ユーザブルセキュリティ・プライバシー(USP)論文読破会2

更新日:2019年5月8日

これまで、セキュリティ心理学とトラスト(SPT)研究会では、プライバシーとセキュリティのユーザビリティについての国際会議Symposium on Usable Privacy and Security (SOUPS)で発表された論文の発表内容把握のためのイベントとしてSOUPS論文読破会を2011年より開催してきました。 ユーザブルセキュリティ・プライバシーの分野はSOUPSを中心に世界的な発展を見せ、SOUPSへの投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 そこで、本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会を開催することといたしました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。

第2回目となる今回は、5月9-10日に開催される情報処理学会GN研究会・SPT研究会と電子情報通信学会LOIS研究会の合同研究会における企画セッションとして実施します。

開催要項

日時:2019年5月10日(金)14:30~17:30
※5月9-10日に開催される 第108回グループウェアとネットワークサービス(GN)・第33回セキュリティト心理学とトラスト(SPT)合同研究発表会ライフインテリジェンスとオフィス情報システム(LOIS)研究会における企画セッションとして実施します。

会場:東京農工大学小金井キャンパス
  〒184-8588 東京都小金井市中町2-24-16
  交通アクセス

参加費

参加費はそれぞれの研究会の参加費に準じます。以下はSPT研究会の当日参加費です。

研究会登録会員 無料 
情報処理学会 正会員 1,500円
情報処理学会 学生会員 500円
一般(非会員) 2,500円
学生(非会員) 1,000円
 

発表者募集(締め切りました)

本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者に配布いたします。

発表申し込みは、定員に達し次第締め切ります。

論文はこの1年(2018年5月~2019年5月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文2」としてリストアップいたしました。ご参考ください。

発表ご希望の方は、次のアドレスに電子メールをお送りください。 uspread 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )

申込の電子メールについて

メール件名:USP論文読破会2:発表申込

記載いただきたい内容:

  1. 氏名
  2. 所属(会社名等。学生の場合は学校名)
  3. メールアドレス
  4. 希望する論文

担当論文の決定方法について

メール受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。

論文担当情報

参加申込

事前の参加申込は不要です。

お知らせ

その他

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

読破会プログラム

時間 セッション名 発表タイトル 発表者氏名 発表者所属
14:30-15:00 Opening USP読破会の紹介 金岡晃 東邦大
時間 セッション名 発表タイトル 発表者氏名 発表者所属
15:00-15:15 Misc Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies 長谷川彩子 NTT
15:15-15:30 Web
Tracking Certificate Misissuance in the Wild 須賀祐治 IIJ
15:30-15:45 We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy 坂本一仁 セコム
15:45-16:00 If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS 尾崎敏司 筑波大/トレンドマイクロ
16:00-16:15 Break
16:15-16:30 モバイル
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users 大石雄大 電通大
16:30-16:45 Co-designing Mobile Online Safety Applications with Children 大塚亜未 津田塾大
16:45-17:00 認証
A Tale of Two Studies: The Best and Worst of YubiKey Usability 森啓華 早稲田大
17:00-17:15 Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition 吉田光宏 電通大
17:15-17:30 Closing 閉会挨拶 金岡晃 東邦大

参考:代表的な国際会議で発表されたUSP論文

USP論文読破会で紹介された論文は除いています

ACM CHI 2018 (会議のWebサイト)

Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants
Tamy Guberek (University of Michigan), Allison McDonald (University of Michigan), Sylvia Simoni (University of Michigan), Abraham H. Mhaidli (University of Michigan), Kentaro Toyama (University of Michigan), Florian Schaub (University of Michigan)
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization
Claire Dolin (University of Chicago), Ben Weinshel (University of Chicago), Shawn Shan (University of Chicago), Chang Min Hahn (University of Chicago), Euirim Choi (University of Chicago), Michelle L. Mazurek (University of Maryland), Blase Ur (University of Chicago)
An Experimental Study of Cryptocurrency Market Dynamics
Peter M Krafft (MIT), Nicolas Della Penna (Australian National University), Alex Pentland (Massachusetts Institute of Technology)
Making Sense of Blockchain Applications: A Typology for HCI
Chris Elsden (Northumbria University), Arthi Manohar (Northumbria University), Jo Briggs (Northumbria University), Mike Harding (Lancaster University), Chris Speed (University of Edinburgh), John Vines (Northumbria University)
Breaking! A Typology of Security and Privacy News and How It’s Shared
Sauvik Das (Georgia Institute of Technology), Joanne Lo (Carnegie Mellon University), Laura Dabbish (Carnegie Mellon University), Jason Hong (Carnegie Mellon University)
“We Are the Product”: Public Reactions to Online Data Sharing and Privacy Controversies in the Media
Casey Fiesler (University of Colorado), Blake Hallinan (University of Colorado Boulder)
Not Even Past: Information Aging and Temporal Privacy in Online Social Networks
Oshrat Ayalon (Tel Aviv University), Eran Toch (Tel Aviv University)
The Use of Private Mobile Phones at War: Accounts From the Donbas Conflict
Irina Shklovski (IT University of Copenhagen; University of Siegen), Volker Wulf (University of Siegen)
Co-designing Mobile Online Safety Applications with Children
Brenna McNally (University of Maryland), Priya Kumar (University of Maryland), Chelsea Hordatt (University of Maryland), Matthew Louis Mauriello (University of Maryland; University of Maryland), Shalmali Naik (University of Maryland), Leyla Norooz (University of Maryland), Alazandra Shorter (University of Maryland), Evan Golub (University of Maryland; University of Maryland), Allison Druin (University of Maryland)
Contextualizing Privacy Decisions for Better Prediction (and Protection)
Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Irwin Reyes (International Computer Science Institute), Lynn Tsai (University of California (Berkeley), Jung-Wei Chen (Good Research (Inc), Nathan Good (Good Research (Inc.), David Wagner (Berkeley), Konstantin Beznosov (University of British Columbia), Serge Egelman (Berkeley; International Computer Science Institute)
“This App Would Like to Use Your Current Location to Better Serve You”: Importance of User Assent and System Transparency in Personalized Mobile Services
Tsai-Wei Chen (United Health), S. Shyam Sundar (The Pennsylvania State University)
Improving User Confidence in Concept Maps: Exploring Data Driven Explanations
Pierre Le Bras (Heriot-Watt University), David A. Robb (Heriot-Watt University), Thomas S Methven (Heriot-Watt University), Stefano Padilla (Heriot-Watt University), Mike J Chantler (Heriot-Watt University)
Balancing Privacy and Information Disclosure in Interactive Record Linkage with Visual Masking
Eric D Ragan (Texas A&M University), Hye-Chung Kum (Texas A&M University), Gurudev Ilangovan (Texas A&M University), Han Wang (Texas A&M University)
Increasing User Attention with a Comic-based Policy
Madiha Tabassum (University of North Carolina at Charlotte), Abdulmajeed Alqhatani (University of North Carolina at Charlotte), Marran Aldossari (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)
Who Provides Phishing Training? Facts, Stories, and People Like Me
Rick Wash (Michigan State University), Molly M Cooper (Michigan State University; Nova Southeastern University)
X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps
Max G. Van Kleek (University of Oxford), Reuben Binns (University of Oxford), Jun Zhao (University of Oxford), Adam Slack (University of Oxford), Sauyon Lee (University of Oxford), Dean Ottewell (University of Oxford), Nigel Shadbolt (University of Oxford)
Evolving the Ecosystem of Personal Behavioral Data
Jason Wiese (University of Utah), Sauvik Das (Georgia Institute of Technology), Jason Hong (Carnegie Mellon University), John Zimmerman (Carnegie Mellon University)
Leveraging Semantic Transformation to Investigate Password Habits and Their Causes
Ameya Hanamsagar (USC), Simon S Woo (SUNY Korea), Chris Kanich (University of Illinois), Jelena Mirkovic (USC/ISI)
Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition
Christina Katsini (University of Patras), Christos Fidas (University of Patras), George Raptis (University of Patras), Marios Belk (Cognitive UX GmbH; University of Cyprus), George Samaras (University of Cyprus), Nikolaos Avouris (University of Patras)
Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing
Hassan Khan (University of Waterloo), Urs Hengartner (University of Waterloo), Daniel Vogel (University of Waterloo)
Security During Application Development: an Application Security Expert Perspective
Tyler W. Thomas (University of North Carolina at Charlotte), Madiha Tabassum (University of North Carolina at Charlotte), Bill Chu (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)
What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes
Karola Marky (Technische Universität Darmstadt), Oksana Kulyk (Technische Universität Darmstadt), Karen Renaud (Abertay University; University of South Africa), Melanie Volkamer (Karlsruhe Institute of Technology; Technische Universität Darmstadt)

EuroUSEC 2018 (会議のWebサイト)

User Perception and Expectations on Deleting Instant Messages —or— "What Happens If I Press This Button?"
Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth
"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer
Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer
A Usability Study of Secure Email Deletion
Tyler Monson, Joshua Reynolds, Trevor Smith, Scott Ruoti, Daniel Zappala, Kent Seamons
Consolidating Principles and Patterns for Human-centred Usable Security Research and Development
Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren
The Role of Privacy Violations in Privacy Calculu
Maija Poikela, Sebastian Möller
What Can't Data Be Used For? User Privacy Expectations about Smart TVs
Nathan Malkin, Julia Bernd, Maritza Johnson, Serge Egelman
Permission Impossible: Teaching Firewall Configuration in a Game Environment
Sibylle Sehl, Kami Vaniea
The 'Retailio' Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores
Frederic Raber, David Ziemann, Antonio Krueger

IEEE Symp. on Security and Privacy 2018 (会議のWebサイト)

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements
Yimin Chen (Arizona State University),Tao Li (Arizona State University),Rui Zhang (University of Delaware),Yanchao Zhang (Arizona State University),Terri Hedgpeth (Arizona State University)
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes
Daniel Votipka (University of Maryland),Rock Stevens (University of Maryland),Elissa Redmiles (University of Maryland),Jeremy Hu (University of Maryland),Michelle Mazurek (University of Maryland)
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users
Kiron Lebeck (University of Washington),Kimberly Ruth (University of Washington),Tadayoshi Kohno (University of Washington),Franziska Roesner (University of Washington)
Computer Security and Privacy for Refugees in the United States
Lucy Simko (University of Washington),Ada Lerner (Wellesley College),Samia Ibtasam (University of Washington),Franziska Roesner (University of Washington),Tadayoshi Kohno (University of Washington)
On Enforcing the Digital Immunity of a Large Humanitarian Organization
Stevens Le Blond (École Polytechnique Fédérale de Lausanne),Alejandro Cuevas (École Polytechnique Fédérale de Lausanne),Juan Ramón Troncoso-Pastoriza (École Polytechnique Fédérale de Lausanne),Philipp Jovanovic (École Polytechnique Fédérale de Lausanne),Bryan Ford (École Polytechnique Fédérale de Lausanne),Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne)
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators
Marten Oltrogge (CISPA, Saarland University),Erik Derr (CISPA, Saarland University),Christian Stransky (CISPA, Saarland University),Yasemin Acar (Leibniz University Hannover),Sascha Fahl (Leibniz University Hannover),Christian Rossow (CISPA, Saarland University),Giancarlo Pellegrino (CISPA, Saarland University, Stanford University),Sven Bugiel (CISPA, Saarland University),Michael Backes (CISPA, Saarland University)
Tracking Certificate Misissuance in the Wild
Deepak Kumar (University of Illinois, Urbana-Champaign),Zhengping Wang (University of Illinois, Urbana-Champaign),Matthew Hyder (University of Illinois, Urbana-Champaign),Joseph Dickinson (University of Illinois, Urbana-Champaign),Gabrielle Beck (University of Michigan),David Adrian (University of Michigan),Joshua Mason (University of Illinois, Urbana-Champaign),Zakir Durumeric (University of Michigan),J. Alex Halderman (University of Michigan),Michael Bailey (University of Illinois, Urbana-Champaign)
On the Economics of Offline Password Cracking
Jeremiah Blocki (Purdue University),Benjamin Harsha (Purdue University),Samson Zhou (Purdue University)
A Tale of Two Studies: The Best and Worst of YubiKey Usability
Joshua Reynolds (University of Illinois at Urbana-Champaign), Trevor Smith (Brigham Young University), Ken Reese (Brigham Young University), Luke Dickinson (Brigham Young University), Scott Ruoti (MIT Lincoln Laboratory), Kent Seamons (Brigham Young University)

SOUPS 2018 (会議のWebサイト)

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
Melanie Volkamer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt; Andreas Gutmann, OneSpan Innovation Centre and University College London; Karen Renaud, Abertay University, University of South Africa, and University of Glasgow; Paul Gerber, Technische Universität Darmstadt; Peter Mayer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt
User Behaviors and Attitudes Under Password Expiration Policies
Hana Habib and Pardis Emami Naeini, Carnegie Mellon University; Summer Devlin, University of California, Berkeley; Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians
Elham Al Qahtani and Mohamed Shehab, University of North Carolina Charlotte; Abrar Aljohani
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal
Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, and Daniel Zappala, Brigham Young University
Informal Support Networks: an investigation into Home Data Security Practices
Norbert Nthala and Ivan Flechais, University of Oxford
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships
Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong, Carnegie Mellon University
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking
Arunesh Mathur, Princeton University; Jessica Vitak, University of Maryland, College Park; Arvind Narayanan and Marshini Chetty, Princeton University
Can Digital Face-Morphs Influence Attitudes and Online Behaviors?
Eyal Peer, Bar-Ilan University; Sonam Samat and Alessandro Acquisti, Carnegie Mellon University
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su, Indiana University Bloomington
"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach
Yixin Zou, Abraham H. Mhaidli, Austin McCall, and Florian Schaub, School of Information, University of Michigan
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, and Oxana Comanescu, Google
User Comfort with Android Background Resource Accesses in Different Contexts
Daniel Votipka and Seth M. Rabin, University of Maryland; Kristopher Micinski, Haverford College; Thomas Gilray, Michelle L. Mazurek, and Jeffrey S. Foster, University of Maryland
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
Orçun Çetin, Lisette Altena, Carlos Gañán, and Michel van Eeten, Delft University of Technology
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse
Peter Leo Gorski and Luigi Lo Iacono, Cologne University of Applied Sciences; Dominik Wermke and Christian Stransky, Leibniz University Hannover; Sebastian Möller, Technical University Berlin; Yasemin Acar, Leibniz University Hannover; Sascha Fahl, Ruhr-University Bochum
Security in the Software Development Lifecycle
Hala Assal and Sonia Chiasson, Carleton University
Deception Task Design in Developer Password Studies: Exploring a Student Sample
Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith, University of Bonn, Germany
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration
Ambar Murillo, Andreas Kramm, Sebastian Schnorf, and Alexander De Luca, Google
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
Norman Hänsch, Friedrich-Alexander-Universität Erlangen-Nürnberg; Andrea Schankin, Karlsruhe Institute of Technology; Mykolai Protsenko, Fraunhofer Institute for Applied and Integrated Security; Felix Freiling and Zinaida Benenson, Friedrich-Alexander-Universität Erlangen-Nürnberg
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products
Julie M. Haney and Mary F. Theofanos, National Institute of Standards and Technology; Yasemin Acar, Leibniz University Hannover; Sandra Spickard Prettyman, Culture Catalyst
A Comparative Usability Study of Key Management in Secure Email
Scott Ruoti, University of Tennessee; Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons, Brigham Young University
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection
James Nicholson, Lynne Coventry, and Pam Briggs, PaCT Lab, Northumbria University
Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality
Devon Adams, Alseny Bah, and Catherine Barwulor, University of Maryland Baltimore County; Nureli Musaby, James Madison University; Kadeem Pitkin, College of Westchester; Elissa M. Redmiles, University of Maryland

USENIX Security Symposium 2018 (会議のWebサイト)

Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
Sanam Ghorbani Lyastani, CISPA, Saarland University; Michael Schilling, Saarland University; Sascha Fahl, Ruhr-University Bochum; Michael Backes and Sven Bugiel, CISPA Helmholtz Center i.G.
Forgetting of Passwords: Ecological Theory and Data
Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, and Janne Lindqvist, Rutgers University; Antti Oulasvirta, Aalto University
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
Ingolf Becker, Simon Parkin, and M. Angela Sasse, University College London
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
Weijia He, University of Chicago; Maximilian Golla, Ruhr-University Bochum; Roshni Padhi and Jordan Ofek, University of Chicago; Markus Dürmuth, Ruhr-University Bochum; Earlence Fernandes, University of Washington; Blase Ur, University of Chicago
How Do Tor Users Interact With Onion Services?
Philipp Winter, Anne Edmundson, and Laura M. Roberts, Princeton University; Agnieszka Dutkowska-Żuk, Independent; Marshini Chetty and Nick Feamster, Princeton University
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
Rock Stevens, Daniel Votipka, and Elissa M. Redmiles, University of Maryland; Colin Ahern, NYC Cyber Command; Patrick Sweeney, Wake Forest University; Michelle L. Mazurek, University of Maryland
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild
Chaowei Xiao and Armin Sarabi, University of Michigan; Yang Liu, Harvard University / UC Santa Cruz; Bo Li, UIUC; Mingyan Liu, University of Michigan; Tudor Dumitras, University of Maryland, College Park
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
Dongliang Mu, Nanjing University; Alejandro Cuevas, The Pennsylvania State University; Limin Yang and Hang Hu, Virginia Tech; Xinyu Xing, The Pennsylvania State University; Bing Mao, Nanjing University; Gang Wang, Virginia Tech
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets
Rolf van Wegberg and Samaneh Tajalizadehkhoob, Delft University of Technology; Kyle Soska, Carnegie Mellon University; Ugur Akyazi, Carlos Hernandez Ganan, and Bram Klievink, Delft University of Technology; Nicolas Christin, Carnegie Mellon University; Michel van Eeten, Delft University of Technology
Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces
Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang, Indiana University Bloomington
Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem
Mohammad Rezaeirad, George Mason University; Brown Farinholt, University of California, San Diego; Hitesh Dharmdasani, Informant Networks; Paul Pearce, University of California, Berkeley; Kirill Levchenko, University of California, San Diego; Damon McCoy, New York University
The aftermath of a crypto-ransomware attack at a large academic institution
Leah Zhang-Kennedy, University of Waterloo, Stratford Campus; Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, and Sonia Chiasson, Carleton University

ACM CCS 2018 (会議のWebサイト)

Asking for a Friend: Evaluating Response Biases in Security User Studies
Elissa M. Redmiles (University of Maryland), Ziyun Zhu (University of Maryland), Sean Kross (University of California San Diego), Dhruv Kuchhal (Maharaja Agrasen Institute of Technology), Tudor Dumitras (University of Maryland), Michelle L. Mazurek (University of Maryland)
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses
Mauro Cherubini (UNIL – HEC Lausanne), Alexandre Meylan (UNIL – HEC Lausanne), Bertil Chapuis (UNIL – HEC Lausanne), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), Igor Bilogrevic (Google Inc.), Kévin Huguenin (UNIL – HEC Lausanne)
Investigating System Operators’ Perspective on Security Misconfigurations
Constanze Dietrich (Berliner Hochschule für Technik), Katharina Krombholz (CISPA Helmholtz Center (i.G.)), Kevin Borgolte (Princeton University), Tobias Fiebig (TU Delft)
Detecting User Experience Issues of the Tor Browser In The Wild
Kevin Gallagher (New York University), Sameer Patil (Indiana University Bloomington), Brendan Dolan-Gavitt (New York University), Damon McCoy (New York University), Nasir Memon (New York University)
Predicting Impending Exposure to Malicious Content from User Behavior
Mahmood Sharif (Carnegie Mellon University), Jumpei Urakawa (KDDI Research), Nicolas Christin (Carnegie Mellon University), Ayumu Kubota (KDDI Research), Akira Yamada (KDDI Research)
Reinforcing System-Assigned Passphrases Through Implicit Learning
Zeinab Joudaki (University of Ontario Institute of Technology), Julie Thorpe (University of Ontario Institute of Technology), Miguel Vargas Martin (University of Ontario Institute of Technology)
“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications
Maximilian Golla (Ruhr-University Bochum), Miranda Wei (University of Chicago), Juliette Hainline (University of Chicago), Lydia Filipe (University of Chicago), Markus Dürmuth (Ruhr-University Bochum), Elissa M. Redmiles (University of Maryland), Blase Ur (University of Chicago)
On the Accuracy of Password Strength Meters
Maximilian Golla (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum)

NDSS 2019 (会議のWebサイト)

TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li (Zhejiang University), Shouling Ji (Zhejiang University), Tianyu Du (Zhejiang University), Bo Li (University of California, Berkeley), Ting Wang (Lehigh University)
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy
Martin Degeling (Ruhr-Universität Bochum), Christine Utz (Ruhr-Universität Bochum), Christopher Lentzsch (Ruhr-Universität Bochum), Henry Hosseini (Ruhr-Universität Bochum), Florian Schaub (University of Michigan), Thorsten Holz (Ruhr-Universität Bochum)
Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers
Muhammad Ahmad Bashir (Northeastern University), Umar Farooq (LUMS Pakistan), Maryam Shahid (LUMS Pakistan), Muhammad Fareed Zaffar (LUMS Pakistan), Christo Wilson (Northeastern University)
Total Recall: Persistence of Passwords in Android
Jaeho Lee (Rice University), Ang Chen (Rice University), Dan S. Wallach (Rice University)
How to End Password Reuse on the Web
Ke Coby Wang (UNC Chapel Hill), Michael K. Reiter (UNC Chapel Hill)
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Kimia Tajik (Oregon State University), Akshith Gunasekaran (Oregon State University), Rhea Dutta (Cornell University), Brandon Ellis (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), Wu-Chi Feng (Portland State University)

USEC 2019 (会議のWebサイト)

Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies
Karoline Busse (University of Bonn); Dominik Wermke (Leibniz University Hannover); Sabrina Amft (University of Bonn); Sascha Fahl (Leibniz University Hannover); Emanuel von Zezschwitz, Matthew Smith (University of Bonn)
Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change
Simon Parkin (University College London); Elissa M. Redmiles (University of Maryland); Lynne Coventry (Northumbria University); M. Angela Sasse (Ruhr University Bochum and University College London)
Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)
A Phish Scale: Rating Human Phishing Message Detection Difficulty
Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)
In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features
Jason Morris, Ingolf Becker, Simon Parkin (University College London)
Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users
Oksana Kulyk (Karlsruhe Institute of Technology); Paul Gerber, Karola Marky, Christopher Beckmann (Technische Universität Darmstadt); Melanie Volkamer (Karlsruhe Institute of Technology)
Will They Share? Predicting Location Sharing Behaviors of Smartphone Users through Self-Reflection on Past Privacy Behaviors
Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)
Designing a Mobile App to Support Social Processes for Privacy and Security Decisions
Zaina Aljallad (University of Central Florida); Wentao Guo (Pomona College); Chhaya Chouhan, Christy Laperriere (University of Central Florida); Jess Kropczynski (University of Cincinnati); Pamela Wisnewski (University of Central Florida); Heather Lipford (University of North Carolina at Charlotte)
A First Look at the Usability of OpenVAS Vulnerability Scanner
M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)
Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters
Maximilian Golla, Jan Rimkus (Ruhr University Bochum); Adam J. Aviv (United States Naval Academy); Markus Dürmuth (Ruhr University Bochum)
Stop to Unlock - Improving the Security of Android Unlock Patterns
Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Continuous Smartphone Authentication using Wristbands
Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)
Work in Progress: A Comparative Long-Term Study of Fallback Authentication
Philipp Markert, Maximilian Golla (Ruhr University Bochum); Elizabeth Stobert (National Research Council of Canada); Markus Dürmuth (Ruhr University Bochum)
Case Study – Exploring Children’s Password Knowledge and Practices
Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)

運営について

お問い合わせ先

uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)