


default search action
Scott Ruoti
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i17]Ran Elgedawy, John Sadik, Senjuti Dutta, Anuj Gautam, Konstantinos Georgiou, Farzin Gholamrezae, Fujiao Ji, Kyungchan Lim, Qian Liu, Scott Ruoti:
Ocassionally Secure: A Comparative Analysis of Code Generation Assistants. CoRR abs/2402.00689 (2024) - [i16]Ran Elgedawy, John Sadik, Anuj Gautam, Trinity Bissahoyo, Christopher Childress, Jacob Leonard, Clay Shubert, Scott Ruoti:
Security Advice for Parents and Children About Content Filtering and Circumvention as Found on YouTube and TikTok. CoRR abs/2402.03255 (2024) - [i15]Anuj Gautam, Tarun Kumar Yadav, Kent E. Seamons, Scott Ruoti:
Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers. CoRR abs/2402.06159 (2024) - [i14]John Sadik, Scott Ruoti:
A Large-Scale Survey of Password Entry Practices on Non-Desktop Devices. CoRR abs/2409.03044 (2024) - [i13]Senjuti Dutta, Rhema Linder, Alex C. Williams, Anastasia Kuzminykh, Scott Ruoti:
Unveiling the Inter-Related Preferences of Crowdworkers: Implications for Personalized and Flexible Platform Design. CoRR abs/2409.04658 (2024) - [i12]Senjuti Dutta, Scott Ruoti, Rhema Linder, Alex C. Williams, Anastasia Kuzminykh:
Exploring Crowdworkers' Perceptions, Current Practices, and Desired Practices Regarding Using Non-Workstation Devices for Crowdwork. CoRR abs/2409.04676 (2024) - 2023
- [c28]Garrett Smith, Tarun Kumar Yadav, Jonathan Dutson, Scott Ruoti, Kent E. Seamons:
"If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager. USENIX Security Symposium 2023: 499-515 - 2022
- [j7]Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti
:
User Perceptions of Security and Privacy for Group Chat. DTRAP 3(2): 15:1-15:29 (2022) - [c27]Sean Oesch, Scott Ruoti
, James Simmons, Anuj Gautam
:
"It Basically Started Using Me: " An Observational Study of Password Manager Usage. CHI 2022: 33:1-33:23 - [c26]Senjuti Dutta
, Rhema Linder
, Scott Ruoti
, Alex C. Williams, Anastasia Kuzminykh:
Beyond a One-Size-Fits-All Approach: Towards Personalizing Multi-device Setups in Crowdwork. UbiComp/ISWC Adjunct 2022: 30-31 - [c25]Anuj Gautam, Shan Lalani, Scott Ruoti:
Improving Password Generation Through the Design of a Password Composition Policy Description Language. SOUPS @ USENIX Security Symposium 2022: 541-560 - 2021
- [c24]James Simmons, Oumar Diallo, Sean Oesch, Scott Ruoti
:
Systematization of Password ManagerUse Cases and Design Paradigms. ACSAC 2021: 528-540 - [c23]Sean Oesch, Anuj Gautam
, Scott Ruoti
:
The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android. ACSAC 2021: 996-1010 - [c22]Jeremy Clark, Paul C. van Oorschot, Scott Ruoti
, Kent E. Seamons, Daniel Zappala:
SoK: Securing Email - A Stakeholder-Based Analysis. Financial Cryptography (1) 2021: 360-390 - [i11]Sean Oesch, Anuj Gautam, Scott Ruoti:
The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android. CoRR abs/2104.10017 (2021) - 2020
- [j6]Scott Ruoti
, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain technology: what is it good for? Commun. ACM 63(1): 46-53 (2020) - [j5]Yunhe Feng, Qing Cao, Hairong Qi, Scott Ruoti
:
SenCAPTCHA: A Mobile-First CAPTCHA Using Orientation Sensors. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(2): 43:1-43:26 (2020) - [c21]Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti
:
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK. ACSAC 2020: 234-248 - [c20]Sean Oesch, Scott Ruoti
:
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers. USENIX Security Symposium 2020: 2165-2182
2010 – 2019
- 2019
- [j4]Scott Ruoti
, Kent E. Seamons
:
Johnny's Journey Toward Usable Secure Email. IEEE Secur. Priv. 17(6): 72-76 (2019) - [j3]Scott Ruoti
, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain Technology: What Is It Good for? ACM Queue 17(5): 41-68 (2019) - [j2]Scott Ruoti, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'Neill, Ken Reese, Brad Spendlove, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons
:
A Usability Study of Four Secure Email Tools Using Paired Participants. ACM Trans. Priv. Secur. 22(2): 13:1-13:33 (2019) - [i10]Sean Oesch, Scott Ruoti:
That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers. CoRR abs/1908.03296 (2019) - [i9]Scott Ruoti, Benjamin Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
SoK: Blockchain Technology and Its Potential Use Cases. CoRR abs/1909.12454 (2019) - 2018
- [c19]Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
A Comparative Usability Study of Key Management in Secure Email. SOUPS @ USENIX Security Symposium 2018: 375-394 - [c18]Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti
, Kent E. Seamons
:
A Tale of Two Studies: The Best and Worst of YubiKey Usability. IEEE Symposium on Security and Privacy 2018: 872-888 - [i8]Jeremy Clark, Paul C. van Oorschot, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
Securing Email. CoRR abs/1804.07706 (2018) - 2017
- [j1]Mark O'Neill, Scott Ruoti
, Kent E. Seamons
, Daniel Zappala:
TLS Inspection: How Often and Who Cares? IEEE Internet Comput. 21(3): 22-29 (2017) - [c17]Scott Ruoti
, Scott Heidbrink, Mark O'Neill, Eric Gustafson, Yung Ryn Choe:
Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization. ICWS 2017: 862-865 - [c16]Scott Ruoti
, Kent E. Seamons
:
End-to-End Passwords. NSPW 2017: 107-121 - [c15]Scott Ruoti
, Kent E. Seamons
, Daniel Zappala:
Layering Security at Global Control Points to Secure Unmodified Software. SecDev 2017: 42-49 - [c14]Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent E. Seamons:
Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture. SOUPS 2017: 211-228 - [c13]Trevor Smith, Scott Ruoti, Kent E. Seamons:
Augmenting Centralized Password Management with Application-Specific Passwords. SOUPS 2017 - [c12]Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent E. Seamons, Daniel Zappala:
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. USENIX Security Symposium 2017: 609-624 - 2016
- [c11]Scott Ruoti
, Jeff Andersen, Scott Heidbrink, Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons
:
"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users. CHI 2016: 4298-4308 - [c10]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Proxies: Friend or Foe? Internet Measurement Conference 2016: 551-557 - [c9]Alexander Afanasyev
, J. Alex Halderman, Scott Ruoti
, Kent E. Seamons
, Yingdi Yu, Daniel Zappala, Lixia Zhang:
Content-based security for the web. NSPW 2016: 49-60 - [c8]Scott Ruoti, Jeff Andersen, Kent E. Seamons:
Strengthening Password-based Authentication. WAY@SOUPS 2016 - [c7]Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons:
User Attitudes Toward the Inspection of Encrypted Traffic. SOUPS 2016: 131-146 - [c6]Scott Ruoti, Kent E. Seamons:
Standard Metrics and Scenarios for Usable Authentication. WAY@SOUPS 2016 - [c5]Scott Ruoti
, Jeff Andersen, Travis Hendershot, Daniel Zappala, Kent E. Seamons
:
Private Webmail 2.0: Simple and Easy-to-Use Secure Email. UIST 2016: 461-472 - [i7]Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Scott Ruoti, Dan Bunker, Kent E. Seamons, Daniel Zappala:
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. CoRR abs/1610.08570 (2016) - 2015
- [c4]Scott Ruoti
, Brent Roberts, Kent E. Seamons
:
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems. WWW 2015: 916-926 - [i6]Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons:
At Least Tell Me: User Attitudes Toward the Inspection of Encrypted Traffic. CoRR abs/1510.04921 (2015) - [i5]Scott Ruoti, Jeff Andersen, Travis Hendershot, Daniel Zappala, Kent E. Seamons:
Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email. CoRR abs/1510.08435 (2015) - [i4]Scott Ruoti, Jeff Andersen, Scott Heidbrink, Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
Johnny and Jane: Analyzing Secure Email Using Two Novice Users. CoRR abs/1510.08554 (2015) - [i3]Scott Ruoti, Jeff Andersen, Daniel Zappala, Kent E. Seamons:
Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR abs/1510.08555 (2015) - [i2]Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research. CoRR abs/1510.08943 (2015) - 2014
- [c3]Mark O'Neill, Scott Ruoti
, Kent E. Seamons
, Daniel Zappala:
POSTER: TLS Proxies: Friend or Foe? CCS 2014: 1487-1489 - [i1]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Proxies: Friend or Foe? CoRR abs/1407.7146 (2014) - 2013
- [c2]Scott Ruoti
, Nathan Kim, Ben Burgon, Timothy W. van der Horst, Kent E. Seamons
:
Confused Johnny: when automatic encryption leads to confusion and mistakes. SOUPS 2013: 5:1-5:12 - 2012
- [c1]Chris Robison, Scott Ruoti
, Timothy W. van der Horst, Kent E. Seamons
:
Private Facebook Chat. SocialCom/PASSAT 2012: 451-460
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint