (New York University), Nasir Memon (New York University)
Predicting Impending Exposure to Malicious Content from User Behavior
Mahmood Sharif (Carnegie Mellon University), Jumpei Urakawa (KDDI Research), Nicolas Christin (Carnegie Mellon University), Ayumu Kubota (KDDI Research), Akira Yamada (KDDI Research)
Reinforcing System-Assigned Passphrases Through Implicit Learning
Zeinab Joudaki (University of Ontario Institute of Technology), Julie Thorpe (University of Ontario Institute of Technology), Miguel Vargas Martin (University of Ontario Institute of Technology)
“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications
Maximilian Golla (Ruhr-University Bochum), Miranda Wei (University of Chicago), Juliette Hainline (University of Chicago), Lydia Filipe (University of Chicago), Markus Dürmuth (Ruhr-University Bochum), Elissa M. Redmiles (University of Maryland), Blase Ur (University of Chicago)
On the Accuracy of Password Strength Meters
Maximilian Golla (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum)
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li (Zhejiang University), Shouling Ji (Zhejiang University), Tianyu Du (Zhejiang University), Bo Li (University of California, Berkeley), Ting Wang (Lehigh University)
Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers
Muhammad Ahmad Bashir (Northeastern University), Umar Farooq (LUMS Pakistan), Maryam Shahid (LUMS Pakistan), Muhammad Fareed Zaffar (LUMS Pakistan), Christo Wilson (Northeastern University)
Total Recall: Persistence of Passwords in Android
Jaeho Lee (Rice University), Ang Chen (Rice University), Dan S. Wallach (Rice University)
How to End Password Reuse on the Web
Ke Coby Wang (UNC Chapel Hill), Michael K. Reiter (UNC Chapel Hill)
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik (Oregon State University), Akshith Gunasekaran (Oregon State University), Rhea Dutta (Cornell University), Brandon Ellis (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), Wu-Chi Feng (Portland State University)
Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change
Simon Parkin (University College London); Elissa M. Redmiles (University of Maryland); Lynne Coventry (Northumbria University); M. Angela Sasse (Ruhr University Bochum and University College London)
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)
A Phish Scale: Rating Human Phishing Message Detection Difficulty
Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features
Jason Morris, Ingolf Becker, Simon Parkin (University College London)
Will They Share? Predicting Location Sharing Behaviors of Smartphone Users through Self-Reflection on Past Privacy Behaviors
Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)
Designing a Mobile App to Support Social Processes for Privacy and Security Decisions
Zaina Aljallad (University of Central Florida); Wentao Guo (Pomona College); Chhaya Chouhan, Christy Laperriere (University of Central Florida); Jess Kropczynski (University of Cincinnati); Pamela Wisnewski (University of Central Florida); Heather Lipford (University of North Carolina at Charlotte)
A First Look at the Usability of OpenVAS Vulnerability Scanner
M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)
Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters
Maximilian Golla, Jan Rimkus (Ruhr University Bochum); Adam J. Aviv (United States Naval Academy); Markus Dürmuth (Ruhr University Bochum)
Stop to Unlock - Improving the Security of Android Unlock Patterns
Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Continuous Smartphone Authentication using Wristbands
Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)
Work in Progress: A Comparative Long-Term Study of Fallback Authentication
Philipp Markert, Maximilian Golla (Ruhr University Bochum); Elizabeth Stobert (National Research Council of Canada); Markus Dürmuth (Ruhr University Bochum)
Case Study – Exploring Children’s Password Knowledge and Practices
Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)
What Happens After Disclosing Stigmatized Experiences on Identified Social Media: Individual, Dyadic, and Social/Network Outcomes
Nazanin Andalibi
Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor
Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang
I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads
Peter Mayer, Nina Gerber, Benjamin Reinheimer, Philipp Rack, Kristoffer Braun, and Melanie Volkamer
Voice Presentation Attack Detection through Text-Converted Voice Command Analysis
Il-Youp Kwak, Jun Ho Huh, Seung Taek Han, Iljoo Kim, and Jiwon Yoon
An Exploration of Bitcoin Mining Practices: Miners' Trust Challenges and Motivations
Irni Eliana Khairuddin and Corina Sas
Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps used by Gay and Bisexual Men
Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, and Ann Blandford
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI
Jacob Abbott, Haley MacLeod, Novia Nurain, Gustave Ekobe, and Sameer Patil
Emotion and Experience in Negotiating HIV-Related Digital Resources: "It's not just a runny nose!"
Aneesha Singh, Jo Gibbs, and Ann Blandford
"This Girl is on Fire": Sensemaking in an Online Health Community for Vulvodynia
Alyson L. Young and Andrew D. Miller
Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment
Helena M. Mentis, Galina Madjaroff, and Aaron K. Massey
Automation Accuracy Is Good, but High Controllability May Be Better
Quentin Roy, Futian Zhang, and Daniel Vogel
AI-Mediated Communication: How the Perception that Profile Text was Written by AI Affects Trustworthiness
Maurice Jakesch, Megan French, Xiao Ma, Jeffrey T. Hancock, and Mor Naaman
Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information
S. Shyam Sundar and Jinyoung Kim
Understanding Trust, Transportation, and Accessibility through Ridesharing
Robin N. Brewer and Vaishnav Kameswaran
23 Ways to Nudge: A Review of Technology-Mediated Nudging in Human-Computer Interaction
Ana Caraban, Evangelos Karapanos, Daniel Gonçalves, and Pedro Campos
REsCUE: A framework for REal-time feedback on behavioral CUEs using multimodal anomaly detection
Riku Arakawa and Hiromu Yakura
Towards an Effective Digital Literacy Intervention to Assist Returning Citizens with Job Search
Ihudiya Finda Ogbonnaya-Ogburu, Kentaro Toyama, and Tawanna R. Dillahunt
Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy
Manya Sleeper, Tara Matthews, Kathleen O'Leary, Anna Turner, Jill Palzkill Woelfer, Martin Shelton, Andrew Oplinger, Andreas Schou, and Sunny Consolvo
What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game
Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, and Erik Andersen
How Do Humans Assess the Credibility on Web Blogs: Qualifying and Verifying Human Factors with Machine Learning
Yonggeol Jo, Minwoo Kim, and Kyungsik Han
"Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh
Syed Ishtiaque Ahmed, Md. Romael Haque, Irtaza Haider, Jay Chen, and Nicola Dell
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats
Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, and Nicolas Christin
"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults
James Nicholson, Lynne Coventry, and Pamela Briggs
Security - Visible, Yet Unseen?
Verena Distler, Marie-Laure Zollinger, Carine Lallemand, Peter B. Roenne, Peter Y. A. Ryan, and Vincent Koenig
You `Might' Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications
Yixin Zou, Shawn Danino, Kaiwen Sun, and Florian Schaub
`I make up a silly name': Understanding Children's Perception of Privacy Risks Online
Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van Kleek, and Nigel Shadbolt
Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online
Karla Badillo-Urquiola, Xinru Page, and Pamela J. Wisniewski
Laughing is Scary, but Farting is Cute: A Conceptual Model of Children's Perspectives of Creepy Technologies
Jason C. Yip, Kiley Sobel, Xin Gao, Allison Marie Hishikawa, Alexis Lim, Laura Meng, Romaine Flor Ofiana, Justin Park, and Alexis Hiniker
Think secure from the beginning': A Survey with Software Developers
Hala Assal and Sonia Chiasson
"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers
Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, and Matthew Smith
Security Managers Are Not The Enemy Either
Lena Reinfelder, Robert Landwirth, and Zinaida Benenson
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers
Nora McDonald, Benjamin Mako Hill, Rachel Greenstadt, and Andrea Forte
Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings
Justin Petelka, Yixin Zou, and Florian Schaub
Let Me Explain: Impact of Personal and Impersonal Explanations on Trust in Recommender Systems
Johannes Kunkel, Tim Donkers, Lisa Michael, Catalin-Mihai Barbu, and Jürgen Ziegler
Towards Understanding the Link Between Age and Smartphone Authentication
Lina Qiu, Alexander De Luca, Ildar Muslukhov, and Konstantin Beznosov
Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones
Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, and Konstantin Beznosov
Passquerade: Improving Error Correction of Text Passwords on Mobile Devices by using Graphic Filters for Password Masking
Mohamed Khamis, Tobias Seitz, Leonhard Mertl, Alice Nguyen, Mario Schneller, and Zhe Li
"Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption
Flynn Wolf, Ravi Kuber, and Adam J. Aviv
Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility
Tavish Vaidya, Daniel Votipka, Michelle L. Mazurek, and Micah Sherr
Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms
Rakibul Hasan, Yifang Li, Eman Hassan, Kelly Caine, David J. Crandall, Roberto Hoyle, and Apu Kapadia
I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging
Elham Vaziripour, Devon Howard, Jake Tyler, Mark O'Neill, Justin Wu, Kent Seamons, and Daniel Zappala
Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content
Abu Saleh Md Noman, Sanchari Das, and Sameer Patil
A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions
Alisa Frik, Nathan Malkin, Marian Harbach, Eyal Peer, and Serge Egelman
Bringing Design to the Privacy Table: Broadening “Design” in “Privacy by Design” Through the Lens of HCI
Richmond Y. Wong and Deirdre K. Mulligan
Privacy, Power, and Invisible Labor on Amazon Mechanical Turk
Shruti Sannon and Dan Cosley
On the Usability of HTTPS Deployment
Matthew Bernhard, Jonathan Sharman, Claudia Ziegler Acemyan, Philip Kortum, Dan S. Wallach, and J. Alex Halderman
Hey Google, Can I Ask You Something in Private?
Eugene Cho
Privacy and Security Considerations For Digital Technology Use in Elementary Schools
Priya C. Kumar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak
Why Johnny Fails to Protect his Privacy
Nina Gerber (Karlsruhe Institute of Technology); Verena Zimmermann (Technische Universität Darmstadt); Melanie Volkamer (Karlsruhe Institute of Technology)
"Don't punish all of us": Measuring User Attitudes about Two-Factor Authentication
Jonathan Dutson, Danny Allen, Dennis Eggett, and Kent Seamons (Brigham Young University)
A Survey on Developer-Centred Security
Mohammad Tahaei and Kami Vaniea (University of Edinburgh)
How Could Serious Games Support Secure Programming? Designing a Study Replication and Intervention
Manuel Maarek and Léon McGregor (Heriot-Watt University); Sandy Louchart and Ross McMenemy (Glasgow School of Art)
Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users
Verena Zimmermann, Ernestine Dickhaut, Paul Gerber, and Joachim Vogt (Technische Universität Darmstadt)
Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home
Sarah Prange (Bundeswehr University); Emanuel von Zezschwitz (University of Bonn); Florian Alt (Bundeswehr University)
Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Keika Mori (Waseda University); Takuya Watanabe (NTT Secure Platform Laboratories); Yunao Zhou (Waseda University); Ayako Akiyama Hasegawa (NTT Secure Platform Laboratories); Mitsuaki Akiyama (NTT Secure Platform Laboratories); Tatsuya Mori (Waseda University / RIKEN AIP / NICT)
Detecting Misalignments Between System Security and User Perceptions: A Preliminary Socio-Technical Analysis of an E2E Email Encryption System
Borce Stojkovski, Itzel Vazquez Sandoval, and Gabriele Lenzini (University of Luxembourg)
A Review of Human- and Computer-Facing URL Phishing Features
Kholoud Althobaiti (University of Edinburgh / Taif University); Ghaidaa Rummani (Hood College); Kami Vaniea (University of Edinburgh)
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
Albesë Demjaha, Tristan Caulfield, M. Angela Sasse, and David Pym (University College London)
Reasoning Analytically About Password-Cracking Software
Alex Liu (University of Chicago), Amanda Nakanishi (University of Chicago), Maximilian Golla (Ruhr-University Bochum), David Cash (University of Chicago), Blase Ur (University of Chicago)
Beyond Credential Stuffing: Password Similarity Models using Neural Networks
Bijeeta Pal (Cornell University), Tal Daniel (Technion), Rahul Chatterjee (Cornell University), Thomas Ristenpart (Cornell Tech)
"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response
Elissa M. Redmiles (University of Maryland)
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples
Elissa M. Redmiles (University of Maryland), Sean Kross (University of California San Diego), Michelle L. Mazurek (University of Maryland)
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
Nan Zhang (Indiana University, Bloomington), Xianghang Mi (Indiana University, Bloomington), Xuan Feng (Indiana University, Bloomington; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China), XiaoFeng Wang (Indiana University, Bloomington), Yuan Tian (University of Virginia), Feng Qian (Indiana University, Bloomington)
Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies
Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, and Yang Wang, Syracuse University
Privacy and Security Threat Models and Mitigation Strategies of Older Adults
Alisa Frik, International Computer Science Institute (ICSI) and University of California, Berkeley; Leysan Nurgalieva, University of Trento; Julia Bernd, International Computer Science Institute (ICSI); Joyce Lee, University of California, Berkeley; Florian Schaub, University of Michigan; Serge Egelman, International Computer Science Institute (ICSI) and University of California, Berkeley
Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional Aspects
Oshrat Ayalon and Eran Toch, Tel Aviv University
A Self-Report Measure of End-User Security Attitudes (SA-6)
Cori Faklaris, Laura Dabbish, and Jason I. Hong, Carnegie Mellon University
The Effect of Entertainment Media on Mental Models of Computer Security
Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Richard Roberts, Yasmin Abdi, and Michelle L. Mazurek, University of Maryland
A Typology of Perceived Triggers for End-User Security and Privacy Behaviors
Sauvik Das, Georgia Institute of Technology; Laura A. Dabbish and Jason I. Hong, Carnegie Mellon University
Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice
Karoline Busse and Julia Schäfer, University of Bonn; Matthew Smith, University of Bonn/Fraunhofer FKIE
"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal
Justin Wu, Cyrus Gattrell, Devon Howard, and Jake Tyler, Brigham Young University; Elham Vaziripour, Utah Valley University; Kent Seamons and Daniel Zappala, Brigham Young University
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware
Camelia Simoiu, Stanford University; Christopher Gates, Symantec; Joseph Bonneau, New York University; Sharad Goel, Stanford University
Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage
Hye-Chung Kum, Population Informatics Lab, Texas A&M University; Eric D. Ragan, INDIE Lab, University of Florida; Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, and Cason Schmit, Population Informatics Lab, Texas A&M University
From Usability to Secure Computing and Back Again
Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, and Ira Globus-Harris, Boston University; Shannon Roberts, University of Massachusetts Amherst; Mayank Varia, Boston University
Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites
Vincent Drury and Ulrike Meyer, Department of Computer Science, RWTH Aachen University
"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks
Abraham H. Mhaidli, Yixin Zou, and Florian Schaub, University of Michigan School of Information
Usability Smells: An Analysis of Developers’ Struggle With Crypto Libraries
Nikhil Patnaik, Joseph Hallett, and Awais Rashid, University of Bristol
System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces
Artem Voronkov, Leonardo A. Martucci, and Stefan Lindskog, Karlstad University
Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines
Frank Li, University of California, Berkeley; Lisa Rogers, University of Maryland; Arunesh Mathur, Princeton University; Nathan Malkin, University of California, Berkeley; Marshini Chetty, Princeton University
Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices
Lukas Mecke, University of Applied Sciences Munich, Munich, Germany and LMU Munich, Munich, Germany; Sarah Delgado Rodriguez and Daniel Buschek, LMU Munich, Munich, Germany; Sarah Prange, University of Applied Sciences Munich, Munich, Germany and Bundeswehr University Munich, Munich, Germany and LMU Munich, Munich, Germany; Florian Alt, Bundeswehr University Munich, Munich, Germany
Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices
Lukas Mecke, University of Applied Sciences Munich, Munich, Germany and LMU Munich, Munich, Germany; Daniel Buschek and Mathias Kiermeier, LMU Munich, Munich, Germany; Sarah Prange, University of Applied Sciences Munich, Munich, Germany and Bundeswehr University Munich, Munich, Germany and LMU Munich, Munich, Germany; Florian Alt, Bundeswehr University Munich, Munich, Germany
Why people (don’t) use password managers effectively
Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling
Stéphane Ciolino, OneSpan Innovation Centre & University College London; Simon Parkin, University College London; Paul Dunphy, OneSpan Innovation Centre
A Usability Study of Five Two-Factor Authentication Methods
Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons, Brigham Young University
Personal Information Leakage by Abusing the GDPR 'Right of Access'
Mariano Di Martino and Pieter Robyns, Hasselt University/tUL, Expertise Centre For Digital Media; Winnie Weyts, Hasselt University - Law Faculty; Peter Quax, Hasselt University/tUL, Expertise Centre For Digital Media, Flanders Make; Wim Lamotte, Hasselt University/tUL, Expertise Centre For Digital Media; Ken Andries, Hasselt University - Law Faculty, Attorney at the Brussels Bar
An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites
Hana Habib, Carnegie Mellon University; Yixin Zou, University of Michigan; Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh, Carnegie Mellon University; Florian Schaub, University of Michigan
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings
Anthony Vance, Temple University; David Eargle, University of Colorado Boulder; Jeffrey L. Jenkins, C. Brock Kirwan, and Bonnie Brinton Anderson, Brigham Young University
“There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness Data
Abdulmajeed Alqhatani and Heather Richter Lipford, University of North Carolina at Charlotte
"I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks
Madiha Tabassum, University of North Carolina at Charlotte; Tomasz Kosinski, Chalmers University of Technology; Heather Lipford, University of North Carolina at Charlotte
More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants
Noura Abdi, King's College London; Kopo M. Ramokapane, University of Bristol; Jose M. Such, King's College London
USENIX Security 2019 (会議のWebサイト)
Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors
Christine Chen, University of Washington; Nicola Dell, Cornell Tech; Franziska Roesner, University of Washington
Clinical Computer Security for Victims of Intimate Partner Violence
Sam Havron, Diana Freed, and Rahul Chatterjee, Cornell Tech; Damon McCoy, New York University; Nicola Dell and Thomas Ristenpart, Cornell Tech
Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA
Noah Apthorpe, Sarah Varghese, and Nick Feamster, Princeton University
Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study
Eric Zeng and Franziska Roesner, University of Washington
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography
Felix Fischer, Technical University of Munich; Huang Xiao, Bosch Center for Artificial Intelligence; Ching-Yu Kao, Fraunhofer AISEC; Yannick Stachelscheid, Benjamin Johnson, and Danial Raza, Technical University of Munich; Paul Fawkesley and Nat Buckley, Projects by IF; Konstantin Böttinger, Fraunhofer AISEC; Paul Muntean and Jens Grossklags, Technical University of Munich
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play
Benjamin Andow and Samin Yaseer Mahmud, North Carolina State University; Wenyu Wang, University of Illinois at Urbana-Champaign; Justin Whitaker, William Enck, and Bradley Reaves, North Carolina State University; Kapil Singh, IBM T.J. Watson Research Center; Tao Xie, University of Illinois at Urbana-Champaign
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
Ying Dong, University of Chinese Academy of Sciences and The Pennsylvania State University; Wenbo Guo, Yueqi Chen, and Xinyu Xing, The Pennsylvania State University and JD Security Research Center; Yuqing Zhang, University of Chinese Academy of Sciences; Gang Wang, Virginia Tech
Detecting and Characterizing Lateral Phishing at Scale
Grant Ho, UC Berkeley and Barracuda Networks; Asaf Cidon, Barracuda Networks and Columbia University; Lior Gavish and Marco Schweighauser, Barracuda Networks; Vern Paxson, UC Berkeley and ICSI; Stefan Savage and Geoffrey M. Voelker, UC San Diego; David Wagner, UC Berkeley
Users Really Do Answer Telephone Scams
Huahong Tu, University of Maryland; Adam Doupé, Arizona State University; Ziming Zhao, Rochester Institute of Technology; Gail-Joon Ahn, Arizona State University and Samsung Research
Cognitive Triaging of Phishing Attacks
Amber van der Heijden and Luca Allodi, Eindhoven University of Technology
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users
Ding Wang and Ping Wang, Peking University; Debiao He, Wuhan University; Yuan Tian, University of Virginia
Protecting accounts from credential stuffing with password breach alerting
Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, and Sarvar Patel, Google; Dan Boneh, Stanford; Elie Bursztein, Google
The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators
Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne Porter Felt, Google