default search action
13th SOUPS 2017: Santa Clara, CA, USA
- Thirteenth Symposium on Usable Privacy and Security, SOUPS 2017, Santa Clara, CA, USA, July 12-14, 2017. USENIX Association 2017
Authentication
- Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Diversify to Survive: Making Passwords Stronger with Adaptive Policies. 1-12 - Peter Mayer, Jan Kirchner, Melanie Volkamer:
A Second Look at Password Composition Policies in the Wild: Comparing Samples from 2010 and 2016. 13-28 - Elham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent E. Seamons, Daniel Zappala:
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. 29-47 - Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, Nhan Nguyen:
"...better to use a lock screen than to worry about saving a few seconds of time": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. 49-63
Specific User Populations
- Eric Zeng, Shrirang Mare, Franziska Roesner:
End User Security and Privacy Concerns with Smart Homes. 65-80 - Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl:
Security Developer Studies with GitHub Users: Exploring a Convenience Sample. 81-95 - Jasmine D. Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler:
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. 97-114 - Dan Conway, Ronnie Taib, Mitch Harris, Kun Yu, Shlomo Berkovsky, Fang Chen:
A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing. 115-129
Mobile
- Khaled Baqer, Ross J. Anderson, Lorna Mutegi, Jeunese A. Payne, Joseph Sevilla:
DigiTally: Piloting Offline Payments for Phones. 131-143 - Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David A. Wagner, Nathan Good, Jung-Wei Chen:
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. 145-162 - Heather Crawford, Ebad Ahmadzadeh:
Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics. 163-173 - Arunesh Mathur, Marshini Chetty:
Impact of User Characteristics on Attitudes Towards Automatic Mobile Application Updates. 175-193 - Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft:
Exploring decision making with Android's runtime permission dialogs using in-context surveys. 195-210
Behaviour
- Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent E. Seamons:
Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture. 211-228 - Elmer Lastdrager, Inés Carvajal Gallardo, Pieter H. Hartel, Marianne Junger:
How Effective is Anti-Phishing Training for Children? 229-239 - Kopo M. Ramokapane, Awais Rashid, Jose M. Such:
"I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping Strategies. 241-256 - Emilee J. Rader, Janine Slaker:
The importance of visibility for folk theories of sensor data. 257-270
Attacks and Defense
- Casey Inez Canfield, Alex Davis, Baruch Fischhoff, Alain Forget, Sarah Pearman, Jeremy Thomas:
Replication: Challenges in Using Data Logs to Validate Phishing Detection Ability Metrics. 271-284 - James Nicholson, Lynne M. Coventry, Pam Briggs:
Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. 285-298 - Sonam Samat, Alessandro Acquisti, Linda Babcock:
Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions. 299-319 - Merve Sahin, Marc Relieu, Aurélien Francillon:
Using chatbots against voice spam: Analyzing Lenny's effectiveness. 319-337
Privacy
- Yu Pu, Jens Grossklags:
Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter? 339-355 - Cara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer:
Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. 357-375 - Sonam Samat, Alessandro Acquisti:
Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions. 377-384 - Kevin Gallagher, Sameer Patil, Nasir D. Memon:
New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. 385-398 - Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman M. Sadeh:
Privacy Expectations and Preferences in an IoT World. 399-412
Paper Talks 1
- Sonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities. - Huichuan Xia, Yun Huang, Yang Wang:
Victim Privacy in Crowdsourcing Based Public Safety Reporting: A Case Study of LiveSafe.
Paper Talks 2
- Shrirang Mare, Aditya Vashistha, Richard J. Anderson:
Security and privacy design considerations for low-literate users in developing regions.
Paper Talks 3
- Adam Houser, Matthew L. Bolton:
Formal Mental Models for Inclusive Privacy and Security. - Eunjin Jung, Evelyn Y. Ho:
Inclusive persuasion for security software adoption.
Usable Authentication
- Maximilian Golla, Daniel V. Bailey, Markus Dürmuth:
"I want my money back!" Limiting Online Password-Guessing Financially. - Toan Nguyen, Nasir D. Memon:
Smartwatches Locking Methods: A Comparative Study. - Ann-Marie Horcher:
Key-bored to Tears: The Usability Cost of Character Authentication on Mobile Devices. - Elissa M. Redmiles, Everest Liu, Michelle L. Mazurek:
You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.
Distributed Authentication
- Patricia Arias Cabarcos, Christian Krupitzer:
On the Design of Distributed Adaptive Authentication Systems. - Tuan Ngyuen, Jonathan Voris:
Touchscreen Biometrics Across Multiple Devices. - Christopher Novak, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques. - Trevor Smith, Scott Ruoti, Kent E. Seamons:
Augmenting Centralized Password Management with Application-Specific Passwords.
Cognition and Passwords
- Nicholas Micallef, Nalin Asanka Gamagedara Arachchilage:
A Gamified Approach to Improve Users' Memorability of Fall-back Authentication.
Paper Session I
- Andrew M'manga, Shamal Faily, John McAlaney, Christopher Williams:
Folk Risk Analysis: Factors Influencing Security Analysts' Interpretation of Risk. - Alberto Zanutto, Ben Shreeve, Karolina Follis, Jerry S. Busby, Awais Rashid:
The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems. - Julie M. Haney, Wayne G. Lutters:
Skills and Characteristics of Successful Cybersecurity Advocates.
Paper Session II
- Stacey Watson, Heather Richter Lipford:
A Proposed Visualization for Vulnerability Scan Data. - Bobby Filar, Richard Seymour, Matthew Park:
Ask Me Anything: A Conversational Interface to Augment Information Security Workers. - Madiha Tabassum, Stacey Watson, Heather Richter Lipford:
Comparing Educational Approaches to Secure programming: Tool vs. TA.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.