BibTeX records: Adam J. Aviv

download as .bib file

@article{DBLP:journals/popets/FarkeBGA24,
  author       = {Florian M. Farke and
                  David G. Balash and
                  Maximilian Golla and
                  Adam J. Aviv},
  title        = {How Does Connecting Online Activities to Advertising Inferences Impact
                  Privacy Perceptions?},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {2},
  pages        = {372--390},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0055},
  doi          = {10.56553/POPETS-2024-0055},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/FarkeBGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AliBKKA24,
  author       = {Mir Masood Ali and
                  David G. Balash and
                  Monica Kodwani and
                  Chris Kanich and
                  Adam J. Aviv},
  title        = {Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels
                  Compared to Apps' Privacy Policies},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {4},
  pages        = {142--166},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0111},
  doi          = {10.56553/POPETS-2024-0111},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AliBKKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/HutchinsonMA024,
  author       = {Adryana Hutchinson and
                  Collins W. Munyendo and
                  Adam J. Aviv and
                  Peter Mayer},
  editor       = {Florian 'Floyd' Mueller and
                  Penny Kyburz and
                  Julie R. Williamson and
                  Corina Sas},
  title        = {An Analysis of Password Managers' Password Checkup Tools},
  booktitle    = {Extended Abstracts of the {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} {EA} 2024, Honolulu, HI, USA, May 11-16, 2024},
  pages        = {38:1--38:7},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3613905.3650741},
  doi          = {10.1145/3613905.3650741},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/HutchinsonMA024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TranTHAZ24,
  author       = {Mindy Tran and
                  Xinru Tang and
                  Adryana Hutchinson and
                  Adam J. Aviv and
                  Yixin Zou},
  title        = {Position Paper: Exploring Security and Privacy Needs of d/Deaf Individuals},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}PW
                  2024, Vienna, Austria, July 8-12, 2024},
  pages        = {678--682},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuroSPW61312.2024.00082},
  doi          = {10.1109/EUROSPW61312.2024.00082},
  timestamp    = {Thu, 05 Sep 2024 16:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/TranTHAZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BalashAKA24,
  author       = {David G. Balash and
                  Mir Masood Ali and
                  Chris Kanich and
                  Adam J. Aviv},
  editor       = {Patrick Gage Kelley and
                  Apu Kapadia},
  title        = {"I would not install an app with this label": Privacy Label
                  Impact on Risk Perception and Willingness to Install iOS Apps},
  booktitle    = {Twentieth Symposium on Usable Privacy and Security, {SOUPS} 2024,
                  Philadelphia, PA, USA, August 11-13, 2024},
  pages        = {413--432},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/soups2024/presentation/balash},
  timestamp    = {Thu, 05 Sep 2024 14:24:03 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/BalashAKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-15308,
  author       = {Yixin Zou and
                  Khue Le and
                  Peter Mayer and
                  Alessandro Acquisti and
                  Adam J. Aviv and
                  Florian Schaub},
  title        = {Nudging Users to Change Breached Passwords Using the Protection Motivation
                  Theory},
  journal      = {CoRR},
  volume       = {abs/2405.15308},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.15308},
  doi          = {10.48550/ARXIV.2405.15308},
  eprinttype    = {arXiv},
  eprint       = {2405.15308},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-15308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tochi/MayerZLDLSA23,
  author       = {Peter Mayer and
                  Yixin Zou and
                  Byron M. Lowens and
                  Hunter A. Dyer and
                  Khue Le and
                  Florian Schaub and
                  Adam J. Aviv},
  title        = {Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches},
  journal      = {{ACM} Trans. Comput. Hum. Interact.},
  volume       = {30},
  number       = {5},
  pages        = {77:1--77:53},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589958},
  doi          = {10.1145/3589958},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tochi/MayerZLDLSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Munyendo0A23,
  author       = {Collins W. Munyendo and
                  Peter Mayer and
                  Adam J. Aviv},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {"I just stopped using one and started using the other":
                  Motivations, Techniques, and Challenges When Switching Password Managers},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3123--3137},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623150},
  doi          = {10.1145/3576915.3623150},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Munyendo0A23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalashAKWKA23,
  author       = {David G. Balash and
                  Mir Masood Ali and
                  Monica Kodwani and
                  Xiaoyuan Wu and
                  Chris Kanich and
                  Adam J. Aviv},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's
                  Privacy Label Ecosystem},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3600--3602},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624383},
  doi          = {10.1145/3576915.3624383},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BalashAKWKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/BaileyMDGMA23,
  author       = {Daniel V. Bailey and
                  Collins W. Munyendo and
                  Hunter A. Dyer and
                  Miles Grant and
                  Philipp Markert and
                  Adam J. Aviv},
  title        = {"Someone Definitely Used 0000": Strategies},
  booktitle    = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC
                  2023, Copenhagen, Denmark, October 16-17, 2023},
  pages        = {158--174},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617072.3617113},
  doi          = {10.1145/3617072.3617113},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurousec/BaileyMDGMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MunyendoAA23,
  author       = {Collins W. Munyendo and
                  Yasemin Acar and
                  Adam J. Aviv},
  title        = {"In Eighty Percent of the Cases, {I} Select the Password for
                  Them": Security and Privacy Challenges, Advice, and Opportunities
                  at Cybercafes in Kenya},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {570--587},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179410},
  doi          = {10.1109/SP46215.2023.10179410},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MunyendoAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BergerSA23,
  author       = {Harel Berger and
                  Micah Sherr and
                  Adam J. Aviv},
  title        = {Cadence: {A} Simulator for Human Movement-based Communication Protocols},
  booktitle    = {2023 Cyber Security Experimentation and Test Workshop, {CSET} 2023,
                  Marina del Rey, CA, USA, August 7-8, 2023},
  pages        = {26--31},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607505.3607507},
  doi          = {10.1145/3607505.3607507},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BergerSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BalashKGAFS23,
  author       = {David G. Balash and
                  Elena Korkes and
                  Miles Grant and
                  Adam J. Aviv and
                  Rahel A. Fainchtein and
                  Micah Sherr},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Educators' Perspectives of Using (or Not Using) Online Exam Proctoring},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5091--5108},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/balash},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BalashKGAFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-12936,
  author       = {David G. Balash and
                  Rahel A. Fainchtein and
                  Elena Korkes and
                  Miles Grant and
                  Micah Sherr and
                  Adam J. Aviv},
  title        = {Educators' Perspectives of Using (or Not Using) Online Exam Proctoring},
  journal      = {CoRR},
  volume       = {abs/2302.12936},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.12936},
  doi          = {10.48550/ARXIV.2302.12936},
  eprinttype    = {arXiv},
  eprint       = {2302.12936},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-12936.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-17063,
  author       = {Mir Masood Ali and
                  David G. Balash and
                  Chris Kanich and
                  Adam J. Aviv},
  title        = {Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels
                  Compared to Apps' Privacy Policies},
  journal      = {CoRR},
  volume       = {abs/2306.17063},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.17063},
  doi          = {10.48550/ARXIV.2306.17063},
  eprinttype    = {arXiv},
  eprint       = {2306.17063},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-17063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-13813,
  author       = {Florian M. Farke and
                  David G. Balash and
                  Maximilian Golla and
                  Adam J. Aviv},
  title        = {How Does Connecting Online Activities to Advertising Inferences Impact
                  Privacy Perceptions?},
  journal      = {CoRR},
  volume       = {abs/2312.13813},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.13813},
  doi          = {10.48550/ARXIV.2312.13813},
  eprinttype    = {arXiv},
  eprint       = {2312.13813},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-13813.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FainchteinAS22,
  author       = {Rahel A. Fainchtein and
                  Adam J. Aviv and
                  Micah Sherr},
  title        = {User Perceptions of the Privacy and Usability of Smart {DNS}},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {591--604},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567978},
  doi          = {10.1145/3564625.3567978},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FainchteinAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WuMCFLA22,
  author       = {Xiaoyuan Wu and
                  Collins W. Munyendo and
                  Eddie Cosic and
                  Genevieve A. Flynn and
                  Olivia Legault and
                  Adam J. Aviv},
  title        = {User Perceptions of Five-Word Passwords},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
                  TX, USA, December 5-9, 2022},
  pages        = {605--618},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3564625.3567981},
  doi          = {10.1145/3564625.3567981},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WuMCFLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MinkYPA022,
  author       = {Jaron Mink and
                  Amanda Rose Yuile and
                  Uma Pal and
                  Adam J. Aviv and
                  Adam Bates},
  editor       = {Simone D. J. Barbosa and
                  Cliff Lampe and
                  Caroline Appert and
                  David A. Shamma and
                  Steven Mark Drucker and
                  Julie R. Williamson and
                  Koji Yatani},
  title        = {Users Can Deduce Sensitive Locations Protected by Privacy Zones on
                  Fitness Tracking Apps},
  booktitle    = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems,
                  New Orleans, LA, USA, 29 April 2022 - 5 May 2022},
  pages        = {448:1--448:21},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491102.3502136},
  doi          = {10.1145/3491102.3502136},
  timestamp    = {Fri, 29 Apr 2022 13:37:13 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/MinkYPA022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MunyendoAA22,
  author       = {Collins W. Munyendo and
                  Yasemin Acar and
                  Adam J. Aviv},
  title        = {"Desperate Times Call for Desperate Measures": User Concerns
                  with Mobile Loan Apps in Kenya},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2304--2319},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833779},
  doi          = {10.1109/SP46214.2022.9833779},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MunyendoAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MayerMMA22,
  author       = {Peter Mayer and
                  Collins W. Munyendo and
                  Michelle L. Mazurek and
                  Adam J. Aviv},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Why Users (Don't) Use Password Managers at a Large Educational Institution},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1849--1866},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/mayer},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MayerMMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BalashWGRA22,
  author       = {David G. Balash and
                  Xiaoyuan Wu and
                  Miles Grant and
                  Irwin Reyes and
                  Adam J. Aviv},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Security and Privacy Perceptions of Third-Party Application Access
                  for Google Accounts},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3397--3414},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/balash},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BalashWGRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MunyendoMNGKUA22,
  author       = {Collins W. Munyendo and
                  Philipp Markert and
                  Alexandra Nisenoff and
                  Miles Grant and
                  Elena Korkes and
                  Blase Ur and
                  Adam J. Aviv},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {"The Same PIN, Just Longer": On the (In)Security of Upgrading
                  PINs from 4 to 6 Digits},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {4023--4040},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/munyendo},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MunyendoMNGKUA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/w4a/RayKA22,
  author       = {Hirak Ray and
                  Ravi Kuber and
                  Adam J. Aviv},
  editor       = {Dragan Ahmetovic and
                  Victoria Yaneva},
  title        = {Investigating older adults' adoption and usage of online conferencing
                  tools during {COVID-19}},
  booktitle    = {W4A'22: 19th Web for All Conference, Lyon, France, April 25 - 26,
                  2022},
  pages        = {27:1--27:11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3493612.3520447},
  doi          = {10.1145/3493612.3520447},
  timestamp    = {Tue, 03 May 2022 16:18:30 +0200},
  biburl       = {https://dblp.org/rec/conf/w4a/RayKA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-02658,
  author       = {David G. Balash and
                  Mir Masood Ali and
                  Xiaoyuan Wu and
                  Chris Kanich and
                  Adam J. Aviv},
  title        = {Longitudinal Analysis of Privacy Labels in the Apple App Store},
  journal      = {CoRR},
  volume       = {abs/2206.02658},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.02658},
  doi          = {10.48550/ARXIV.2206.02658},
  eprinttype    = {arXiv},
  eprint       = {2206.02658},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-02658.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RayWKA21,
  author       = {Hirak Ray and
                  Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  title        = {"Warn Them" or "Just Block Them"?: Investigating
                  Privacy Concerns Among Older and Working Age Adults},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {2},
  pages        = {27--47},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0016},
  doi          = {10.2478/POPETS-2021-0016},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/RayWKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/FainchteinASRK21,
  author       = {Rahel A. Fainchtein and
                  Adam J. Aviv and
                  Micah Sherr and
                  Stephen Ribaudo and
                  Armaan Khullar},
  title        = {Holes in the Geofence: Privacy Vulnerabilities in "Smart"
                  {DNS} Services},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {2},
  pages        = {151--172},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0022},
  doi          = {10.2478/POPETS-2021-0022},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/FainchteinASRK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MarkertBGDA21,
  author       = {Philipp Markert and
                  Daniel V. Bailey and
                  Maximilian Golla and
                  Markus D{\"{u}}rmuth and
                  Adam J. Aviv},
  title        = {On the Security of Smartphone Unlock PINs},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {30:1--30:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3473040},
  doi          = {10.1145/3473040},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MarkertBGDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MartinyKARW21,
  author       = {Ian Martiny and
                  Gabriel Kaptchuk and
                  Adam J. Aviv and
                  Daniel S. Roche and
                  Eric Wustrow},
  title        = {Improving Signal's Sealed Sender},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/improving-signals-sealed-sender/},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/MartinyKARW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/MunyendoGMFA21,
  author       = {Collins W. Munyendo and
                  Miles Grant and
                  Philipp Markert and
                  Timothy J. Forman and
                  Adam J. Aviv},
  editor       = {Sonia Chiasson},
  title        = {Using a Blocklist to Improve the Security of User Selection of Android
                  Patterns},
  booktitle    = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021,
                  August 8-10, 2021},
  pages        = {37--56},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/soups2021/presentation/munyendo},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/MunyendoGMFA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BaileyMA21,
  author       = {Daniel V. Bailey and
                  Philipp Markert and
                  Adam J. Aviv},
  editor       = {Sonia Chiasson},
  title        = {"I have no idea what they're trying to accomplish: " Enthusiastic
                  and Casual Signal Users' Understanding of Signal PINs},
  booktitle    = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021,
                  August 8-10, 2021},
  pages        = {417--436},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/soups2021/presentation/bailey},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/BaileyMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BalashKSFSA21,
  author       = {David G. Balash and
                  Dongkun Kim and
                  Darikia Shaibekova and
                  Rahel A. Fainchtein and
                  Micah Sherr and
                  Adam J. Aviv},
  editor       = {Sonia Chiasson},
  title        = {Examining the Examiners: Students' Privacy and Security Perceptions
                  of Online Proctoring Services},
  booktitle    = {Seventeenth Symposium on Usable Privacy and Security, {SOUPS} 2021,
                  August 8-10, 2021},
  pages        = {633--652},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/soups2021/presentation/balash},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/BalashKSFSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RayWKA21,
  author       = {Hirak Ray and
                  Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Why Older Adults (Don't) Use Password Managers},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {73--90},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ray},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RayWKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MayerZSA21,
  author       = {Peter Mayer and
                  Yixin Zou and
                  Florian Schaub and
                  Adam J. Aviv},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {"Now I'm a bit angry: " Individuals' Awareness, Perception,
                  and Responses to Data Breaches that Affected Them},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {393--410},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/mayer},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MayerZSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FarkeBGDA21,
  author       = {Florian M. Farke and
                  David G. Balash and
                  Maximilian Golla and
                  Markus D{\"{u}}rmuth and
                  Adam J. Aviv},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Are Privacy Dashboards Good for End Users? Evaluating User Perceptions
                  and Reactions to Google's My Activity},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {483--500},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/farke},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FarkeBGDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WolfAK21,
  author       = {Flynn Wolf and
                  Adam J. Aviv and
                  Ravi Kuber},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Security Obstacles and Motivations for Small Businesses from a CISO's
                  Perspective},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1199--1216},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/wolf},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WolfAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WarfordMMAM21,
  author       = {Noel Warford and
                  Collins W. Munyendo and
                  Ashna Mediratta and
                  Adam J. Aviv and
                  Michelle L. Mazurek},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Strategies and Perceived Risks of Sending Sensitive Documents},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1217--1234},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/warford},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WarfordMMAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14066,
  author       = {Florian M. Farke and
                  David G. Balash and
                  Maximilian Golla and
                  Markus D{\"{u}}rmuth and
                  Adam J. Aviv},
  title        = {Are Privacy Dashboards Good for End Users? Evaluating User Perceptions
                  and Reactions to Google's My Activity (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2105.14066},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14066},
  eprinttype    = {arXiv},
  eprint       = {2105.14066},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14066.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-14619,
  author       = {Noel Warford and
                  Collins W. Munyendo and
                  Ashna Mediratta and
                  Adam J. Aviv and
                  Michelle L. Mazurek},
  title        = {Strategies and Perceived Risks of Sending Sensitive Documents},
  journal      = {CoRR},
  volume       = {abs/2105.14619},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.14619},
  eprinttype    = {arXiv},
  eprint       = {2105.14619},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-14619.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-05917,
  author       = {David G. Balash and
                  Dongkun Kim and
                  Darikia Shaibekova and
                  Rahel A. Fainchtein and
                  Micah Sherr and
                  Adam J. Aviv},
  title        = {Examining the Examiners: Students' Privacy and Security Perceptions
                  of Online Proctoring Services},
  journal      = {CoRR},
  volume       = {abs/2106.05917},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.05917},
  eprinttype    = {arXiv},
  eprint       = {2106.05917},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-05917.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-09006,
  author       = {Daniel V. Bailey and
                  Philipp Markert and
                  Adam J. Aviv},
  title        = {"I have no idea what they're trying to accomplish: " Enthusiastic
                  and Casual Signal Users' Understanding of Signal PINs},
  journal      = {CoRR},
  volume       = {abs/2106.09006},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.09006},
  eprinttype    = {arXiv},
  eprint       = {2106.09006},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-09006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03573,
  author       = {David G. Balash and
                  Xiaoyuan Wu and
                  Miles Grant and
                  Irwin Reyes and
                  Adam J. Aviv},
  title        = {Security and Privacy Perceptions of Third-Party Application Access
                  for Google Accounts (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2111.03573},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03573},
  eprinttype    = {arXiv},
  eprint       = {2111.03573},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FormanA20,
  author       = {Timothy J. Forman and
                  Adam J. Aviv},
  title        = {Double Patterns: {A} Usable Solution to Increase the Security of Android
                  Unlock Patterns},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {219--233},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427252},
  doi          = {10.1145/3427228.3427252},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FormanA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KhanCSA0K20,
  author       = {Hassan Khan and
                  Jason Ceci and
                  Jonah Stegman and
                  Adam J. Aviv and
                  Rozita Dara and
                  Ravi Kuber},
  title        = {Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited:
                  {A} Holistic View of {PIN} Authentication in Digital Lives and Beyond},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {249--262},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427240},
  doi          = {10.1145/3427228.3427240},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/KhanCSA0K20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/FormanRA20,
  author       = {Timothy J. Forman and
                  Daniel S. Roche and
                  Adam J. Aviv},
  editor       = {Regina Bernhaupt and
                  Florian 'Floyd' Mueller and
                  David Verweij and
                  Josh Andres and
                  Joanna McGrenere and
                  Andy Cockburn and
                  Ignacio Avellino and
                  Alix Goguey and
                  Pernille Bj{\o}n and
                  Shengdong Zhao and
                  Briane Paul Samson and
                  Rafal Kocielnik},
  title        = {Twice as Nice? {A} Preliminary Evaluation of Double Android Unlock
                  Patterns},
  booktitle    = {Extended Abstracts of the 2020 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} 2020, Honolulu, HI, USA, April 25-30, 2020},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3334480.3382922},
  doi          = {10.1145/3334480.3382922},
  timestamp    = {Wed, 12 Jun 2024 07:39:18 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/FormanRA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/SamuelMAN20,
  author       = {Raina Samuel and
                  Philipp Markert and
                  Adam J. Aviv and
                  Iulian Neamtiu},
  editor       = {Heather Richter Lipford and
                  Sonia Chiasson},
  title        = {Knock, Knock. Who's There? On the Security of LG's Knock Codes},
  booktitle    = {Sixteenth Symposium on Usable Privacy and Security, {SOUPS} 2020,
                  August 7-11, 2020},
  pages        = {37--59},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/soups2020/presentation/samuel},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/SamuelMAN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MarkertBGDA20,
  author       = {Philipp Markert and
                  Daniel V. Bailey and
                  Maximilian Golla and
                  Markus D{\"{u}}rmuth and
                  Adam J. Aviv},
  title        = {This {PIN} Can Be Easily Guessed: Analyzing the Security of Smartphone
                  Unlock PINs},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {286--303},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00100},
  doi          = {10.1109/SP40000.2020.00100},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MarkertBGDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-04868,
  author       = {Philipp Markert and
                  Daniel V. Bailey and
                  Maximilian Golla and
                  Markus D{\"{u}}rmuth and
                  Adam J. Aviv},
  title        = {This {PIN} Can Be Easily Guessed},
  journal      = {CoRR},
  volume       = {abs/2003.04868},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.04868},
  eprinttype    = {arXiv},
  eprint       = {2003.04868},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-04868.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-03556,
  author       = {Raina Samuel and
                  Philipp Markert and
                  Adam J. Aviv and
                  Iulian Neamtiu},
  title        = {Knock, Knock. Who's There? On the Security of LG's Knock Codes},
  journal      = {CoRR},
  volume       = {abs/2006.03556},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.03556},
  eprinttype    = {arXiv},
  eprint       = {2006.03556},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-03556.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-10681,
  author       = {Timothy J. Forman and
                  Adam J. Aviv},
  title        = {Double Patterns: {A} Usable Solution to Increase the Security of Android
                  Unlock Patterns},
  journal      = {CoRR},
  volume       = {abs/2008.10681},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.10681},
  eprinttype    = {arXiv},
  eprint       = {2008.10681},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-10681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-10697,
  author       = {Hassan Khan and
                  Jason Ceci and
                  Jonah Stegman and
                  Adam J. Aviv and
                  Rozita Dara and
                  Ravi Kuber},
  title        = {Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited:
                  {A} Holistic View of {PIN} Authentication in Digital Lives and Beyond},
  journal      = {CoRR},
  volume       = {abs/2008.10697},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.10697},
  eprinttype    = {arXiv},
  eprint       = {2008.10697},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-10697.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-01973,
  author       = {Hirak Ray and
                  Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  title        = {Why Older Adults (Don't) Use Password Managers},
  journal      = {CoRR},
  volume       = {abs/2010.01973},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.01973},
  eprinttype    = {arXiv},
  eprint       = {2010.01973},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-01973.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-07944,
  author       = {Rahel A. Fainchtein and
                  Adam J. Aviv and
                  Micah Sherr and
                  Stephen Ribaudo and
                  Armaan Khullar},
  title        = {Holes in the Geofence: Privacy Vulnerabilities in "Smart"
                  {DNS} Services},
  journal      = {CoRR},
  volume       = {abs/2012.07944},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.07944},
  eprinttype    = {arXiv},
  eprint       = {2012.07944},
  timestamp    = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-07944.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/RayWKA19,
  author       = {Hirak Ray and
                  Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  editor       = {Regan L. Mandryk and
                  Stephen A. Brewster and
                  Mark Hancock and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos and
                  Mark Perry},
  title        = {"Woe is me": Examining Older Adults' Perceptions of Privacy},
  booktitle    = {Extended Abstracts of the 2019 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290607.3312770},
  doi          = {10.1145/3290607.3312770},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/RayWKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WolfKA19,
  author       = {Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {"Pretty Close to a Must-Have": Balancing Usability Desire
                  and Security Concern in Biometric Adoption},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {151},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300381},
  doi          = {10.1145/3290605.3300381},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WolfKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChakrabortiACMR19,
  author       = {Anrin Chakraborti and
                  Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry and
                  Daniel S. Roche and
                  Radu Sion},
  title        = {rORAM: Efficient Range {ORAM} with O(log2 {N)} Locality},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/roram-efficient-range-oram-with-olog2-n-locality/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChakrabortiACMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/WolfKA18,
  author       = {Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  title        = {An empirical study examining the perceptions and behaviours of security-conscious
                  users of mobile authentication},
  journal      = {Behav. Inf. Technol.},
  volume       = {37},
  number       = {4},
  pages        = {320--334},
  year         = {2018},
  url          = {https://doi.org/10.1080/0144929X.2018.1436591},
  doi          = {10.1080/0144929X.2018.1436591},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/WolfKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WolfAK18,
  author       = {Flynn Wolf and
                  Adam J. Aviv and
                  Ravi Kuber},
  title        = {"It's all about the start" classifying eyes-free mobile
                  authentication techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {41},
  pages        = {28--40},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.05.004},
  doi          = {10.1016/J.JISA.2018.05.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WolfAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YeTFCWAW18,
  author       = {Guixin Ye and
                  Zhanyong Tang and
                  Dingyi Fang and
                  Xiaojiang Chen and
                  Willy Wolff and
                  Adam J. Aviv and
                  Zheng Wang},
  title        = {A Video-based Attack for Android Pattern Lock},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {19:1--19:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230740},
  doi          = {10.1145/3230740},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YeTFCWAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivWK18,
  author       = {Adam J. Aviv and
                  Flynn Wolf and
                  Ravi Kuber},
  title        = {Comparing Video Based Shoulder Surfing with Live Simulation},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {453--466},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274702},
  doi          = {10.1145/3274694.3274702},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivWK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WolfKA18,
  author       = {Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  editor       = {Regan L. Mandryk and
                  Mark Hancock and
                  Mark Perry and
                  Anna L. Cox},
  title        = {How Do We Talk Ourselves Into These Things?},
  booktitle    = {Extended Abstracts of the 2018 {CHI} Conference on Human Factors in
                  Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26,
                  2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3170427.3188578},
  doi          = {10.1145/3170427.3188578},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/WolfKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/SonchackAKS18,
  author       = {John Sonchack and
                  Adam J. Aviv and
                  Eric Keller and
                  Jonathan M. Smith},
  editor       = {Rui Oliveira and
                  Pascal Felber and
                  Y. Charlie Hu},
  title        = {Turboflow: information rich flow record generation on commodity switches},
  booktitle    = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto,
                  Portugal, April 23-26, 2018},
  pages        = {11:1--11:16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3190508.3190558},
  doi          = {10.1145/3190508.3190558},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosys/SonchackAKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/SonchackMAKS18,
  author       = {John Sonchack and
                  Oliver Michel and
                  Adam J. Aviv and
                  Eric Keller and
                  Jonathan M. Smith},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {Scaling Hardware Accelerated Network Monitoring to Concurrent and
                  Dynamic Queries With *Flow},
  booktitle    = {Proceedings of the 2018 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2018, Boston, MA, USA, July 11-13, 2018},
  pages        = {823--835},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/sonchack},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/SonchackMAKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-07518,
  author       = {Adam J. Aviv and
                  Ravi Kuber},
  title        = {Towards Understanding Connections between Security/Privacy Attitudes
                  and Unlock Authentication},
  journal      = {CoRR},
  volume       = {abs/1801.07518},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.07518},
  eprinttype    = {arXiv},
  eprint       = {1801.07518},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-07518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-12539,
  author       = {Flynn Wolf and
                  Adam J. Aviv and
                  Ravi Kuber},
  title        = {Classifying Eyes-Free Mobile Authentication Techniques},
  journal      = {CoRR},
  volume       = {abs/1805.12539},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.12539},
  eprinttype    = {arXiv},
  eprint       = {1805.12539},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-12539.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-08640,
  author       = {Adam J. Aviv and
                  Flynn Wolf and
                  Ravi Kuber},
  title        = {Comparing Video Based Shoulder Surfing with Live Simulation},
  journal      = {CoRR},
  volume       = {abs/1809.08640},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.08640},
  eprinttype    = {arXiv},
  eprint       = {1809.08640},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-08640.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-10548,
  author       = {Adam J. Aviv and
                  Markus D{\"{u}}rmuth},
  title        = {A Survey of Collection Methods and Cross-Data Set Comparison of Android
                  Unlock Patterns},
  journal      = {CoRR},
  volume       = {abs/1811.10548},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.10548},
  eprinttype    = {arXiv},
  eprint       = {1811.10548},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-10548.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortiACMR18,
  author       = {Anrin Chakraborti and
                  Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry and
                  Daniel S. Roche and
                  Radu Sion},
  title        = {Efficient Range {ORAM} with {\unicode{54598}}(log\({}^{\mbox{2}}\)N)
                  Locality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortiACMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/AvivKB17,
  author       = {Adam J. Aviv and
                  Ravi Kuber and
                  Devon Budzitowski},
  title        = {Is Bigger Better When It Comes to Android Graphical Pattern Unlock?},
  journal      = {{IEEE} Internet Comput.},
  volume       = {21},
  number       = {6},
  pages        = {46--51},
  year         = {2017},
  url          = {https://doi.org/10.1109/MIC.2017.4180833},
  doi          = {10.1109/MIC.2017.4180833},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/AvivKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivDWK17,
  author       = {Adam J. Aviv and
                  John T. Davin and
                  Flynn Wolf and
                  Ravi Kuber},
  title        = {Towards Baselines for Shoulder Surfing on Mobile Authentication},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {486--498},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134609},
  doi          = {10.1145/3134600.3134609},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivDWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/assets/WolfKA17,
  author       = {Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  editor       = {Amy Hurst and
                  Leah Findlater and
                  Meredith Ringel Morris},
  title        = {Perceptions of Mobile Device Authentication Mechanisms by Individuals
                  who are Blind},
  booktitle    = {Proceedings of the 19th International {ACM} {SIGACCESS} Conference
                  on Computers and Accessibility, {ASSETS} 2017, Baltimore, MD, USA,
                  October 29 - November 01, 2017},
  pages        = {385--386},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3132525.3134793},
  doi          = {10.1145/3132525.3134793},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/assets/WolfKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RocheACM17,
  author       = {Daniel S. Roche and
                  Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Deterministic, Stash-Free Write-Only {ORAM}},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {507--521},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134051},
  doi          = {10.1145/3133956.3134051},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RocheACM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/DavinAWK17,
  author       = {John T. Davin and
                  Adam J. Aviv and
                  Flynn Wolf and
                  Ravi Kuber},
  editor       = {Gloria Mark and
                  Susan R. Fussell and
                  Cliff Lampe and
                  m. c. schraefel and
                  Juan Pablo Hourcade and
                  Caroline Appert and
                  Daniel Wigdor},
  title        = {Baseline Measurements of Shoulder Surfing Analysis and Comparability
                  for Smartphone Unlock Authentication},
  booktitle    = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing
                  Systems, Denver, CO, USA, May 06-11, 2017, Extended Abstracts},
  pages        = {2496--2503},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3027063.3053221},
  doi          = {10.1145/3027063.3053221},
  timestamp    = {Tue, 06 Nov 2018 16:58:46 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/DavinAWK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AvivCMR17,
  author       = {Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry and
                  Daniel S. Roche},
  title        = {ObliviSync: Practical Oblivious File Backup and Synchronization},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/oblivisync-practical-oblivious-file-backup-and-synchronization/},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/AvivCMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RocheACM17,
  author       = {Daniel S. Roche and
                  Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry},
  title        = {Deterministic, Stash-Free Write-Only {ORAM}},
  journal      = {CoRR},
  volume       = {abs/1706.03827},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.03827},
  eprinttype    = {arXiv},
  eprint       = {1706.03827},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RocheACM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-04959,
  author       = {Adam J. Aviv and
                  John T. Davin and
                  Flynn Wolf and
                  Ravi Kuber},
  title        = {Towards Baselines for Shoulder Surfing on Mobile Authentication},
  journal      = {CoRR},
  volume       = {abs/1709.04959},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.04959},
  eprinttype    = {arXiv},
  eprint       = {1709.04959},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-04959.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RocheACM17,
  author       = {Daniel S. Roche and
                  Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry},
  title        = {Deterministic, Stash-Free Write-Only {ORAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RocheACM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SonchackA16,
  author       = {John Sonchack and
                  Adam J. Aviv},
  title        = {Exploring large scale security system reproducibility with the {LESS}
                  simulator},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {645--665},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160553},
  doi          = {10.3233/JCS-160553},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SonchackA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/NarkhedeJACRF16,
  author       = {Vaishali Narkhede and
                  Karuna P. Joshi and
                  Adam J. Aviv and
                  Seung Geol Choi and
                  Daniel S. Roche and
                  Tim Finin},
  title        = {Managing Cloud Storage Obliviously},
  booktitle    = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016,
                  San Francisco, CA, USA, June 27 - July 2, 2016},
  pages        = {990--993},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CLOUD.2016.0151},
  doi          = {10.1109/CLOUD.2016.0151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/NarkhedeJACRF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SonchackDASK16,
  author       = {John Sonchack and
                  Anurag Dubey and
                  Adam J. Aviv and
                  Jonathan M. Smith and
                  Eric Keller},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Timing-based reconnaissance and defense in software-defined networks},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991081},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SonchackDASK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SonchackAK16,
  author       = {John Sonchack and
                  Adam J. Aviv and
                  Eric Keller},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Timing {SDN} Control Planes to Infer Network Configurations},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016},
  pages        = {19--22},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2876019.2876030},
  doi          = {10.1145/2876019.2876030},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/SonchackAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SonchackSAK16,
  author       = {John Sonchack and
                  Jonathan M. Smith and
                  Adam J. Aviv and
                  Eric Keller},
  title        = {Enabling Practical Software-defined Networking Security Applications
                  with {OFX}},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/enabling-practical-software-defined-networking-security-applications-ofx.pdf},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SonchackSAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/AvivDG16,
  author       = {Adam J. Aviv and
                  Markus D{\"{u}}rmuth and
                  Payas Gupta},
  title        = {Position Paper: Measuring the Impact of Alphabet and Culture on Graphical
                  Passwords},
  booktitle    = {Who Are You?! Adventures in Authentication, WAY@SOUPS 2016, Denver,
                  CO, USA, June 22, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/workshop-program/way2016/presentation/aviv},
  timestamp    = {Thu, 05 Sep 2024 15:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/AvivDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/WolfKA16,
  author       = {Flynn Wolf and
                  Ravi Kuber and
                  Adam J. Aviv},
  title        = {Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious
                  Users of Mobile Authentication},
  booktitle    = {2nd Workshop on Security Information Workers, WSIW@SOUPS 2016, Denver,
                  CO, USA, June 22, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/workshop-program/wsiw16/presentation/wolf},
  timestamp    = {Thu, 05 Sep 2024 15:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/WolfKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RocheAC16,
  author       = {Daniel S. Roche and
                  Adam J. Aviv and
                  Seung Geol Choi},
  title        = {A Practical Oblivious Map Data Structure with Secure Deletion and
                  History Independence},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {178--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.19},
  doi          = {10.1109/SP.2016.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RocheAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AvivCMR16,
  author       = {Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry and
                  Daniel S. Roche},
  title        = {ObliviSync: Practical Oblivious File Backup and Synchronization},
  journal      = {CoRR},
  volume       = {abs/1605.09779},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.09779},
  eprinttype    = {arXiv},
  eprint       = {1605.09779},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AvivCMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvivCMR16,
  author       = {Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry and
                  Daniel S. Roche},
  title        = {ObliviSync: Practical Oblivious File Backup and Synchronization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvivCMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SonchackAS15,
  author       = {John Sonchack and
                  Adam J. Aviv and
                  Jonathan M. Smith},
  title        = {Cross-domain collaboration for improved {IDS} rule set selection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {24-25},
  pages        = {25--40},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2015.10.001},
  doi          = {10.1016/J.JISA.2015.10.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SonchackAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivBK15,
  author       = {Adam J. Aviv and
                  Devon Budzitowski and
                  Ravi Kuber},
  title        = {Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4
                  Grid Sizes for Android's Pattern Unlock},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {301--310},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818014},
  doi          = {10.1145/2818000.2818014},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SonchackAKS15,
  author       = {John Sonchack and
                  Adam J. Aviv and
                  Eric Keller and
                  Jonathan M. Smith},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{POSTER:} {OFX:} Enabling OpenFlow Extensions for Switch-Level Security
                  Applications},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1678--1680},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2810120},
  doi          = {10.1145/2810103.2810120},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SonchackAKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RocheAC15,
  author       = {Daniel S. Roche and
                  Adam J. Aviv and
                  Seung Geol Choi},
  title        = {Oblivious Secure Deletion with Bounded History Independence},
  journal      = {CoRR},
  volume       = {abs/1505.07391},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.07391},
  eprinttype    = {arXiv},
  eprint       = {1505.07391},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RocheAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RocheAC15,
  author       = {Daniel S. Roche and
                  Adam J. Aviv and
                  Seung Geol Choi},
  title        = {A Practical Oblivious Map Data Structure with Secure Deletion and
                  History Independence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1126},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RocheAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AvivBSS14,
  author       = {Adam J. Aviv and
                  Matt Blaze and
                  Micah Sherr and
                  Jonathan M. Smith},
  title        = {Privacy-aware message exchanges for HumaNets},
  journal      = {Comput. Commun.},
  volume       = {48},
  pages        = {30--43},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2014.03.013},
  doi          = {10.1016/J.COMCOM.2014.03.013},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/AvivBSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/WestA14,
  author       = {Andrew G. West and
                  Adam J. Aviv},
  title        = {Measuring Privacy Disclosures in {URL} Query Strings},
  journal      = {{IEEE} Internet Comput.},
  volume       = {18},
  number       = {6},
  pages        = {52--59},
  year         = {2014},
  url          = {https://doi.org/10.1109/MIC.2014.104},
  doi          = {10.1109/MIC.2014.104},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/WestA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivF14,
  author       = {Adam J. Aviv and
                  Dane Fichter},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {Understanding visual perceptions of usability and security of Android's
                  graphical password pattern},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {286--295},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664253},
  doi          = {10.1145/2664243.2664253},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SonchackA14,
  author       = {John Sonchack and
                  Adam J. Aviv},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {{LESS} Is More: Host-Agent Based Simulator for Large-Scale Evaluation
                  of Security Systems},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_21},
  doi          = {10.1007/978-3-319-11212-1\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SonchackA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SonchackAS13,
  author       = {John Sonchack and
                  Adam J. Aviv and
                  Jonathan M. Smith},
  editor       = {Chris Kanich and
                  Micah Sherr},
  title        = {Bridging the Data Gap: Data Related Challenges in Evaluating Large
                  Scale Collaborative Security Systems},
  booktitle    = {6th Workshop on Cyber Security Experimentation and Test, {CSET} '13,
                  Washington, D.C., USA, August 12, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/cset13/workshop-program/presentation/sonchack},
  timestamp    = {Mon, 01 Feb 2021 08:43:03 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SonchackAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/AvivMOSXL12,
  author       = {Adam J. Aviv and
                  Vin Mannino and
                  Thanat Owlarn and
                  Seth Shannin and
                  Kevin Xu and
                  Boon Thau Loo},
  title        = {Experiences in teaching an educational user-level operating systems
                  implementation project},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {46},
  number       = {2},
  pages        = {80--86},
  year         = {2012},
  url          = {https://doi.org/10.1145/2331576.2331588},
  doi          = {10.1145/2331576.2331588},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigops/AvivMOSXL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivSBS12,
  author       = {Adam J. Aviv and
                  Benjamin Sapp and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Robert H'obbes' Zakon},
  title        = {Practicality of accelerometer side channels on smartphones},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420957},
  doi          = {10.1145/2420950.2420957},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivSBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AvivSBS12,
  author       = {Adam J. Aviv and
                  Micah Sherr and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Privacy-Aware Message Exchanges for Geographically Routed Human Movement
                  Networks},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {181--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_11},
  doi          = {10.1007/978-3-642-33167-1\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AvivSBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AvivH11,
  author       = {Adam J. Aviv and
                  Andreas Haeberlen},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {Challenges in Experimenting with Botnet Detection Systems},
  booktitle    = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11,
                  San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/cset11/challenges-experimenting-botnet-detection-systems},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AvivH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WestACL10,
  author       = {Andrew G. West and
                  Adam J. Aviv and
                  Jian Chang and
                  Insup Lee},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Spam mitigation using spatio-temporal reputations from blacklist history},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920287},
  doi          = {10.1145/1920261.1920287},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WestACL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/ReedAWHPS10,
  author       = {Jason Reed and
                  Adam J. Aviv and
                  Daniel Wagner and
                  Andreas Haeberlen and
                  Benjamin C. Pierce and
                  Jonathan M. Smith},
  editor       = {Manuel Costa and
                  Engin Kirda},
  title        = {Differential privacy for collaborative security},
  booktitle    = {Proceedings of the Third European Workshop on System Security, {EUROSEC}
                  2010, Paris, France, April 13, 2010},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1752046.1752047},
  doi          = {10.1145/1752046.1752047},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/ReedAWHPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AvivSBS10,
  author       = {Adam J. Aviv and
                  Micah Sherr and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Wietse Z. Venema},
  title        = {Evading Cellular Data Monitoring with Human Movement Networks},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/evading-cellular-data-monitoring-human-movement-networks},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AvivSBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/AvivGMBS10,
  author       = {Adam J. Aviv and
                  Katherine L. Gibson and
                  Evan Mossop and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Charlie Miller and
                  Hovav Shacham},
  title        = {Smudge Attacks on Smartphone Touch Screens},
  booktitle    = {4th {USENIX} Workshop on Offensive Technologies, {WOOT} '10, Washington,
                  D.C., USA, August 9, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/woot10/smudge-attacks-smartphone-touch-screens},
  timestamp    = {Mon, 01 Feb 2021 08:41:52 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/AvivGMBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/WestACPBKLSS09,
  author       = {Andrew G. West and
                  Adam J. Aviv and
                  Jian Chang and
                  Vinayak S. Prabhu and
                  Matt Blaze and
                  Sampath Kannan and
                  Insup Lee and
                  Jonathan M. Smith and
                  Oleg Sokolsky},
  editor       = {Evangelos P. Markatos and
                  Manuel Costa},
  title        = {QuanTM: a quantitative trust management system},
  booktitle    = {Proceedings of the Second European Workshop on System Security, {EUROSEC}
                  2009, Nuremburg, Germany, March 31, 2009},
  pages        = {28--35},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1519144.1519149},
  doi          = {10.1145/1519144.1519149},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/WestACPBKLSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/JohnsonAABK08,
  author       = {Maritza L. Johnson and
                  Chaitanya Atreya and
                  Adam J. Aviv and
                  Steven M. Bellovin and
                  Gail E. Kaiser},
  editor       = {Elizabeth F. Churchill and
                  Rachna Dhamija},
  title        = {{RUST:} {A} Retargetable Usability Testbed for Web Site Authentication
                  Technologies},
  booktitle    = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA,
                  USA, April 14, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/upsec08/tech/full\_papers/johnson/johnson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/JohnsonAABK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AvivCCCSSB08,
  author       = {Adam J. Aviv and
                  Pavol Cern{\'{y}} and
                  Sandy Clark and
                  Eric Cronin and
                  Gaurav Shah and
                  Micah Sherr and
                  Matt Blaze},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Security Evaluation of ES{\&}S Voting Machines and Election Management
                  System},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/aviv/aviv.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AvivCCCSSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AvivLPK07,
  author       = {Adam J. Aviv and
                  Michael E. Locasto and
                  Shaya Potter and
                  Angelos D. Keromytis},
  title        = {{SSARES:} Secure Searchable Automated Remote Email Storage},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {129--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.30},
  doi          = {10.1109/ACSAC.2007.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/AvivLPK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}