default search action
BibTeX records: Adam J. Aviv
@article{DBLP:journals/popets/FarkeBGA24, author = {Florian M. Farke and David G. Balash and Maximilian Golla and Adam J. Aviv}, title = {How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions?}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {2}, pages = {372--390}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0055}, doi = {10.56553/POPETS-2024-0055}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/FarkeBGA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AliBKKA24, author = {Mir Masood Ali and David G. Balash and Monica Kodwani and Chris Kanich and Adam J. Aviv}, title = {Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {4}, pages = {142--166}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0111}, doi = {10.56553/POPETS-2024-0111}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AliBKKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HutchinsonMA024, author = {Adryana Hutchinson and Collins W. Munyendo and Adam J. Aviv and Peter Mayer}, editor = {Florian 'Floyd' Mueller and Penny Kyburz and Julie R. Williamson and Corina Sas}, title = {An Analysis of Password Managers' Password Checkup Tools}, booktitle = {Extended Abstracts of the {CHI} Conference on Human Factors in Computing Systems, {CHI} {EA} 2024, Honolulu, HI, USA, May 11-16, 2024}, pages = {38:1--38:7}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3613905.3650741}, doi = {10.1145/3613905.3650741}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HutchinsonMA024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/TranTHAZ24, author = {Mindy Tran and Xinru Tang and Adryana Hutchinson and Adam J. Aviv and Yixin Zou}, title = {Position Paper: Exploring Security and Privacy Needs of d/Deaf Individuals}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}PW 2024, Vienna, Austria, July 8-12, 2024}, pages = {678--682}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuroSPW61312.2024.00082}, doi = {10.1109/EUROSPW61312.2024.00082}, timestamp = {Thu, 05 Sep 2024 16:02:09 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/TranTHAZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BalashAKA24, author = {David G. Balash and Mir Masood Ali and Chris Kanich and Adam J. Aviv}, editor = {Patrick Gage Kelley and Apu Kapadia}, title = {"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps}, booktitle = {Twentieth Symposium on Usable Privacy and Security, {SOUPS} 2024, Philadelphia, PA, USA, August 11-13, 2024}, pages = {413--432}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/soups2024/presentation/balash}, timestamp = {Thu, 05 Sep 2024 14:24:03 +0200}, biburl = {https://dblp.org/rec/conf/soups/BalashAKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-15308, author = {Yixin Zou and Khue Le and Peter Mayer and Alessandro Acquisti and Adam J. Aviv and Florian Schaub}, title = {Nudging Users to Change Breached Passwords Using the Protection Motivation Theory}, journal = {CoRR}, volume = {abs/2405.15308}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.15308}, doi = {10.48550/ARXIV.2405.15308}, eprinttype = {arXiv}, eprint = {2405.15308}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-15308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tochi/MayerZLDLSA23, author = {Peter Mayer and Yixin Zou and Byron M. Lowens and Hunter A. Dyer and Khue Le and Florian Schaub and Adam J. Aviv}, title = {Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {30}, number = {5}, pages = {77:1--77:53}, year = {2023}, url = {https://doi.org/10.1145/3589958}, doi = {10.1145/3589958}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tochi/MayerZLDLSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Munyendo0A23, author = {Collins W. Munyendo and Peter Mayer and Adam J. Aviv}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3123--3137}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623150}, doi = {10.1145/3576915.3623150}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Munyendo0A23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalashAKWKA23, author = {David G. Balash and Mir Masood Ali and Monica Kodwani and Xiaoyuan Wu and Chris Kanich and Adam J. Aviv}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3600--3602}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624383}, doi = {10.1145/3576915.3624383}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalashAKWKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/BaileyMDGMA23, author = {Daniel V. Bailey and Collins W. Munyendo and Hunter A. Dyer and Miles Grant and Philipp Markert and Adam J. Aviv}, title = {"Someone Definitely Used 0000": Strategies}, booktitle = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023}, pages = {158--174}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617072.3617113}, doi = {10.1145/3617072.3617113}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/BaileyMDGMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MunyendoAA23, author = {Collins W. Munyendo and Yasemin Acar and Adam J. Aviv}, title = {"In Eighty Percent of the Cases, {I} Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {570--587}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179410}, doi = {10.1109/SP46215.2023.10179410}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MunyendoAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BergerSA23, author = {Harel Berger and Micah Sherr and Adam J. Aviv}, title = {Cadence: {A} Simulator for Human Movement-based Communication Protocols}, booktitle = {2023 Cyber Security Experimentation and Test Workshop, {CSET} 2023, Marina del Rey, CA, USA, August 7-8, 2023}, pages = {26--31}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3607505.3607507}, doi = {10.1145/3607505.3607507}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BergerSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BalashKGAFS23, author = {David G. Balash and Elena Korkes and Miles Grant and Adam J. Aviv and Rahel A. Fainchtein and Micah Sherr}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Educators' Perspectives of Using (or Not Using) Online Exam Proctoring}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5091--5108}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/balash}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BalashKGAFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-12936, author = {David G. Balash and Rahel A. Fainchtein and Elena Korkes and Miles Grant and Micah Sherr and Adam J. Aviv}, title = {Educators' Perspectives of Using (or Not Using) Online Exam Proctoring}, journal = {CoRR}, volume = {abs/2302.12936}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.12936}, doi = {10.48550/ARXIV.2302.12936}, eprinttype = {arXiv}, eprint = {2302.12936}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-12936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-17063, author = {Mir Masood Ali and David G. Balash and Chris Kanich and Adam J. Aviv}, title = {Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies}, journal = {CoRR}, volume = {abs/2306.17063}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.17063}, doi = {10.48550/ARXIV.2306.17063}, eprinttype = {arXiv}, eprint = {2306.17063}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-17063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-13813, author = {Florian M. Farke and David G. Balash and Maximilian Golla and Adam J. Aviv}, title = {How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions?}, journal = {CoRR}, volume = {abs/2312.13813}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.13813}, doi = {10.48550/ARXIV.2312.13813}, eprinttype = {arXiv}, eprint = {2312.13813}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-13813.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FainchteinAS22, author = {Rahel A. Fainchtein and Adam J. Aviv and Micah Sherr}, title = {User Perceptions of the Privacy and Usability of Smart {DNS}}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {591--604}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567978}, doi = {10.1145/3564625.3567978}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FainchteinAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WuMCFLA22, author = {Xiaoyuan Wu and Collins W. Munyendo and Eddie Cosic and Genevieve A. Flynn and Olivia Legault and Adam J. Aviv}, title = {User Perceptions of Five-Word Passwords}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {605--618}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567981}, doi = {10.1145/3564625.3567981}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WuMCFLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MinkYPA022, author = {Jaron Mink and Amanda Rose Yuile and Uma Pal and Adam J. Aviv and Adam Bates}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {448:1--448:21}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3502136}, doi = {10.1145/3491102.3502136}, timestamp = {Fri, 29 Apr 2022 13:37:13 +0200}, biburl = {https://dblp.org/rec/conf/chi/MinkYPA022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MunyendoAA22, author = {Collins W. Munyendo and Yasemin Acar and Adam J. Aviv}, title = {"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2304--2319}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833779}, doi = {10.1109/SP46214.2022.9833779}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/MunyendoAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MayerMMA22, author = {Peter Mayer and Collins W. Munyendo and Michelle L. Mazurek and Adam J. Aviv}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Why Users (Don't) Use Password Managers at a Large Educational Institution}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1849--1866}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/mayer}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MayerMMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BalashWGRA22, author = {David G. Balash and Xiaoyuan Wu and Miles Grant and Irwin Reyes and Adam J. Aviv}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Security and Privacy Perceptions of Third-Party Application Access for Google Accounts}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3397--3414}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/balash}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BalashWGRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MunyendoMNGKUA22, author = {Collins W. Munyendo and Philipp Markert and Alexandra Nisenoff and Miles Grant and Elena Korkes and Blase Ur and Adam J. Aviv}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4023--4040}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/munyendo}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MunyendoMNGKUA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/w4a/RayKA22, author = {Hirak Ray and Ravi Kuber and Adam J. Aviv}, editor = {Dragan Ahmetovic and Victoria Yaneva}, title = {Investigating older adults' adoption and usage of online conferencing tools during {COVID-19}}, booktitle = {W4A'22: 19th Web for All Conference, Lyon, France, April 25 - 26, 2022}, pages = {27:1--27:11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3493612.3520447}, doi = {10.1145/3493612.3520447}, timestamp = {Tue, 03 May 2022 16:18:30 +0200}, biburl = {https://dblp.org/rec/conf/w4a/RayKA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-02658, author = {David G. Balash and Mir Masood Ali and Xiaoyuan Wu and Chris Kanich and Adam J. Aviv}, title = {Longitudinal Analysis of Privacy Labels in the Apple App Store}, journal = {CoRR}, volume = {abs/2206.02658}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.02658}, doi = {10.48550/ARXIV.2206.02658}, eprinttype = {arXiv}, eprint = {2206.02658}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-02658.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RayWKA21, author = {Hirak Ray and Flynn Wolf and Ravi Kuber and Adam J. Aviv}, title = {"Warn Them" or "Just Block Them"?: Investigating Privacy Concerns Among Older and Working Age Adults}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {2}, pages = {27--47}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0016}, doi = {10.2478/POPETS-2021-0016}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/RayWKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/FainchteinASRK21, author = {Rahel A. Fainchtein and Adam J. Aviv and Micah Sherr and Stephen Ribaudo and Armaan Khullar}, title = {Holes in the Geofence: Privacy Vulnerabilities in "Smart" {DNS} Services}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {2}, pages = {151--172}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0022}, doi = {10.2478/POPETS-2021-0022}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/FainchteinASRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MarkertBGDA21, author = {Philipp Markert and Daniel V. Bailey and Maximilian Golla and Markus D{\"{u}}rmuth and Adam J. Aviv}, title = {On the Security of Smartphone Unlock PINs}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {30:1--30:36}, year = {2021}, url = {https://doi.org/10.1145/3473040}, doi = {10.1145/3473040}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MarkertBGDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MartinyKARW21, author = {Ian Martiny and Gabriel Kaptchuk and Adam J. Aviv and Daniel S. Roche and Eric Wustrow}, title = {Improving Signal's Sealed Sender}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/MartinyKARW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/MunyendoGMFA21, author = {Collins W. Munyendo and Miles Grant and Philipp Markert and Timothy J. Forman and Adam J. Aviv}, editor = {Sonia Chiasson}, title = {Using a Blocklist to Improve the Security of User Selection of Android Patterns}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {37--56}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/munyendo}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/MunyendoGMFA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BaileyMA21, author = {Daniel V. Bailey and Philipp Markert and Adam J. Aviv}, editor = {Sonia Chiasson}, title = {"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {417--436}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/bailey}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/BaileyMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BalashKSFSA21, author = {David G. Balash and Dongkun Kim and Darikia Shaibekova and Rahel A. Fainchtein and Micah Sherr and Adam J. Aviv}, editor = {Sonia Chiasson}, title = {Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services}, booktitle = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021, August 8-10, 2021}, pages = {633--652}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/soups2021/presentation/balash}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/BalashKSFSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RayWKA21, author = {Hirak Ray and Flynn Wolf and Ravi Kuber and Adam J. Aviv}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Why Older Adults (Don't) Use Password Managers}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {73--90}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ray}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/RayWKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MayerZSA21, author = {Peter Mayer and Yixin Zou and Florian Schaub and Adam J. Aviv}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {393--410}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/mayer}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MayerZSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FarkeBGDA21, author = {Florian M. Farke and David G. Balash and Maximilian Golla and Markus D{\"{u}}rmuth and Adam J. Aviv}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {483--500}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/farke}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FarkeBGDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WolfAK21, author = {Flynn Wolf and Adam J. Aviv and Ravi Kuber}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Security Obstacles and Motivations for Small Businesses from a CISO's Perspective}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1199--1216}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/wolf}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WolfAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WarfordMMAM21, author = {Noel Warford and Collins W. Munyendo and Ashna Mediratta and Adam J. Aviv and Michelle L. Mazurek}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Strategies and Perceived Risks of Sending Sensitive Documents}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1217--1234}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/warford}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WarfordMMAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14066, author = {Florian M. Farke and David G. Balash and Maximilian Golla and Markus D{\"{u}}rmuth and Adam J. Aviv}, title = {Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version)}, journal = {CoRR}, volume = {abs/2105.14066}, year = {2021}, url = {https://arxiv.org/abs/2105.14066}, eprinttype = {arXiv}, eprint = {2105.14066}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14066.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-14619, author = {Noel Warford and Collins W. Munyendo and Ashna Mediratta and Adam J. Aviv and Michelle L. Mazurek}, title = {Strategies and Perceived Risks of Sending Sensitive Documents}, journal = {CoRR}, volume = {abs/2105.14619}, year = {2021}, url = {https://arxiv.org/abs/2105.14619}, eprinttype = {arXiv}, eprint = {2105.14619}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-14619.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-05917, author = {David G. Balash and Dongkun Kim and Darikia Shaibekova and Rahel A. Fainchtein and Micah Sherr and Adam J. Aviv}, title = {Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services}, journal = {CoRR}, volume = {abs/2106.05917}, year = {2021}, url = {https://arxiv.org/abs/2106.05917}, eprinttype = {arXiv}, eprint = {2106.05917}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-05917.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-09006, author = {Daniel V. Bailey and Philipp Markert and Adam J. Aviv}, title = {"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs}, journal = {CoRR}, volume = {abs/2106.09006}, year = {2021}, url = {https://arxiv.org/abs/2106.09006}, eprinttype = {arXiv}, eprint = {2106.09006}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-09006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03573, author = {David G. Balash and Xiaoyuan Wu and Miles Grant and Irwin Reyes and Adam J. Aviv}, title = {Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version)}, journal = {CoRR}, volume = {abs/2111.03573}, year = {2021}, url = {https://arxiv.org/abs/2111.03573}, eprinttype = {arXiv}, eprint = {2111.03573}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FormanA20, author = {Timothy J. Forman and Adam J. Aviv}, title = {Double Patterns: {A} Usable Solution to Increase the Security of Android Unlock Patterns}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {219--233}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427252}, doi = {10.1145/3427228.3427252}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FormanA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KhanCSA0K20, author = {Hassan Khan and Jason Ceci and Jonah Stegman and Adam J. Aviv and Rozita Dara and Ravi Kuber}, title = {Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: {A} Holistic View of {PIN} Authentication in Digital Lives and Beyond}, booktitle = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}, pages = {249--262}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3427228.3427240}, doi = {10.1145/3427228.3427240}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KhanCSA0K20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/FormanRA20, author = {Timothy J. Forman and Daniel S. Roche and Adam J. Aviv}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Twice as Nice? {A} Preliminary Evaluation of Double Android Unlock Patterns}, booktitle = {Extended Abstracts of the 2020 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2020, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--7}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3334480.3382922}, doi = {10.1145/3334480.3382922}, timestamp = {Wed, 12 Jun 2024 07:39:18 +0200}, biburl = {https://dblp.org/rec/conf/chi/FormanRA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SamuelMAN20, author = {Raina Samuel and Philipp Markert and Adam J. Aviv and Iulian Neamtiu}, editor = {Heather Richter Lipford and Sonia Chiasson}, title = {Knock, Knock. Who's There? On the Security of LG's Knock Codes}, booktitle = {Sixteenth Symposium on Usable Privacy and Security, {SOUPS} 2020, August 7-11, 2020}, pages = {37--59}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/soups2020/presentation/samuel}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/SamuelMAN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MarkertBGDA20, author = {Philipp Markert and Daniel V. Bailey and Maximilian Golla and Markus D{\"{u}}rmuth and Adam J. Aviv}, title = {This {PIN} Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {286--303}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00100}, doi = {10.1109/SP40000.2020.00100}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/MarkertBGDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-04868, author = {Philipp Markert and Daniel V. Bailey and Maximilian Golla and Markus D{\"{u}}rmuth and Adam J. Aviv}, title = {This {PIN} Can Be Easily Guessed}, journal = {CoRR}, volume = {abs/2003.04868}, year = {2020}, url = {https://arxiv.org/abs/2003.04868}, eprinttype = {arXiv}, eprint = {2003.04868}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-04868.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-03556, author = {Raina Samuel and Philipp Markert and Adam J. Aviv and Iulian Neamtiu}, title = {Knock, Knock. Who's There? On the Security of LG's Knock Codes}, journal = {CoRR}, volume = {abs/2006.03556}, year = {2020}, url = {https://arxiv.org/abs/2006.03556}, eprinttype = {arXiv}, eprint = {2006.03556}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-03556.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-10681, author = {Timothy J. Forman and Adam J. Aviv}, title = {Double Patterns: {A} Usable Solution to Increase the Security of Android Unlock Patterns}, journal = {CoRR}, volume = {abs/2008.10681}, year = {2020}, url = {https://arxiv.org/abs/2008.10681}, eprinttype = {arXiv}, eprint = {2008.10681}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-10681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-10697, author = {Hassan Khan and Jason Ceci and Jonah Stegman and Adam J. Aviv and Rozita Dara and Ravi Kuber}, title = {Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: {A} Holistic View of {PIN} Authentication in Digital Lives and Beyond}, journal = {CoRR}, volume = {abs/2008.10697}, year = {2020}, url = {https://arxiv.org/abs/2008.10697}, eprinttype = {arXiv}, eprint = {2008.10697}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-10697.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-01973, author = {Hirak Ray and Flynn Wolf and Ravi Kuber and Adam J. Aviv}, title = {Why Older Adults (Don't) Use Password Managers}, journal = {CoRR}, volume = {abs/2010.01973}, year = {2020}, url = {https://arxiv.org/abs/2010.01973}, eprinttype = {arXiv}, eprint = {2010.01973}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-01973.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-07944, author = {Rahel A. Fainchtein and Adam J. Aviv and Micah Sherr and Stephen Ribaudo and Armaan Khullar}, title = {Holes in the Geofence: Privacy Vulnerabilities in "Smart" {DNS} Services}, journal = {CoRR}, volume = {abs/2012.07944}, year = {2020}, url = {https://arxiv.org/abs/2012.07944}, eprinttype = {arXiv}, eprint = {2012.07944}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-07944.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/RayWKA19, author = {Hirak Ray and Flynn Wolf and Ravi Kuber and Adam J. Aviv}, editor = {Regan L. Mandryk and Stephen A. Brewster and Mark Hancock and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos and Mark Perry}, title = {"Woe is me": Examining Older Adults' Perceptions of Privacy}, booktitle = {Extended Abstracts of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290607.3312770}, doi = {10.1145/3290607.3312770}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/RayWKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WolfKA19, author = {Flynn Wolf and Ravi Kuber and Adam J. Aviv}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {"Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {151}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300381}, doi = {10.1145/3290605.3300381}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WolfKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChakrabortiACMR19, author = {Anrin Chakraborti and Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche and Radu Sion}, title = {rORAM: Efficient Range {ORAM} with O(log2 {N)} Locality}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/roram-efficient-range-oram-with-olog2-n-locality/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChakrabortiACMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/WolfKA18, author = {Flynn Wolf and Ravi Kuber and Adam J. Aviv}, title = {An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication}, journal = {Behav. Inf. Technol.}, volume = {37}, number = {4}, pages = {320--334}, year = {2018}, url = {https://doi.org/10.1080/0144929X.2018.1436591}, doi = {10.1080/0144929X.2018.1436591}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/behaviourIT/WolfKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WolfAK18, author = {Flynn Wolf and Adam J. Aviv and Ravi Kuber}, title = {"It's all about the start" classifying eyes-free mobile authentication techniques}, journal = {J. Inf. Secur. Appl.}, volume = {41}, pages = {28--40}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.05.004}, doi = {10.1016/J.JISA.2018.05.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WolfAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YeTFCWAW18, author = {Guixin Ye and Zhanyong Tang and Dingyi Fang and Xiaojiang Chen and Willy Wolff and Adam J. Aviv and Zheng Wang}, title = {A Video-based Attack for Android Pattern Lock}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {19:1--19:31}, year = {2018}, url = {https://doi.org/10.1145/3230740}, doi = {10.1145/3230740}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YeTFCWAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivWK18, author = {Adam J. Aviv and Flynn Wolf and Ravi Kuber}, title = {Comparing Video Based Shoulder Surfing with Live Simulation}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {453--466}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274702}, doi = {10.1145/3274694.3274702}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivWK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/WolfKA18, author = {Flynn Wolf and Ravi Kuber and Adam J. Aviv}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {How Do We Talk Ourselves Into These Things?}, booktitle = {Extended Abstracts of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3170427.3188578}, doi = {10.1145/3170427.3188578}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/WolfKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/SonchackAKS18, author = {John Sonchack and Adam J. Aviv and Eric Keller and Jonathan M. Smith}, editor = {Rui Oliveira and Pascal Felber and Y. Charlie Hu}, title = {Turboflow: information rich flow record generation on commodity switches}, booktitle = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018}, pages = {11:1--11:16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3190508.3190558}, doi = {10.1145/3190508.3190558}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosys/SonchackAKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/SonchackMAKS18, author = {John Sonchack and Oliver Michel and Adam J. Aviv and Eric Keller and Jonathan M. Smith}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow}, booktitle = {Proceedings of the 2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {823--835}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/sonchack}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/SonchackMAKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-07518, author = {Adam J. Aviv and Ravi Kuber}, title = {Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication}, journal = {CoRR}, volume = {abs/1801.07518}, year = {2018}, url = {http://arxiv.org/abs/1801.07518}, eprinttype = {arXiv}, eprint = {1801.07518}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-07518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-12539, author = {Flynn Wolf and Adam J. Aviv and Ravi Kuber}, title = {Classifying Eyes-Free Mobile Authentication Techniques}, journal = {CoRR}, volume = {abs/1805.12539}, year = {2018}, url = {http://arxiv.org/abs/1805.12539}, eprinttype = {arXiv}, eprint = {1805.12539}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-12539.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-08640, author = {Adam J. Aviv and Flynn Wolf and Ravi Kuber}, title = {Comparing Video Based Shoulder Surfing with Live Simulation}, journal = {CoRR}, volume = {abs/1809.08640}, year = {2018}, url = {http://arxiv.org/abs/1809.08640}, eprinttype = {arXiv}, eprint = {1809.08640}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-08640.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-10548, author = {Adam J. Aviv and Markus D{\"{u}}rmuth}, title = {A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns}, journal = {CoRR}, volume = {abs/1811.10548}, year = {2018}, url = {http://arxiv.org/abs/1811.10548}, eprinttype = {arXiv}, eprint = {1811.10548}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-10548.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortiACMR18, author = {Anrin Chakraborti and Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche and Radu Sion}, title = {Efficient Range {ORAM} with {\unicode{54598}}(log\({}^{\mbox{2}}\)N) Locality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2018}, url = {https://eprint.iacr.org/2018/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortiACMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/AvivKB17, author = {Adam J. Aviv and Ravi Kuber and Devon Budzitowski}, title = {Is Bigger Better When It Comes to Android Graphical Pattern Unlock?}, journal = {{IEEE} Internet Comput.}, volume = {21}, number = {6}, pages = {46--51}, year = {2017}, url = {https://doi.org/10.1109/MIC.2017.4180833}, doi = {10.1109/MIC.2017.4180833}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/AvivKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivDWK17, author = {Adam J. Aviv and John T. Davin and Flynn Wolf and Ravi Kuber}, title = {Towards Baselines for Shoulder Surfing on Mobile Authentication}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {486--498}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134609}, doi = {10.1145/3134600.3134609}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivDWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/assets/WolfKA17, author = {Flynn Wolf and Ravi Kuber and Adam J. Aviv}, editor = {Amy Hurst and Leah Findlater and Meredith Ringel Morris}, title = {Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind}, booktitle = {Proceedings of the 19th International {ACM} {SIGACCESS} Conference on Computers and Accessibility, {ASSETS} 2017, Baltimore, MD, USA, October 29 - November 01, 2017}, pages = {385--386}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132525.3134793}, doi = {10.1145/3132525.3134793}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/assets/WolfKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RocheACM17, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Deterministic, Stash-Free Write-Only {ORAM}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {507--521}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134051}, doi = {10.1145/3133956.3134051}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RocheACM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DavinAWK17, author = {John T. Davin and Adam J. Aviv and Flynn Wolf and Ravi Kuber}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017, Extended Abstracts}, pages = {2496--2503}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3027063.3053221}, doi = {10.1145/3027063.3053221}, timestamp = {Tue, 06 Nov 2018 16:58:46 +0100}, biburl = {https://dblp.org/rec/conf/chi/DavinAWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AvivCMR17, author = {Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche}, title = {ObliviSync: Practical Oblivious File Backup and Synchronization}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/oblivisync-practical-oblivious-file-backup-and-synchronization/}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/AvivCMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RocheACM17, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry}, title = {Deterministic, Stash-Free Write-Only {ORAM}}, journal = {CoRR}, volume = {abs/1706.03827}, year = {2017}, url = {http://arxiv.org/abs/1706.03827}, eprinttype = {arXiv}, eprint = {1706.03827}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RocheACM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-04959, author = {Adam J. Aviv and John T. Davin and Flynn Wolf and Ravi Kuber}, title = {Towards Baselines for Shoulder Surfing on Mobile Authentication}, journal = {CoRR}, volume = {abs/1709.04959}, year = {2017}, url = {http://arxiv.org/abs/1709.04959}, eprinttype = {arXiv}, eprint = {1709.04959}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-04959.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RocheACM17, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry}, title = {Deterministic, Stash-Free Write-Only {ORAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2017}, url = {http://eprint.iacr.org/2017/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RocheACM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SonchackA16, author = {John Sonchack and Adam J. Aviv}, title = {Exploring large scale security system reproducibility with the {LESS} simulator}, journal = {J. Comput. Secur.}, volume = {24}, number = {5}, pages = {645--665}, year = {2016}, url = {https://doi.org/10.3233/JCS-160553}, doi = {10.3233/JCS-160553}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SonchackA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/NarkhedeJACRF16, author = {Vaishali Narkhede and Karuna P. Joshi and Adam J. Aviv and Seung Geol Choi and Daniel S. Roche and Tim Finin}, title = {Managing Cloud Storage Obliviously}, booktitle = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {990--993}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CLOUD.2016.0151}, doi = {10.1109/CLOUD.2016.0151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/NarkhedeJACRF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SonchackDASK16, author = {John Sonchack and Anurag Dubey and Adam J. Aviv and Jonathan M. Smith and Eric Keller}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Timing-based reconnaissance and defense in software-defined networks}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {89--100}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991081}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SonchackDASK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SonchackAK16, author = {John Sonchack and Adam J. Aviv and Eric Keller}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Timing {SDN} Control Planes to Infer Network Configurations}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016}, pages = {19--22}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2876019.2876030}, doi = {10.1145/2876019.2876030}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/SonchackAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SonchackSAK16, author = {John Sonchack and Jonathan M. Smith and Adam J. Aviv and Eric Keller}, title = {Enabling Practical Software-defined Networking Security Applications with {OFX}}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enabling-practical-software-defined-networking-security-applications-ofx.pdf}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SonchackSAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/AvivDG16, author = {Adam J. Aviv and Markus D{\"{u}}rmuth and Payas Gupta}, title = {Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords}, booktitle = {Who Are You?! Adventures in Authentication, WAY@SOUPS 2016, Denver, CO, USA, June 22, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/workshop-program/way2016/presentation/aviv}, timestamp = {Thu, 05 Sep 2024 15:37:23 +0200}, biburl = {https://dblp.org/rec/conf/soups/AvivDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/WolfKA16, author = {Flynn Wolf and Ravi Kuber and Adam J. Aviv}, title = {Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication}, booktitle = {2nd Workshop on Security Information Workers, WSIW@SOUPS 2016, Denver, CO, USA, June 22, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/workshop-program/wsiw16/presentation/wolf}, timestamp = {Thu, 05 Sep 2024 15:37:23 +0200}, biburl = {https://dblp.org/rec/conf/soups/WolfKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RocheAC16, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi}, title = {A Practical Oblivious Map Data Structure with Secure Deletion and History Independence}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {178--197}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.19}, doi = {10.1109/SP.2016.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/RocheAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AvivCMR16, author = {Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche}, title = {ObliviSync: Practical Oblivious File Backup and Synchronization}, journal = {CoRR}, volume = {abs/1605.09779}, year = {2016}, url = {http://arxiv.org/abs/1605.09779}, eprinttype = {arXiv}, eprint = {1605.09779}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AvivCMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvivCMR16, author = {Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche}, title = {ObliviSync: Practical Oblivious File Backup and Synchronization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2016}, url = {http://eprint.iacr.org/2016/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvivCMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SonchackAS15, author = {John Sonchack and Adam J. Aviv and Jonathan M. Smith}, title = {Cross-domain collaboration for improved {IDS} rule set selection}, journal = {J. Inf. Secur. Appl.}, volume = {24-25}, pages = {25--40}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2015.10.001}, doi = {10.1016/J.JISA.2015.10.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SonchackAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivBK15, author = {Adam J. Aviv and Devon Budzitowski and Ravi Kuber}, title = {Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {301--310}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818014}, doi = {10.1145/2818000.2818014}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SonchackAKS15, author = {John Sonchack and Adam J. Aviv and Eric Keller and Jonathan M. Smith}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} {OFX:} Enabling OpenFlow Extensions for Switch-Level Security Applications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1678--1680}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810120}, doi = {10.1145/2810103.2810120}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SonchackAKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RocheAC15, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi}, title = {Oblivious Secure Deletion with Bounded History Independence}, journal = {CoRR}, volume = {abs/1505.07391}, year = {2015}, url = {http://arxiv.org/abs/1505.07391}, eprinttype = {arXiv}, eprint = {1505.07391}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RocheAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RocheAC15, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi}, title = {A Practical Oblivious Map Data Structure with Secure Deletion and History Independence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1126}, year = {2015}, url = {http://eprint.iacr.org/2015/1126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RocheAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AvivBSS14, author = {Adam J. Aviv and Matt Blaze and Micah Sherr and Jonathan M. Smith}, title = {Privacy-aware message exchanges for HumaNets}, journal = {Comput. Commun.}, volume = {48}, pages = {30--43}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2014.03.013}, doi = {10.1016/J.COMCOM.2014.03.013}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/AvivBSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/WestA14, author = {Andrew G. West and Adam J. Aviv}, title = {Measuring Privacy Disclosures in {URL} Query Strings}, journal = {{IEEE} Internet Comput.}, volume = {18}, number = {6}, pages = {52--59}, year = {2014}, url = {https://doi.org/10.1109/MIC.2014.104}, doi = {10.1109/MIC.2014.104}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/WestA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivF14, author = {Adam J. Aviv and Dane Fichter}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {Understanding visual perceptions of usability and security of Android's graphical password pattern}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {286--295}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664253}, doi = {10.1145/2664243.2664253}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SonchackA14, author = {John Sonchack and Adam J. Aviv}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {{LESS} Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {365--382}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_21}, doi = {10.1007/978-3-319-11212-1\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SonchackA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SonchackAS13, author = {John Sonchack and Adam J. Aviv and Jonathan M. Smith}, editor = {Chris Kanich and Micah Sherr}, title = {Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems}, booktitle = {6th Workshop on Cyber Security Experimentation and Test, {CSET} '13, Washington, D.C., USA, August 12, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/cset13/workshop-program/presentation/sonchack}, timestamp = {Mon, 01 Feb 2021 08:43:03 +0100}, biburl = {https://dblp.org/rec/conf/uss/SonchackAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/AvivMOSXL12, author = {Adam J. Aviv and Vin Mannino and Thanat Owlarn and Seth Shannin and Kevin Xu and Boon Thau Loo}, title = {Experiences in teaching an educational user-level operating systems implementation project}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {46}, number = {2}, pages = {80--86}, year = {2012}, url = {https://doi.org/10.1145/2331576.2331588}, doi = {10.1145/2331576.2331588}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigops/AvivMOSXL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivSBS12, author = {Adam J. Aviv and Benjamin Sapp and Matt Blaze and Jonathan M. Smith}, editor = {Robert H'obbes' Zakon}, title = {Practicality of accelerometer side channels on smartphones}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {41--50}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420957}, doi = {10.1145/2420950.2420957}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AvivSBS12, author = {Adam J. Aviv and Micah Sherr and Matt Blaze and Jonathan M. Smith}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {181--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_11}, doi = {10.1007/978-3-642-33167-1\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AvivSBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AvivH11, author = {Adam J. Aviv and Andreas Haeberlen}, editor = {Sean Peisert and Stephen Schwab}, title = {Challenges in Experimenting with Botnet Detection Systems}, booktitle = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11, San Francisco, CA, USA, August 8, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/cset11/challenges-experimenting-botnet-detection-systems}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/AvivH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WestACL10, author = {Andrew G. West and Adam J. Aviv and Jian Chang and Insup Lee}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Spam mitigation using spatio-temporal reputations from blacklist history}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {161--170}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920287}, doi = {10.1145/1920261.1920287}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WestACL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/ReedAWHPS10, author = {Jason Reed and Adam J. Aviv and Daniel Wagner and Andreas Haeberlen and Benjamin C. Pierce and Jonathan M. Smith}, editor = {Manuel Costa and Engin Kirda}, title = {Differential privacy for collaborative security}, booktitle = {Proceedings of the Third European Workshop on System Security, {EUROSEC} 2010, Paris, France, April 13, 2010}, pages = {1--7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1752046.1752047}, doi = {10.1145/1752046.1752047}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/ReedAWHPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AvivSBS10, author = {Adam J. Aviv and Micah Sherr and Matt Blaze and Jonathan M. Smith}, editor = {Wietse Z. Venema}, title = {Evading Cellular Data Monitoring with Human Movement Networks}, booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/hotsec10/evading-cellular-data-monitoring-human-movement-networks}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/AvivSBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/AvivGMBS10, author = {Adam J. Aviv and Katherine L. Gibson and Evan Mossop and Matt Blaze and Jonathan M. Smith}, editor = {Charlie Miller and Hovav Shacham}, title = {Smudge Attacks on Smartphone Touch Screens}, booktitle = {4th {USENIX} Workshop on Offensive Technologies, {WOOT} '10, Washington, D.C., USA, August 9, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/woot10/smudge-attacks-smartphone-touch-screens}, timestamp = {Mon, 01 Feb 2021 08:41:52 +0100}, biburl = {https://dblp.org/rec/conf/woot/AvivGMBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/WestACPBKLSS09, author = {Andrew G. West and Adam J. Aviv and Jian Chang and Vinayak S. Prabhu and Matt Blaze and Sampath Kannan and Insup Lee and Jonathan M. Smith and Oleg Sokolsky}, editor = {Evangelos P. Markatos and Manuel Costa}, title = {QuanTM: a quantitative trust management system}, booktitle = {Proceedings of the Second European Workshop on System Security, {EUROSEC} 2009, Nuremburg, Germany, March 31, 2009}, pages = {28--35}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1519144.1519149}, doi = {10.1145/1519144.1519149}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosec/WestACPBKLSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/JohnsonAABK08, author = {Maritza L. Johnson and Chaitanya Atreya and Adam J. Aviv and Steven M. Bellovin and Gail E. Kaiser}, editor = {Elizabeth F. Churchill and Rachna Dhamija}, title = {{RUST:} {A} Retargetable Usability Testbed for Web Site Authentication Technologies}, booktitle = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA, USA, April 14, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/upsec08/tech/full\_papers/johnson/johnson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/JohnsonAABK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AvivCCCSSB08, author = {Adam J. Aviv and Pavol Cern{\'{y}} and Sandy Clark and Eric Cronin and Gaurav Shah and Micah Sherr and Matt Blaze}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Security Evaluation of ES{\&}S Voting Machines and Election Management System}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/aviv/aviv.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AvivCCCSSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AvivLPK07, author = {Adam J. Aviv and Michael E. Locasto and Shaya Potter and Angelos D. Keromytis}, title = {{SSARES:} Secure Searchable Automated Remote Email Storage}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {129--139}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.30}, doi = {10.1109/ACSAC.2007.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AvivLPK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.