default search action
16th SOUPS @ USENIX Security Symposium 2020
- Heather Richter Lipford, Sonia Chiasson:
Sixteenth Symposium on Usable Privacy and Security, SOUPS 2020, August 7-11, 2020. USENIX Association 2020
Authentication
- Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha, Sankalp Pandit:
Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise. 1-18 - Florian Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, Markus Dürmuth:
"You still use the password after all" - Exploring FIDO2 Security Keys in a Small Company. 19-35 - Raina Samuel, Philipp Markert, Adam J. Aviv, Iulian Neamtiu:
Knock, Knock. Who's There? On the Security of LG's Knock Codes. 37-59 - Kevin Lee, Benjamin Kaiser, Jonathan R. Mayer, Arvind Narayanan:
An Empirical Study of Wireless Carrier Authentication for SIM Swaps. 61-79
Appreciating User Needs and Concerns
- Jayati Dev, Pablo Moriano, L. Jean Camp:
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. 81-97 - Nora McDonald, Alison Larsen, Allison Battisti, Galina Madjaroff, Aaron K. Massey, Helena M. Mentis:
Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges. 99-110 - Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, Sauvik Das:
Blind and Human: Exploring More Usable Audio CAPTCHA Designs. 111-125 - Christine Geeng, Jevan A. Hutson, Franziska Roesner:
Usable Sexurity: Studying People's Concerns and Strategies When Sexting. 127-144 - Borke Obada-Obieh, Lucrezia Spagnolo, Konstantin Beznosov:
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault. 145-164
Implementing Security and Privacy: Design and Development
- Anastasia Danilova, Alena Naiakshina, Johanna Deuter, Matthew Smith:
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers. 165-183 - George Chalhoub, Ivan Flechais, Norbert Nthala, Ruba Abu-Salma:
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras. 185-204 - Hernan M. Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, Xinming Ou:
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development. 205-220 - Justin Smith, Lisa Nguyen Quang Do, Emerson R. Murphy-Hill:
Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security. 221-238
Implementing Security and Privacy: Operation, Administration, Vulnerability Analysis
- Christian Tiefenau, Maximilian Häring, Katharina Krombholz, Emanuel von Zezschwitz:
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators. 239-258 - Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, Reyhan Duezguen, Bettina Lofthouse, Tatiana von Landesberger, Melanie Volkamer:
An investigation of phishing awareness and education over time: When and how to best remind users. 259-284 - Steffen Becker, Carina Wiesen, Nils Albartus, Nikol Rummel, Christof Paar:
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Processes. 285-300 - Ola Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, Awais Rashid:
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures. 301-317 - Noura Alomar, Primal Wijesekera, Edward Qiu, Serge Egelman:
"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild. 319-339
Applications and User Perceptions
- Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar R. Weippl, Katharina Krombholz:
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. 341-358 - Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, Sascha Fahl:
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites. 359-377 - Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh, Florian Schaub:
From Intent to Action: Nudging Users Towards Secure Mobile Payments. 379-415 - Natã M. Barbosa, Zhuohao Zhang, Yang Wang:
Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption. 417-435
Privacy, Tracking, and Measurement
- Agnieszka Kitkowska, Mark Warner, Yefim Shulman, Erik Wästlund, Leonardo A. Martucci:
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect. 437-456 - Emilee Rader, Samantha Hautea, Anjali Munasinghe:
"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions. 457-488 - Sarah Bird, Ilana Segall, Martin Lopatka:
Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. 489-503 - Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, Limin Jia:
How Risky Are Real Users' IFTTT Applets? 505-529
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.