ユーザブルセキュリティ・プライバシー(USP)論文読破会4

更新日:2020年11月16日

ユーザブルセキュリティ・プライバシーの分野は世界的な発展を見せ、当該分野を専門的に扱う国際会議Symposium on Usable Privacy and Security (SOUPS)への投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会が開始されました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。

第3回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3に続く開催です。

開催要項

日時:2020年11月27日(金)10:00~18:00(予定)

会場:オンライン(Zoom)

参加費

無料

発表者募集(締め切りました)

本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者と共有いたします。

発表申し込みは、定員に達し次第締め切ります。

論文はこの1年(2019年11月~2020年11月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文4」としてリストアップいたしました。ご参考ください。

発表ご希望の方は、次のフォームより入力してください。

https://forms.gle/nmii55Ch8n2VKdL88

入力いただく内容:

  1. 氏名
  2. 所属(会社名等。学生の場合は学校名)
  3. メールアドレス
  4. 希望する論文

担当論文の決定方法について

フォームによる受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。

論文担当情報

参加申込

参加ご希望の方は、次のフォームより入力してください。発表者の方は入力不要です。

https://forms.gle/2uVhQQsZmQPyoxHv8

入力いただく内容:

  1. 氏名
  2. 所属(会社名等。学生の場合は学校名)
  3. メールアドレス
  4. 参加者区別(研究会登録会員、情報処理学会学生会員、一般(非会員))

お知らせ

その他

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

読破会プログラム

時間 セッション名 担当論文タイトル 担当者 担当者所属
10:00-10:15 Opening 開会、SOUPS2019参加報告 金岡 晃 東邦大学
10:15-10:35 Session 1 Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework 坂本一仁 株式会社DataSign
10:35-10:55 Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect 金森祥子 国立研究開発法人情報通信研究機構
10:55-11:15 Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats 横山 佳紀 電気通信大学
11:15-11:35 Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It ももいやすなり 株式会社インターネットイニシアティブ
11:35-11:55 Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers 秋山満昭 NTTセキュアプラットフォーム研究所
11:55-13:30 ランチ、雑談、議論
13:30-13:50 Session 2 On the Resilience of Biometric Authentication Systems against Random Inputs 大木哲史 静岡大学
13:50-14:10 Empirical Measurement of Systemic 2FA Usability 藤田真浩 三菱電機株式会社
14:10-14:30 This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs 江原知志 電気通信大学
14:30-14:50 Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements 金岡晃 東邦大学
14:50-15:05 休憩
15:05-15:25 Session 3 Will You Trust This TLS Certificate? Perceptions of People Working in IT Yuji Suga Internet Initiative Japan Inc.
15:25-15:45 What is this URL's Destination? Empirical Evaluation of Users' URL Reading 長谷川彩子 NTTセキュアプラットフォーム研究所
15:45-16:05 An investigation of phishing awareness and education over time: When and how to best remind users 河田真由子 株式会社富士通研究所
16:05-16:25 'Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings 坪根 恵 早稲田大学
16:25-16:45 Toward a Theory of Situation Awareness in Dynamic 村山優子 津田塾大学
16:45-17:00 Closing 閉会挨拶 金岡晃 東邦大学

参考:代表的な国際会議で発表されたUSP論文4

ACSAC 2019 (会議のWebサイト)

EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection
Yuma Kurogome, NTT Secure Platform Laboratories; Yuto Otsuki, NTT Secure Platform Laboratories; Yuhei Kawakoya, NTT Secure Platform Laboratories; Makoto Iwamura, NTT Secure Platform Laboratories; Syogo Hayashi, NTT Security (Japan) KK; Tatsuya Mori, Waseda University / NICT; Koushik Sen, University of California, Berkeley
Your Hashed IP Address: Ubuntu - Perspectives on Transparency Tools for Online Advertising
Tobias Urban, Institute for Internet Security, Westphalian University of Applied Sciences; Martin Degeling, Ruhr University Bochum; Horst Gortz Institute for IT Security; Thorsten Holz, Ruhr University Bochum; Horst Gortz Institute for IT Security; Norbert Pohlmann, Institute for Internet Security, Westphalian University of Applied Sciences
Will You Trust This TLS Certificate? Perceptions of People Working in IT
Martin Ukrop, Masaryk University; Lydia Kraus, Masaryk University; Vashek Matyas, Masaryk University; Heider Ahmad Mutleq Wahsheh, Ca' Foscari University of Venice
I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders
Ayako Akiyama Hasegawa, NTT Secure Platform Laboratories; Takuya Watanabe, NTT Secure Platform Laboratories; Eitaro Shioji, NTT Secure Platform Laboratories; Mitsuaki Akiyama, NTT Secure Platform Laboratories

FC '20 (会議のWebサイト)

Open Market or Ghost Town? The Curious Case of OpenBazaar
James E. Arps (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users
Artemij Voskobojnikov (University of British Columbia), Borke Obada-Obieh (University of British Columbia), Yue Huang (University of British Columbia), Konstantin Beznosov (University of British Columbia)

AsiaUSEC 2020 (会議のWebサイト)

A Tale of Two Browsers: Understanding User’s Web Browser Choices in South Korea -
Simon Woo, Hyoungshick Kim, Ji Won Choi, Soyoon Jeon, Jihye Woo and Joon Han
User-Centered Risk Communication for Safer Browsing
Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe and L. Jean Camp.
Secure Email – A Usability Study
Adrian Reuter, Ahmed Abdelmaksoud, Wadie Lemrazzeq, Karima Boudaoud and Marco Winckler
The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails,
George Nasser, Ben Morrison, Piers Bayl-Smith, Ronnie Taib, Michael Gayed, and Mark Wiggins
Cue Utilization, Phishing Feature and Phishing Email Detection
Piers Bayl-Smith, Daniel Sturman and Mark Wiggins
Dis-Empowerment Online- An Investigation of Privacy & Sharing Perceptions & Method Preferences
KovilaP.L.Coopamootoo
Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation,
Oksana Kulyk, Benjamin Maximilian Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer.
Understanding Perceptions of Smart Devices
Hilda Hadan, Sameer Patil
In Our Employer We Trust: Mental Models of Office Worker’s Privacy Perceptions
Jan Tolsdorf and Florian Dehling
Behaviour of Outsourced Employees as Sources of Information System Security Threats
David Oyebisi and Kennedy Njenga
Exploring Effects of Auditory Stimuli on CAPTCHA Performance
Gene Tsudik, Tyler Kaczmarek, Bruce Berg, Alfred Kobsa
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records
Xian Chu, Huiping Sun, Zhong Chen
Empathy as a Response to Frustration in Password Choice
Kovila P.L. Coopamootoo
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage
Harshal Tupsamudre,Monika Sahu,Kumar Vidhani,Sachin Lodha
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach
Jacqui Taylor-Jackson, John McAlaney, Jeff Foster, Abubakar Bello, Alana Maurushat, John Dale

NDSS 2020 (会議のWebサイト)

Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators
Imani N. Sherman (University of Florida), Jasmine D. Bowers (University of Florida), Keith McNamara Jr. (University of Florida), Juan E. Gilbert (University of Florida), Jaime Ruiz (University of Florida), Patrick Traynor (University of Florida)
OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display
Shiqing Luo (Georgia State University), Anh Nguyen (Georgia State University), Chen Song (San Diego State University), Feng Lin (Zhejiang University), Wenyao Xu (SUNY Buffalo), Zhisheng Yan (Georgia State University)
On the Resilience of Biometric Authentication Systems against Random Inputs
Benjamin Zi Hao Zhao (University of New South Wales and Data61 CSIRO), Hassan Jameel Asghar (Macquarie University and Data61 CSIRO), Mohamed Ali Kaafar (Macquarie University and Data61 CSIRO)
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities
Zhenfeng Zhang (Chinese Academy of Sciences, University of Chinese Academy of Sciences, and The Joint Academy of Blockchain Innovation), Yuchen Wang (Chinese Academy of Sciences and University of Chinese Academy of Sciences), Kang Yang (State Key Laboratory of Cryptology)
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems
Matthew Smith (University of Oxford), Martin Strohmeier (University of Oxford), Jonathan Harman (Vrije Universiteit Amsterdam), Vincent Lenders (armasuisse Science and Technology), Ivan Martinovic (University of Oxford)
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference
Peter Ney (University of Washington), Luis Ceze (University of Washington), Tadayoshi Kohno (University of Washington)
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies
Sebastian Roth (CISPA Helmholtz Center for Information Security), Timothy Barron (Stony Brook University), Stefano Calzavara (Università Ca' Foscari Venezia), Nick Nikiforakis (Stony Brook University), Ben Stock (CISPA Helmholtz Center for Information Security)
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals
Peng Wang (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington), Yue Qin (Indiana University Bloomington), XiaoFeng Wang (Indiana University Bloomington)
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
Rock Stevens (University of Maryland), Josiah Dykstra (Independent Security Researcher), Wendy Knox Everette (Leviathan Security Group), James Chapman (Independent Security Researcher), Garrett Bladow (Dragos), Alexander Farmer (Independent Security Researcher), Kevin Halliday (University of Maryland), Michelle L. Mazurek (University of Maryland)

CHI 2020 (会議のWebサイト)

"Addressing Anonymous Abuses: Measuring the Effects of Technical Mechanisms on Reported User Behaviors "
Wajeeha Ahmad and Ilaria Liccardi
"Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks "
Yue Huang, Borke Obada-Obieh, and Konstantin (Kosta) Beznosov
"Arseing around was Fun!" – Humor as a Resource in Design and Making
NettaIivari, Marianne Kinnula, LeenaKuure and TiinaKeisanen
"Bug or Feature? Covert Impairments to Human Computer Interaction "
John V. Monaco
"Building and Validating a Scale for Secure Software Development Self-Efficacy "
Daniel J Votipka, Desiree Abrokwa, and Michelle L. Mazurek
"Circle of Trust: A New Approach to Mobile Online Safety for Families "
Arup Kumar Ghosh, Charles E. Hughes, and Pamela J. Wisniewski
"Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence "
Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal
Does Context in Privacy Communication Really Matter? — A Survey on Consumer Concerns and Preferences
Nico Ebert, Kurt Alexander Ackermann and Peter Heinrich
"Effects of Credibility Indicators on Social Media News Sharing Intent "
Waheeb Yaqub, Otari Kakhidze, Morgan L. Brockman, Nasir Memon, and Sameer Patil
"Evaluating 'Prefer not to say' Around Sensitive Disclosures "
Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F. Maestre, and Ann Blandford
"Evaluating the End-User Experience of Private Browsing Mode "
Ruba Abu-Salma and Benjamin Livshits
"Evaluating the Information Security Awareness of Smartphone Users "
Ron Bitton, Kobi Boymgold, Rami Puzis, and Asaf Shabtai
"Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices "
Yixin Zou, Kevin Roundy, Acar Tamersoy, Saurabh Shintre, johann roturier, and Florian Schaub
"Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats "
Hiroaki Masaki, Kengo Shibata, Shui Hoshino, Takahiro Ishihama, Nagayuki Saito, and Koji Yatani
"How Mandatory Second Factor Affects the Authentication User Experience "
Jacob Abbott and Sameer Patil
"I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios "
Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I. Hong
"I'm hoping they're an ethical company that won't do anything that I'll regret": Users Perceptions of At-home DNA Testing Companies
Khadija Baig, Reham Mohamed, Anna-Lena Theus, and Sonia Chiasson
"Informing the Design of a Personalized Privacy Assistant for the Internet of Things "
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh
"""It's a scavenger hunt"": Usability of Websites' Opt-Out and Data Deletion Choices "
Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub
"Let's Talk about Sext: How Adolescents Seek Support and Advice about Their Online Sexual Experiences "
Afsaneh Razi, Karla Badillo-Urquiola and Pamela J. Wisniewski
Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings
Rebecca Jeong and Sonia Chiasson
"Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs "
Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl
"Measuring Identity Confusion with Uniform Resource Locators "
Joshua Reynolds, Deepak Kumar, Zane Ma, Rohan C Subramanian, Meishan Wu, Martin Shelton, Joshua Mason, Emily Stark, and Michael Bailey
On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers
Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, and Matthew Smith
"Online Privacy Heuristics that Predict Information Disclosure "
S. Shyam Sundar, Jinyoung Kim, Mary Beth Rosson and Maria D. Molina
Ownership, Privacy, and Control in the Wake of Cambridge Analytica: The Relationship between Attitudes and Awareness
Frank M. Shipman and Catherine C. Marshall
Private Responses for Public Sharing: Understanding Self-Presentation and Relational Maintenance via Stories in Social Media
Penny Triệu and Nancy K. Baym
Robocalling: STIRRED AND SHAKEN! – An Investigation of Calling Displays on Trust and Answer Rates
Gregory W. Edwards, Michael J. Gonzales, and Marc A. Sullivan
Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information
Julia Hanson, Miranda Wei, Sophie Veys, Matthew Kugler, Lior Strahilevitz, and Blase Ur
"The Burden of Ending Online Account Sharing "
Borke Obada-Obieh, Yue Huang, and Konstantin Beznosov
"The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions "
Reham Mohamed, Paulina Chametka, and Sonia Chiasson
"The Politics of Privacy Theories: Moving from Norms to Vulnerabilities "
Nora McDonald and Andrea Forte
"The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions "
Christina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, and Florian Alt
"Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos "
Yifang Li, Nishant Vishwamitra, Hongxin Hu, and Kelly Caine
"Understanding Cybersecurity Practices in Emergency Departments "
Elizabeth Stobert, David Barrera, Valérie Homier, and Daniel Kollek
"Understanding Fitness Tracker Users' Security and Privacy Knowledge, Attitudes and Behaviours "
Sandra Gabriele and Sonia Chiasson
"Understanding Privacy-Related Questions on Stack Overflow "
Mohammad Tahaei, Kami Vaniea, and Naomi Saphra
"User Experiences with Online Status Indicators "
Camille Cobb, Lucy Simko, Tadayoshi Kohno, and Alexis Hiniker
"""We Hold Each Other Accountable"": Unpacking How Social Groups Approach Cybersecurity and Privacy Together "
Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das
"What is this URL's Destination? Empirical Evaluation of Users' URL Reading "
Sara Albakry, Kami Vaniea, and Maria K. Wolters
"Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email "
Jayati Dev, Emilee Rader, and Sameer Patil
"Will Deleting History Make Alexa More Trustworthy? Effects of Privacy and Content Customization on User Experience of Smart Speakers "
Eugene Cho, S. ShyamSundar, Saeed Abdullah and NasimMotalebi

S&P 2020 (会議のWebサイト)

"Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication"
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Germany), Michael Schilling (CISPA Helmholtz Center for Information Security, Germany), Michaela Neumayr (CISPA Helmholtz Center for Information Security, Germany), Michael Backes (CISPA Helmholtz Center for Information Security, Germany), Sven Bugiel (CISPA Helmholtz Center for Information Security, Germany)
"This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs"
"Philipp Markert (Ruhr University Bochum), Daniel Bailey (Ruhr University Bochum), Maximilian Golla (Max Planck Institute for Security and Privacy), Markus Dürmuth (Ruhr University Bochum), Adam Aviv (The George Washington University) "
"Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies"
"Eunyong Cheon (UNIST, Republic of Korea), Yonghwan Shin (UNIST, Republic of Korea), Jun Ho Huh (Samsung Research, Republic of Korea), Hyoungshick Kim (Sungkyunkwan University, Republic of Korea), Ian Oakley (UNIST, Republic of Korea) "
Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework
"Célestin Matte (Inria, France), Nataliia Bielova (Inria, France), Cristiana Santos (Inria, France) "
"Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings"
"Mary Jean Amon (University of Colorado Boulder), Rakibul Hasan (Indiana University), Kurt Hugenberg (Indiana University), Bennett Bertenthal (Indiana University), Apu Kapadia (Indiana University) "

SOUPS 2020 (会議のWebサイト)

Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise
Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, and Sachin Premsukh Lodha, Sankalp Suneel Pandit, TCS Research, Tata Consultancy Services Limited
“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company
Florian M. Farke, Ruhr University Bochum; Lennart Lorenz, tracekey solutions GmbH; Theodor Schnitzler, Philipp Markert, and Markus Dürmuth, Ruhr University Bochum
Knock, Knock. Who’s There? On the Security of LG’s Knock Codes
Raina Samuel, New Jersey Institute of Technology; Philipp Markert, Ruhr University Bochum, Germany; Adam J. Aviv, The George Washington University; Iulian Neamtiu, New Jersey Institute of Technology
An Empirical Study of Wireless Carrier Authentication for SIM Swaps
"Kevin Lee, Benjamin Kaiser, Jonathan Mayer, and Arvind Narayanan, Princeton University "
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations
"Jayati Dev, Indiana University; Pablo Moriano, Oak Ridge National Laboratory; L. Jean Camp, Indiana University "
Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges
Nora McDonald, Alison Larsen, and Allison Battisti, University of Maryland, Baltimore County; Galina Madjaroff, University of Maryland; Aaron Massey and Helena Mentis, University of Maryland, Baltimore County
Blind and Human: Exploring More Usable Audio CAPTCHA Designs
"Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, and Sauvik Das, Georgia Institute of Technology "
Usable Sexurity: Studying People’s Concerns and Strategies When Sexting
"Christine Geeng, Jevan Hutson, and Franziska Roesner, University of Washington "
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault
Borke Obada-Obieh, The University of British Columbia; Lucrezia Spagnolo, Vesta Social Innovation Technologies; Konstantin (Kosta) Beznosov, University of British Columbia
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers
"Anastasia Danilova, Alena Naiakshina, and Johanna Deuter, University of Bonn; Matthew Smith, University of Bonn and Fraunhofer FKIE "
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras
"George Chalhoub and Ivan Flechais, University of Oxford; Norbert Nthala, Michigan State University; Ruba Abu-Salma, University College London (UCL) & Inria "
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development
"Hernan Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, and Xinming Ou, University of South Florida "
Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security
"Justin Smith, Lafayette College; Lisa Nguyen Quang Do and Emerson Murphy-Hill, Google "
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators
Christian Tiefenau and Maximilian Häring, University of Bonn; Katharina Krombholz, CISPA Helmholtz Center for Information Security; Emanuel von Zezschwitz, University of Bonn and Fraunhofer FKIE
An investigation of phishing awareness and education over time: When and how to best remind users
Benjamin Maximilian Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, and Reyhan Duezguen, Karlsruhe Institute of Technology; Bettina Lofthouse, Landesamt für Geoinformation und Landesvermessung Niedersachsen; Tatiana von Landesberger, Technische Universität Darmstadt; Melanie Volkamer, Karlsruhe Institute of Technology
An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes
Steffen Becker, Carina Wiesen, and Nils Albartus, Ruhr University Bochum and Max Planck Institute for Cybersecurity and Privacy; Nikol Rummel, Ruhr University Bochum; Christof Paar, Max Planck Institute for Cybersecurity and Privacy
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures
"Ola Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, and Awais Rashid, University of Bristol "
"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild
Noura Alomar, University of California, Berkeley; Primal Wijesekera, UC Berkeley / ICSI; Edward Qiu, University of California, Berkeley; Serge Egelman, UC Berkeley / ICSI
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach
"Alexandra Mai and Katharina Pfeffer, SBA Research; Matthias Gusenbauer, Tokyo Institute of Technology and SBA Research; Edgar Weippl, University of Vienna; Katharina Krombholz, CISPA Helmholtz Center for Information Security "
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
"Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl, Leibniz University Hannover "
From Intent to Action: Nudging Users Towards Secure Mobile Payments
"Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh, Carnegie Mellon University; Florian Schaub, University of Michigan "
Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption
"Natã M. Barbosa, Zhuohao Zhang, and Yang Wang, University of Illinois at Urbana-Champaign "
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect
Agnieszka Kitkowska, Karlstad University; Mark Warner, Northumbria University; Yefim Shulman, Tel Aviv University; Erik Wästlund and Leonardo A. Martucci, Karlstad University
"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions
"Emilee Rader, Samantha Hautea, and Anjali Munasinghe, Michigan State University "
Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories
"Sarah Bird, Ilana Segall, and Martin Lopatka, Mozilla "
How Risky Are Real Users' IFTTT Applets?
Camille Cobb and Milijana Surbatovich, Carnegie Mellon University; Anna Kawakami, Wellesley College; Mahmood Sharif, NortonLifeLock; Lujo Bauer, Carnegie Mellon University; Anupam Das, North Carolina State University; Limin Jia, Carnegie Mellon University

USENIX Security '20 (会議のWebサイト)

"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications
Taslima Akter, Indiana University Bloomington; Bryan Dosono, Syracuse University; Tousif Ahmed and Apu Kapadia, Indiana University Bloomington; Bryan Semaan, Syracuse University
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, and Michael Hicks, University of Maryland
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
Elissa M. Redmiles, Microsoft Research; Noel Warford, Amritha Jayanti, and Aravind Koneru, University of Maryland; Sean Kross, University of California, San Diego; Miraida Morales, Rutgers University; Rock Stevens and Michelle L. Mazurek, University of Maryland
Empirical Measurement of Systemic 2FA Usability
Joshua Reynolds, University of Illinois at Urbana-Champaign and University of California, Berkeley and International Computer Science Institute; Nikita Samarin, University of California, Berkeley and International Computer Science Institute; Joseph Barnes, Taylor Judd, Joshua Mason, and Michael Bailey, University of Illinois at Urbana-Champaign; Serge Egelman, University of California, Berkeley and International Computer Science Institute
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data
Miranda Wei, University of Washington / University of Chicago; Madison Stamos and Sophie Veys, University of Chicago; Nathan Reitinger and Justin Goodman, University of Maryland; Margot Herman, University of Chicago; Dorota Filipczuk, University of Southampton; Ben Weinshel, University of Chicago; Michelle L. Mazurek, University of Maryland; Blase Ur, University of Chicago
The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment
"Alisa Frik, International Computer Science Institute / UC Berkeley; Amelia Haviland and Alessandro Acquisti, Heinz College, Carnegie Mellon University "
An Observational Investigation of Reverse Engineers’ Processes
Daniel Votipka and Seth Rabin, University of Maryland; Kristopher Micinski, Syracuse University; Jeffrey S. Foster, Tufts University; Michelle L. Mazurek, University of Maryland
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Emily Tseng, Cornell University; Rosanna Bellini, Open Lab, Newcastle University; Nora McDonald, University of Maryland, Baltimore County; Matan Danos, Weizmann Institute of Science; Rachel Greenstadt and Damon McCoy, New York University; Nicola Dell and Thomas Ristenpart, Cornell Tech
DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists
Kasra Edalatnejad and Wouter Lueks, EPFL; Julien Pierre Martin, unaffiliated; Soline Ledésert, Anne L'Hôte, and Bruno Thomas, ICIJ; Laurent Girod and Carmela Troncoso, EPFL
I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp
"Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, and Brahmnoor Singh Chawla, Princeton University; Marshini Chetty, University of Chicago "
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security
"Charles Weir, Lancaster University; Ben Hermann, Paderborn University; Sascha Fahl, Leibniz University Hannover "

EuroS&P 2020 (会議のWebサイト)

Multi-country Study of Third Party Trackers from Real Browser Histories
X. Hu, G. Suarez-Tangil, N. Sastry
X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies
D. Sempreboni, L. Vigano
"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information
A. Jenkins, P. Kalligeros, M. Wolters, K. Vaniea
User Attitudes On Direct-to-Consumer Genetic Testing
D. Saha, A. Chan, B. Stacy, K. Javkar, S. Patkar, M. Mazurek

EuroUSEC 2020 (会議のWebサイト)

A Cross-Platform Evaluation of User Online Privacy
Maryam Mehrnezhad (Newcastle University)
Data Sharing in Mobile Apps — User Privacy Expectations in Europe
Nils Quermann (Ruhr-Universitat Bochum), Martin Degeling (Ruhr-Universitat Bochum
GDPR Reality Check – Claiming and Investigating Personally Identifiable Data from Companies
Fatemeh Alizadeh (University of Siegen); Timo Jakobi (University of Siegen); Alexander Boden (Fraunhofer Institute for Applied Information Technology); Gunnar Stevens (University of Siegen); Jens Boldt (University of Siegen)
Analysis of Publicly Available Anti-Phishing Webpages: Contradicting Information, Lack of Concrete Advice and Very Narrow Attack Vector
Mattia Mossano (Karlsruhe Institute of Technology), Kami Vaniea (University of Edinburgh), Lukas Aldag (Karlsruhe Institute of Technology), Reyhan Duzgun (Karlsruhe Institute of Technology), Peter Mayer (Karlsruhe Institute of Technology), Melanie Volkamer (Karlsruhe Institute of Technology)
Investigating Teenagers' Ability to Detect Phishing Messages
James Nicholson (Northumbria University), Yousra Javed (National University of Sciences and Technology), Matt Dixon (Northumbria University), Lyne Coventry (Northumbria University), Opeyemi Dele Ajayi (Northumbria University), Philip Anderson (Northumbria University)
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan
Elham Al Qahtani (UNC Charlotte), Yousra Javed (National University of Sciences & Technology), Heather Lipford (UNC Charlotte), Mohamed Shehab (UNC Charlotte)
Vision: I Don't Want to Use My Phone! A Cognitive Walkthrough for YubiKeys
Claudia Bischoff (University of Bonn); Eva Gerlitz (FraunhoferKIE); Matthew Smith (University of Bonn /raunhoferKIE)
Vision: Investigating Web APIeveloper Experience in Relation to Terms of Service andrivacyolicies
Aidah Ichario (Heriot-Watt University), Manuel Maarek (Heriot-Watt University)
Vision: Shred If Insecure –ersuasive Messageesign as a Lesson and Alternative torevious Approaches to Usable Secure Email Interface
Jan Tolsdorf (TH Köln - University of Applied Sciences); Luigi Lo Iacono (Hochschule Bonn-Rhein-Sieg
Vision: What If They Allie? Crypto Requirementsor Keyeople
Chan Nam Ngo (University of Trento);anieleriolo (Sapienza University of Rome);abio Massacci (University of Trento);aniele Venturi (Sapienza University of Rome); Ettore Battaiola (Cassa Centrale Banca
Vision: Why Johnny Can't Configure Smart Home? A Behaviouralrameworkor Smart Homerivacy Configuratio
Joseph Shams (King's College London), Nalin A. G. Arachchilage (La Trobe University), Jose M. Such (King's College London)
Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance
Magdalene Ng (Newcastle University), Kovila P.L. Coopamootoo (Newcastle University), Ehsan Toreini (Newcastle University), Mhairi Aitken (Newcastle University), Karen Elliot (Newcastle University), Aad van Moorsel (Newcastle University)
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries
Karoline Busse (University of Bonn), Mohammad Tahaei (University of Edinburgh), Katharina Krombholz (CISPA Helmholtz Center for Information Security), Emanuel von Zezschwitz (University of Bonn), Matthew Smith (University of Bonn/Fraunhofer FKIE), Jing Tian (Zhejiang University), Wenyuan Xu (Zhejiang University)
Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study
Wei Bai (University of Maryland), Michael Pearson (University of Maryland), Patrick Gage Kelley (Google), Michelle L. Mazurek (University of Maryland)
Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
Verena Distler (University of Luxembourg); Carine Lallemand (University of Luxembourg / Eindhoven University of Technology); Vincent Koenig (University of Luxembourg)
End User and Expert Perceptions of Threats and Potential Countermeasures
Simon Anell (CISPA Helmholtz Center for Information Security), Lea Grober (CISPA Helmholtz Center for Information Security), Katharina Krombholz (CISPA Helmholtz Center for Information Security)
Security Should Be There By Default: Investigating How Journalists Perceive and Respond to Risks From the Internet of Things
Anjuli R. K. Shere (University of Oxford); Jason R. C. Nurse (University of Kent); Ivan Flechais (University of Oxford)
Tech Pains: Characterizations of Lived Cybersecurity Experiences
Huixin Tian (Indiana University Bloomington), Chris Kanich (University of Illinois, Chicago), Jason Polakis (University of Illinois, Chicago), Sameer Patil (Indiana University Bloomington)

AsiaCCS 2020 (会議のWebサイト)

Measuring the Impact of the GDPR on Data Sharing in Ad Networks
Tobias Urban (Insitute for Internet Security; Westphalian University of Applied Sciences); Dennis Tatang, Martin Degeling, and Thorsten Holz (Ruhr University Bochum; Horst Görtz Institute for IT Security); Norbert Pohlmann (Insitute for Internet Security; Westphalian University of Applied Sciences)
"Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders "
"Shahryar Baki, Rakesh Verma, and Omprakash Gnawali (University of Houston "
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts
Tingmin Wu and Rongjunchen Zhang (Swinburne University of Technology; CSIRO's Data61); Wanlun Ma (University of Electronic Science and Technology of China); Sheng Wen (Swinburne University of Technology); Xin Xia (Monash University); Cecile Paris and Surya Nepal (CSIRO's Data61); Yang Xiang (Digital Research & Innovation Capability Platform, Swinburne University of Technology)
Be the Phisher - Understanding Users' Perception of Malicious Domains
Florian Quinkert (Ruhr University Bochum); Martin Degeling (Ruhr University Bochum; Horst Görtz Institute for IT Security); Jim Blythe (ISI, University of Southern California); Thorsten Holz (Ruhr-University Bochum)

運営について

お問い合わせ先

uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)