USP論文読破会

ユーザブルセキュリティ・プライバシ(USP)論文読破会

ユーザブルセキュリティ・プライバシに関するトップ論文を読んで得られた知見を発表・共有する会。

開催:年1~2回

場所:オンサイトもしくはハイブリッド

各読破会のプログラム情報(折り畳みページ)

USP論文読破会7

ユーザブルセキュリティ・プライバシー(USP)論文読破会7

更新日:2023年11月23日

プログラムを一部更新 

ユーザブルセキュリティ・プライバシー研究とは、セキュリティとプライバシーのユーザビリティに特化した研究領域であり、主にヒューマンファクタに焦点を当ててセキュリティ・プライバシーを議論します。 ユーザブルセキュリティ・プライバシーの研究は世界的な発展を見せており、本分野を専門的に扱う国際会議 Symposium on Usable Privacy and Security (SOUPS) への投稿数と採録数も増加が続いています。 加えて、SOUPSに限らずセキュリティ・プライバシーの難関国際会議で本分野の論文が多く発表されるようになり、本分野の裾野は確実に広がっています。 ユーザブルセキュリティ・プライバシー論文読破会は、このような発展を考慮し、当初開催されていたSOUPS論文読破会をもとに、SOUPS以外の国際会議も広く対象会議とすることで発展させたイベントです。 本読破会では、参加者同士で協力して本分野の最先端の論文を紹介し合い、参加者が最先端研究を広く把握することを目指します。 また最先端研究の把握を通して、SPT研究会が対象とする分野の国内研究の底上げを図ります。

第7回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3、2020年11月に開催されたUSP読破会4、2021年7月に開催されたUSP読破会5、2022年11月に開催されたUSP読破会6に続く開催です。

開催要項

日時: 2023年11月24日(金) 10:00~18:00(予定)

開催形式: ハイブリット開催
現地会場: NICTイノベーションセンター(東京都中央区日本橋2-7-1 東京日本橋タワー 15階) (予定)[交通のご案内(PDF)]
オンライン: Zoom

会場の収容人数に限りがございます。現地参加を希望の方は、早めの申込をお願いします。なお、発表者や学生参加者の現地参加を優先させていただく可能性があり、必ずしも先着順とはならないこと予めご了承願います。現地参加の可否については申込受付後に開催担当より個別にご連絡します。

参加費: 無料

発表者募集(締め切りました)

本読破会で論文を紹介していただける方を募集します。 1論文につき15 or 20分程度(質疑込み、発表時間は発表者人数をみて後日連絡させていただきます)でご紹介ください。 紹介のスライドを事前にお送りいただき、当日の参加者と共有します。

発表申込は、定員に達し次第締め切ります。

紹介いただく論文は、前回の読破会発表申込以降(2022年09月〜2023年11月)に発表された、ユーザブルセキュリティ・プライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、ユーザブルセキュリティ・プライバシー論文が発表されている代表的な国際会議を、本ウェブページの下部にリストアップしました。 ただし、それらの国際会議に限定せず、ヒューマンファクタとセキュリティ・プライバシーを扱った論文を広く受け付けます。

発表希望の方は以下のフォームより申込をお願いします。
USP論文読破会7 発表申込フォーム(Googleフォーム)

ご入力いただく内容:

フォームによる発表申込受付後、紹介いただく論文の確定の連絡を開催担当より差し上げます。

参加者募集(締め切りました)

参加希望の方は以下のフォームより申込をお願いします。発表申込者の参加申込は不要です。
USP論文読破会7 参加申込フォーム(Googleフォーム)

ご入力いただく内容:

お知らせ

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 情報処理学会の学会員の方の登録費は3,600円(税抜)です。
情報処理学会に入会するためには、別途入会金と年会費が必要です。 非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

懇親会

読破会終了後に懇親会を行います。

場所

南インド料理ダクシン 大手町店

時間

18:30-

会費

6,000円 (予定)

SPT研究会から懇親会費の領収書は発行されません。どうしても領収書が必要な方は会場店舗からの発行となります。

参考:ユーザブルセキュリティ・プライバシー論文が発表される代表的な国際会議

注意:本ページ公開時点(2023年8月)で、プログラム等が未公開の会議も含みます

運営

お問い合わせ先: uspread 【アットマーク】spt.ipsj.or.jp

開催担当:山岸 伶(日立)

運営メンバ:
長谷川 彩子(NICT)
金森 祥子(NICT)
畑島 隆(NTT)
坂本 一仁(DataSign)

読破会プログラム

USP論文読破会6

ユーザブルセキュリティ・プライバシー(USP)論文読破会6

更新日:2022年11月15日

ユーザブルセキュリティ・プライバシー研究とは、セキュリティとプライバシーのユーザビリティに特化した研究領域であり、主にヒューマンファクタに焦点を当ててセキュリティ・プライバシーを議論します。 ユーザブルセキュリティ・プライバシーの研究は世界的な発展を見せており、本分野を専門的に扱う国際会議 Symposium on Usable Privacy and Security (SOUPS) への投稿数と採録数も増加が続いています。 加えて、SOUPSに限らずセキュリティ・プライバシーの難関国際会議で本分野の論文が多く発表されるようになり、本分野の裾野は確実に広がっています。 ユーザブルセキュリティ・プライバシー論文読破会は、このような発展を考慮し、当初開催されていたSOUPS論文読破会をもとに、SOUPS以外の国際会議も広く対象会議とすることで発展させたイベントです。 本読破会では、参加者同士で協力して本分野の最先端の論文を紹介し合い、参加者が最先端研究を広く把握することを目指します。 また最先端研究の把握を通して、SPT研究会が対象とする分野の国内研究の底上げを図ります。

第6回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3、2020年11月に開催されたUSP読破会4、2021年7月に開催されたUSP読破会5に続く開催です。

開催要項

日時: 2022年11月18日(金) 10:30~17:00

開催形式: ハイブリット開催
現地会場: 千代田区大手町1-8-1 KDDI大手町ビル16階(NICTイノベーションセンター)[交通のご案内(PDF)]
オンライン: Zoom

会場の収容人数に限りがございます。現地参加を希望の方は、早めの申込をお願いします。なお、発表者や学生参加者の現地参加を優先させていただく可能性があり、必ずしも先着順とはならないこと予めご了承願います。現地参加の可否については申込受付後に開催担当より個別にご連絡します。

参加費: 無料

発表者募集(締め切りました)

本読破会で論文を紹介していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただき、当日の参加者と共有します。

発表申込は、定員に達し次第締め切ります。

紹介いただく論文は、前回の読破会以降(2021年8月~2022年11月)に発表された、ユーザブルセキュリティ・プライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、ユーザブルセキュリティ・プライバシー論文が発表されている代表的な国際会議を、本ウェブページの下部にリストアップしました。 ただし、それらの国際会議に限定せず、ヒューマンファクタとセキュリティ・プライバシーを扱った論文を広く受け付けます。

発表希望の方は以下のフォームより申込をお願いします。
USP論文読破会6 発表申込フォーム(Googleフォーム)

ご入力いただく内容:

フォームによる発表申込受付後、紹介いただく論文の確定の連絡を開催担当より差し上げます。

参加者募集 11/17(木) 12:00まで(現地参加は締め切りました)

参加希望の方は以下のフォームより申込をお願いします。発表申込者の参加申込は不要です。
USP論文読破会6 参加申込フォーム(Googleフォーム)

ご入力いただく内容:

お知らせ

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 情報処理学会の学会員の方の登録費は3,600円(税抜)です。
情報処理学会に入会するためには、別途入会金と年会費が必要です。 非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

参考:ユーザブルセキュリティ・プライバシー論文が発表される代表的な国際会議

運営

お問い合わせ先: uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

運営メンバ:
長谷川 彩子(NICT)
畑島 隆(NTT)
金森 祥子(NICT)
坂本 一仁(DataSign)
金岡 晃(東邦大学)

読破会プログラム

USP論文読破会5

ユーザブルセキュリティ・プライバシー(USP)論文読破会5

更新日:2021年7月21日

ユーザブルセキュリティ・プライバシー研究とは、セキュリティとプライバシーのユーザビリティに特化した研究領域であり、主にヒューマンファクタに焦点を当ててセキュリティ・プライバシーを議論します。 ユーザブルセキュリティ・プライバシーの研究は世界的な発展を見せており、本分野を専門的に扱う国際会議Symposium on Usable Privacy and Security (SOUPS)への投稿数と採録数も上昇が続いています。 加えて、SOUPSに限らずセキュリティ・プライバシーの難関国際会議で本分野の論文が多く発表されるようになり、本分野の裾野は確実に広がっています。 ユーザブルセキュリティ・プライバシー論文読破会は、このような発展を考慮し、当初開催されていたSOUPS論文読破会をもとに、SOUPS以外の国際会議も広く対象会議とすることで発展させたイベントです。 本読破会では、参加者同士で協力して本分野の最先端の論文を紹介し合い、参加者が最先端研究を広く把握することを目指します。 また最先端研究の把握を通して、SPT研究会が対象とする分野の国内研究の底上げを図ります。

第5回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3、2020年11月に開催されたUSP読破会4に続く開催です。

開催要項

日時:2021年7月21日(水)13:00~18:15

会場:オンライン(Zoom)

参加費

無料

発表者募集(締め切りました)

本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者と共有いたします。

発表申し込みは、定員に達し次第締め切ります。

論文はこの1年(2020年8月~2021年7月)に発表されたユーザブルセキュリティ・プライバシーに関わると考えられる論文からお好きにお選びください。

発表を希望する論文が前回の論文読破会(USP読破会4)にて既に発表されていないことをご確認の上、お申し込みください。また、

参考までに、ユーザブルセキュリティ・プライバシーの論文が複数発表されている代表的な国際会議を、本ウェブページの下部に「参考:ユーザブルセキュリティ・プライバシーの論文が発表される代表的な国際会議」としてリストアップいたしました。 ただし、それらの国際会議に限定せず、ヒューマンファクタとセキュリティ・プライバシーを扱った論文を広く受け付けます。

発表ご希望の方は、次のフォームより入力してください。

https://docs.google.com/forms/d/1wo-IambiBlUurliGdgQ1aYY88CE6ujUGe_swUak65qg/

入力いただく内容:

担当論文の決定方法について

フォームによる受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、開催担当より発表者にご連絡し本ページ上でアナウンスいたします。

参加申込

参加ご希望の方は、次のフォームより入力してください。発表者の方は入力不要です。

https://docs.google.com/forms/d/1pM7ZeeTHZeVIpT6DNN7Z91m6Pt669_wa5DAoMOdmwzA/

入力いただく内容:

お知らせ

その他

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

参考:ユーザブルセキュリティ・プライバシーの論文が発表される代表的な国際会議

運営について

お問い合わせ先

uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

長谷川 彩子(NTT研究所)

読破会プログラム

USP論文読破会4

ユーザブルセキュリティ・プライバシー(USP)論文読破会4

更新日:2020年11月16日

ユーザブルセキュリティ・プライバシーの分野は世界的な発展を見せ、当該分野を専門的に扱う国際会議Symposium on Usable Privacy and Security (SOUPS)への投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会が開始されました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。

第3回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2、2019年11月に開催されたUSP読破会3に続く開催です。

開催要項

日時:2020年11月27日(金)10:00~18:00(予定)

会場:オンライン(Zoom)

参加費

無料

発表者募集(締め切りました)

本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者と共有いたします。

発表申し込みは、定員に達し次第締め切ります。

論文はこの1年(2019年11月~2020年11月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文4」としてリストアップいたしました。ご参考ください。

発表ご希望の方は、次のフォームより入力してください。

https://forms.gle/nmii55Ch8n2VKdL88

入力いただく内容:

担当論文の決定方法について

フォームによる受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。

論文担当情報

参加申込

参加ご希望の方は、次のフォームより入力してください。発表者の方は入力不要です。

https://forms.gle/2uVhQQsZmQPyoxHv8

入力いただく内容:

お知らせ

その他

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円(税抜)です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

参考:代表的な国際会議で発表されたUSP論文4

EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection

Yuma Kurogome, NTT Secure Platform Laboratories; Yuto Otsuki, NTT Secure Platform Laboratories; Yuhei Kawakoya, NTT Secure Platform Laboratories; Makoto Iwamura, NTT Secure Platform Laboratories; Syogo Hayashi, NTT Security (Japan) KK; Tatsuya Mori, Waseda University / NICT; Koushik Sen, University of California, Berkeley

link

Your Hashed IP Address: Ubuntu - Perspectives on Transparency Tools for Online Advertising

Tobias Urban, Institute for Internet Security, Westphalian University of Applied Sciences; Martin Degeling, Ruhr University Bochum; Horst Gortz Institute for IT Security; Thorsten Holz, Ruhr University Bochum; Horst Gortz Institute for IT Security; Norbert Pohlmann, Institute for Internet Security, Westphalian University of Applied Sciences

link

Will You Trust This TLS Certificate? Perceptions of People Working in IT

Martin Ukrop, Masaryk University; Lydia Kraus, Masaryk University; Vashek Matyas, Masaryk University; Heider Ahmad Mutleq Wahsheh, Ca' Foscari University of Venice

link

I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders

Ayako Akiyama Hasegawa, NTT Secure Platform Laboratories; Takuya Watanabe, NTT Secure Platform Laboratories; Eitaro Shioji, NTT Secure Platform Laboratories; Mitsuaki Akiyama, NTT Secure Platform Laboratories

link

Open Market or Ghost Town? The Curious Case of OpenBazaar

James E. Arps (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)

link

Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users

Artemij Voskobojnikov (University of British Columbia), Borke Obada-Obieh (University of British Columbia), Yue Huang (University of British Columbia), Konstantin Beznosov (University of British Columbia)

link

AsiaUSEC 2020 (会議のWebサイト)

A Tale of Two Browsers: Understanding User’s Web Browser Choices in South Korea -

Simon Woo, Hyoungshick Kim, Ji Won Choi, Soyoon Jeon, Jihye Woo and Joon Han

link

User-Centered Risk Communication for Safer Browsing

Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe and L. Jean Camp.

link

Secure Email – A Usability Study

Adrian Reuter, Ahmed Abdelmaksoud, Wadie Lemrazzeq, Karima Boudaoud and Marco Winckler

link

The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails,

George Nasser, Ben Morrison, Piers Bayl-Smith, Ronnie Taib, Michael Gayed, and Mark Wiggins

link

Cue Utilization, Phishing Feature and Phishing Email Detection

Piers Bayl-Smith, Daniel Sturman and Mark Wiggins

link

Dis-Empowerment Online- An Investigation of Privacy & Sharing Perceptions & Method Preferences

KovilaP.L.Coopamootoo

link

Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation,

Oksana Kulyk, Benjamin Maximilian Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer.

link

Understanding Perceptions of Smart Devices

Hilda Hadan, Sameer Patil

link

In Our Employer We Trust: Mental Models of Office Worker’s Privacy Perceptions

Jan Tolsdorf and Florian Dehling

link

Behaviour of Outsourced Employees as Sources of Information System Security Threats

David Oyebisi and Kennedy Njenga

link

Exploring Effects of Auditory Stimuli on CAPTCHA Performance

Gene Tsudik, Tyler Kaczmarek, Bruce Berg, Alfred Kobsa

link

PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records

Xian Chu, Huiping Sun, Zhong Chen

link

Empathy as a Response to Frustration in Password Choice

Kovila P.L. Coopamootoo

link

Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage

Harshal Tupsamudre,Monika Sahu,Kumar Vidhani,Sachin Lodha

link

Incorporating Psychology into Cyber Security Education: A Pedagogical Approach

Jacqui Taylor-Jackson, John McAlaney, Jeff Foster, Abubakar Bello, Alana Maurushat, John Dale

link

Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators

Imani N. Sherman (University of Florida), Jasmine D. Bowers (University of Florida), Keith McNamara Jr. (University of Florida), Juan E. Gilbert (University of Florida), Jaime Ruiz (University of Florida), Patrick Traynor (University of Florida)

link

OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display

Shiqing Luo (Georgia State University), Anh Nguyen (Georgia State University), Chen Song (San Diego State University), Feng Lin (Zhejiang University), Wenyao Xu (SUNY Buffalo), Zhisheng Yan (Georgia State University)

link

On the Resilience of Biometric Authentication Systems against Random Inputs

Benjamin Zi Hao Zhao (University of New South Wales and Data61 CSIRO), Hassan Jameel Asghar (Macquarie University and Data61 CSIRO), Mohamed Ali Kaafar (Macquarie University and Data61 CSIRO)

link

Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities

Zhenfeng Zhang (Chinese Academy of Sciences, University of Chinese Academy of Sciences, and The Joint Academy of Blockchain Innovation), Yuchen Wang (Chinese Academy of Sciences and University of Chinese Academy of Sciences), Kang Yang (State Key Laboratory of Cryptology)

link

A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems

Matthew Smith (University of Oxford), Martin Strohmeier (University of Oxford), Jonathan Harman (Vrije Universiteit Amsterdam), Vincent Lenders (armasuisse Science and Technology), Ivan Martinovic (University of Oxford)

link

Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference

Peter Ney (University of Washington), Luis Ceze (University of Washington), Tadayoshi Kohno (University of Washington)

link

Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies

Sebastian Roth (CISPA Helmholtz Center for Information Security), Timothy Barron (Stony Brook University), Stefano Calzavara (Università Ca' Foscari Venezia), Nick Nikiforakis (Stony Brook University), Ben Stock (CISPA Helmholtz Center for Information Security)

link

Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals

Peng Wang (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington), Yue Qin (Indiana University Bloomington), XiaoFeng Wang (Indiana University Bloomington)

link

Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards

Rock Stevens (University of Maryland), Josiah Dykstra (Independent Security Researcher), Wendy Knox Everette (Leviathan Security Group), James Chapman (Independent Security Researcher), Garrett Bladow (Dragos), Alexander Farmer (Independent Security Researcher), Kevin Halliday (University of Maryland), Michelle L. Mazurek (University of Maryland)

link

"Addressing Anonymous Abuses: Measuring the Effects of Technical Mechanisms on Reported User Behaviors "

Wajeeha Ahmad and Ilaria Liccardi

link

"Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks "

Yue Huang, Borke Obada-Obieh, and Konstantin (Kosta) Beznosov

link

"Arseing around was Fun!" – Humor as a Resource in Design and Making

NettaIivari, Marianne Kinnula, LeenaKuure and TiinaKeisanen

link

"Bug or Feature? Covert Impairments to Human Computer Interaction "

John V. Monaco

link

"Building and Validating a Scale for Secure Software Development Self-Efficacy "

Daniel J Votipka, Desiree Abrokwa, and Michelle L. Mazurek

link

"Circle of Trust: A New Approach to Mobile Online Safety for Families "

Arup Kumar Ghosh, Charles E. Hughes, and Pamela J. Wisniewski

link

"Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence "

Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal

link

Does Context in Privacy Communication Really Matter? — A Survey on Consumer Concerns and Preferences

Nico Ebert, Kurt Alexander Ackermann and Peter Heinrich

link

"Effects of Credibility Indicators on Social Media News Sharing Intent "

Waheeb Yaqub, Otari Kakhidze, Morgan L. Brockman, Nasir Memon, and Sameer Patil

link

"Evaluating 'Prefer not to say' Around Sensitive Disclosures "

Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F. Maestre, and Ann Blandford

link

"Evaluating the End-User Experience of Private Browsing Mode "

Ruba Abu-Salma and Benjamin Livshits

link

"Evaluating the Information Security Awareness of Smartphone Users "

Ron Bitton, Kobi Boymgold, Rami Puzis, and Asaf Shabtai

link

"Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices "

Yixin Zou, Kevin Roundy, Acar Tamersoy, Saurabh Shintre, johann roturier, and Florian Schaub

link

"Exploring Nudge Designs to Help Adolescent SNS Users Avoid Privacy and Safety Threats "

Hiroaki Masaki, Kengo Shibata, Shui Hoshino, Takahiro Ishihama, Nagayuki Saito, and Koji Yatani

link

"How Mandatory Second Factor Affects the Authentication User Experience "

Jacob Abbott and Sameer Patil

link

"I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios "

Yunpeng Song, Yun Huang, Zhongmin Cai, and Jason I. Hong

link

"I'm hoping they're an ethical company that won't do anything that I'll regret": Users Perceptions of At-home DNA Testing Companies

Khadija Baig, Reham Mohamed, Anna-Lena Theus, and Sonia Chiasson

link

"Informing the Design of a Personalized Privacy Assistant for the Internet of Things "

Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh

link

"""It's a scavenger hunt"": Usability of Websites' Opt-Out and Data Deletion Choices "

Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub

link

"Let's Talk about Sext: How Adolescents Seek Support and Advice about Their Online Sexual Experiences "

Afsaneh Razi, Karla Badillo-Urquiola and Pamela J. Wisniewski

link

Lime', 'Open Lock', and 'Blocked': Children's Perception of Colors, Symbols, and Words in Cybersecurity Warnings

Rebecca Jeong and Sonia Chiasson

link

"Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs "

Peter Leo Gorski, Yasemin Acar, Luigi Lo Iacono, and Sascha Fahl

link

"Measuring Identity Confusion with Uniform Resource Locators "

Joshua Reynolds, Deepak Kumar, Zane Ma, Rohan C Subramanian, Meishan Wu, Martin Shelton, Joshua Mason, Emily Stark, and Michael Bailey

link

On Conducting Security Developer Studies with CS Students: Examining a Password-Storage Study with CS Students, Freelancers, and Company Developers

Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, and Matthew Smith

link

"Online Privacy Heuristics that Predict Information Disclosure "

S. Shyam Sundar, Jinyoung Kim, Mary Beth Rosson and Maria D. Molina

link

Ownership, Privacy, and Control in the Wake of Cambridge Analytica: The Relationship between Attitudes and Awareness

Frank M. Shipman and Catherine C. Marshall

link

Private Responses for Public Sharing: Understanding Self-Presentation and Relational Maintenance via Stories in Social Media

Penny Triệu and Nancy K. Baym

link

Robocalling: STIRRED AND SHAKEN! – An Investigation of Calling Displays on Trust and Answer Rates

Gregory W. Edwards, Michael J. Gonzales, and Marc A. Sullivan

link

Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information

Julia Hanson, Miranda Wei, Sophie Veys, Matthew Kugler, Lior Strahilevitz, and Blase Ur

link

"The Burden of Ending Online Account Sharing "

Borke Obada-Obieh, Yue Huang, and Konstantin Beznosov

link

"The Influence of Decaying the Representation of Older Social Media Content on Simulated Hiring Decisions "

Reham Mohamed, Paulina Chametka, and Sonia Chiasson

link

"The Politics of Privacy Theories: Moving from Norms to Vulnerabilities "

Nora McDonald and Andrea Forte

link

"The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions "

Christina Katsini, Yasmeen Abdrabou, George E. Raptis, Mohamed Khamis, and Florian Alt

link

"Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos "

Yifang Li, Nishant Vishwamitra, Hongxin Hu, and Kelly Caine

link

"Understanding Cybersecurity Practices in Emergency Departments "

Elizabeth Stobert, David Barrera, Valérie Homier, and Daniel Kollek

link

"Understanding Fitness Tracker Users' Security and Privacy Knowledge, Attitudes and Behaviours "

Sandra Gabriele and Sonia Chiasson

link

"Understanding Privacy-Related Questions on Stack Overflow "

Mohammad Tahaei, Kami Vaniea, and Naomi Saphra

link

"User Experiences with Online Status Indicators "

Camille Cobb, Lucy Simko, Tadayoshi Kohno, and Alexis Hiniker

link

"""We Hold Each Other Accountable"": Unpacking How Social Groups Approach Cybersecurity and Privacy Together "

Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das

link

"What is this URL's Destination? Empirical Evaluation of Users' URL Reading "

Sara Albakry, Kami Vaniea, and Maria K. Wolters

link

"Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email "

Jayati Dev, Emilee Rader, and Sameer Patil

link

"Will Deleting History Make Alexa More Trustworthy? Effects of Privacy and Content Customization on User Experience of Smart Speakers "

Eugene Cho, S. ShyamSundar, Saeed Abdullah and NasimMotalebi

link

"Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication"

Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Germany), Michael Schilling (CISPA Helmholtz Center for Information Security, Germany), Michaela Neumayr (CISPA Helmholtz Center for Information Security, Germany), Michael Backes (CISPA Helmholtz Center for Information Security, Germany), Sven Bugiel (CISPA Helmholtz Center for Information Security, Germany)

link

"This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs"

"Philipp Markert (Ruhr University Bochum), Daniel Bailey (Ruhr University Bochum), Maximilian Golla (Max Planck Institute for Security and Privacy), Markus Dürmuth (Ruhr University Bochum), Adam Aviv (The George Washington University) "

link

"Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies"

"Eunyong Cheon (UNIST, Republic of Korea), Yonghwan Shin (UNIST, Republic of Korea), Jun Ho Huh (Samsung Research, Republic of Korea), Hyoungshick Kim (Sungkyunkwan University, Republic of Korea), Ian Oakley (UNIST, Republic of Korea) "

link

Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework

"Célestin Matte (Inria, France), Nataliia Bielova (Inria, France), Cristiana Santos (Inria, France) "

link

"Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings"

"Mary Jean Amon (University of Colorado Boulder), Rakibul Hasan (Indiana University), Kurt Hugenberg (Indiana University), Bennett Bertenthal (Indiana University), Apu Kapadia (Indiana University) "

link

Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise

Gokul Chettoor Jayakrishnan, Gangadhara Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, and Sachin Premsukh Lodha, Sankalp Suneel Pandit, TCS Research, Tata Consultancy Services Limited

link

“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company

Florian M. Farke, Ruhr University Bochum; Lennart Lorenz, tracekey solutions GmbH; Theodor Schnitzler, Philipp Markert, and Markus Dürmuth, Ruhr University Bochum

link

Knock, Knock. Who’s There? On the Security of LG’s Knock Codes

Raina Samuel, New Jersey Institute of Technology; Philipp Markert, Ruhr University Bochum, Germany; Adam J. Aviv, The George Washington University; Iulian Neamtiu, New Jersey Institute of Technology

link

An Empirical Study of Wireless Carrier Authentication for SIM Swaps

"Kevin Lee, Benjamin Kaiser, Jonathan Mayer, and Arvind Narayanan, Princeton University "

link

Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations

"Jayati Dev, Indiana University; Pablo Moriano, Oak Ridge National Laboratory; L. Jean Camp, Indiana University "

link

Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges

Nora McDonald, Alison Larsen, and Allison Battisti, University of Maryland, Baltimore County; Galina Madjaroff, University of Maryland; Aaron Massey and Helena Mentis, University of Maryland, Baltimore County

link

Blind and Human: Exploring More Usable Audio CAPTCHA Designs

"Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath Subramanian, and Sauvik Das, Georgia Institute of Technology "

link

Usable Sexurity: Studying People’s Concerns and Strategies When Sexting

"Christine Geeng, Jevan Hutson, and Franziska Roesner, University of Washington "

link

Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault

Borke Obada-Obieh, The University of British Columbia; Lucrezia Spagnolo, Vesta Social Innovation Technologies; Konstantin (Kosta) Beznosov, University of British Columbia

link

Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers

"Anastasia Danilova, Alena Naiakshina, and Johanna Deuter, University of Bonn; Matthew Smith, University of Bonn and Fraunhofer FKIE "

link

Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras

"George Chalhoub and Ivan Flechais, University of Oxford; Norbert Nthala, Michigan State University; Ruba Abu-Salma, University College London (UCL) & Inria "

link

An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development

"Hernan Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, and Xinming Ou, University of South Florida "

link

Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security

"Justin Smith, Lafayette College; Lisa Nguyen Quang Do and Emerson Murphy-Hill, Google "

link

Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators

Christian Tiefenau and Maximilian Häring, University of Bonn; Katharina Krombholz, CISPA Helmholtz Center for Information Security; Emanuel von Zezschwitz, University of Bonn and Fraunhofer FKIE

link

An investigation of phishing awareness and education over time: When and how to best remind users

Benjamin Maximilian Reinheimer, Lukas Aldag, Peter Mayer, Mattia Mossano, and Reyhan Duezguen, Karlsruhe Institute of Technology; Bettina Lofthouse, Landesamt für Geoinformation und Landesvermessung Niedersachsen; Tatiana von Landesberger, Technische Universität Darmstadt; Melanie Volkamer, Karlsruhe Institute of Technology

link

An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes

Steffen Becker, Carina Wiesen, and Nils Albartus, Ruhr University Bochum and Max Planck Institute for Cybersecurity and Privacy; Nikol Rummel, Ruhr University Bochum; Christof Paar, Max Planck Institute for Cybersecurity and Privacy

link

Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures

"Ola Aleksandra Michalec, Dirk van der Linden, Sveta Milyaeva, and Awais Rashid, University of Bristol "

link

"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild

Noura Alomar, University of California, Berkeley; Primal Wijesekera, UC Berkeley / ICSI; Edward Qiu, University of California, Berkeley; Serge Egelman, UC Berkeley / ICSI

link

User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach

"Alexandra Mai and Katharina Pfeffer, SBA Research; Matthias Gusenbauer, Tokyo Institute of Technology and SBA Research; Edgar Weippl, University of Vienna; Katharina Krombholz, CISPA Helmholtz Center for Information Security "

link

Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites

"Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl, Leibniz University Hannover "

link

From Intent to Action: Nudging Users Towards Secure Mobile Payments

"Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh, Carnegie Mellon University; Florian Schaub, University of Michigan "

link

Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption

"Natã M. Barbosa, Zhuohao Zhang, and Yang Wang, University of Illinois at Urbana-Champaign "

link

Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect

Agnieszka Kitkowska, Karlstad University; Mark Warner, Northumbria University; Yefim Shulman, Tel Aviv University; Erik Wästlund and Leonardo A. Martucci, Karlstad University

link

"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions

"Emilee Rader, Samantha Hautea, and Anjali Munasinghe, Michigan State University "

link

Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories

"Sarah Bird, Ilana Segall, and Martin Lopatka, Mozilla "

link

How Risky Are Real Users' IFTTT Applets?

Camille Cobb and Milijana Surbatovich, Carnegie Mellon University; Anna Kawakami, Wellesley College; Mahmood Sharif, NortonLifeLock; Lujo Bauer, Carnegie Mellon University; Anupam Das, North Carolina State University; Limin Jia, Carnegie Mellon University

link

USENIX Security '20 (会議のWebサイト)

"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications

Taslima Akter, Indiana University Bloomington; Bryan Dosono, Syracuse University; Tousif Ahmed and Apu Kapadia, Indiana University Bloomington; Bryan Semaan, Syracuse University

link

Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It

Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, and Michael Hicks, University of Maryland

link

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web

Elissa M. Redmiles, Microsoft Research; Noel Warford, Amritha Jayanti, and Aravind Koneru, University of Maryland; Sean Kross, University of California, San Diego; Miraida Morales, Rutgers University; Rock Stevens and Michelle L. Mazurek, University of Maryland

link

Empirical Measurement of Systemic 2FA Usability

Joshua Reynolds, University of Illinois at Urbana-Champaign and University of California, Berkeley and International Computer Science Institute; Nikita Samarin, University of California, Berkeley and International Computer Science Institute; Joseph Barnes, Taylor Judd, Joshua Mason, and Michael Bailey, University of Illinois at Urbana-Champaign; Serge Egelman, University of California, Berkeley and International Computer Science Institute

link

What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data

Miranda Wei, University of Washington / University of Chicago; Madison Stamos and Sophie Veys, University of Chicago; Nathan Reitinger and Justin Goodman, University of Maryland; Margot Herman, University of Chicago; Dorota Filipczuk, University of Southampton; Ben Weinshel, University of Chicago; Michelle L. Mazurek, University of Maryland; Blase Ur, University of Chicago

link

The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment

"Alisa Frik, International Computer Science Institute / UC Berkeley; Amelia Haviland and Alessandro Acquisti, Heinz College, Carnegie Mellon University "

link

An Observational Investigation of Reverse Engineers’ Processes

Daniel Votipka and Seth Rabin, University of Maryland; Kristopher Micinski, Syracuse University; Jeffrey S. Foster, Tufts University; Michelle L. Mazurek, University of Maryland

link

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums

Emily Tseng, Cornell University; Rosanna Bellini, Open Lab, Newcastle University; Nora McDonald, University of Maryland, Baltimore County; Matan Danos, Weizmann Institute of Science; Rachel Greenstadt and Damon McCoy, New York University; Nicola Dell and Thomas Ristenpart, Cornell Tech

link

DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists

Kasra Edalatnejad and Wouter Lueks, EPFL; Julien Pierre Martin, unaffiliated; Soline Ledésert, Anne L'Hôte, and Bruno Thomas, ICIJ; Laurent Girod and Carmela Troncoso, EPFL

link

I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp

"Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, and Brahmnoor Singh Chawla, Princeton University; Marshini Chetty, University of Chicago "

link

From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security

"Charles Weir, Lancaster University; Ben Hermann, Paderborn University; Sascha Fahl, Leibniz University Hannover "

link

EuroS&P 2020 (会議のWebサイト)

Multi-country Study of Third Party Trackers from Real Browser Histories

X. Hu, G. Suarez-Tangil, N. Sastry

link

X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies

D. Sempreboni, L. Vigano

link

"Anyone Else Seeing this Error?": Community, System Administrators, and Patch Information

A. Jenkins, P. Kalligeros, M. Wolters, K. Vaniea

link

User Attitudes On Direct-to-Consumer Genetic Testing

D. Saha, A. Chan, B. Stacy, K. Javkar, S. Patkar, M. Mazurek

link

EuroUSEC 2020 (会議のWebサイト)

A Cross-Platform Evaluation of User Online Privacy

Maryam Mehrnezhad (Newcastle University)

link

Data Sharing in Mobile Apps — User Privacy Expectations in Europe

Nils Quermann (Ruhr-Universitat Bochum), Martin Degeling (Ruhr-Universitat Bochum

link

GDPR Reality Check – Claiming and Investigating Personally Identifiable Data from Companies

Fatemeh Alizadeh (University of Siegen); Timo Jakobi (University of Siegen); Alexander Boden (Fraunhofer Institute for Applied Information Technology); Gunnar Stevens (University of Siegen); Jens Boldt (University of Siegen)

link

Analysis of Publicly Available Anti-Phishing Webpages: Contradicting Information, Lack of Concrete Advice and Very Narrow Attack Vector

Mattia Mossano (Karlsruhe Institute of Technology), Kami Vaniea (University of Edinburgh), Lukas Aldag (Karlsruhe Institute of Technology), Reyhan Duzgun (Karlsruhe Institute of Technology), Peter Mayer (Karlsruhe Institute of Technology), Melanie Volkamer (Karlsruhe Institute of Technology)

link

Investigating Teenagers' Ability to Detect Phishing Messages

James Nicholson (Northumbria University), Yousra Javed (National University of Sciences and Technology), Matt Dixon (Northumbria University), Lyne Coventry (Northumbria University), Opeyemi Dele Ajayi (Northumbria University), Philip Anderson (Northumbria University)

link

Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan

Elham Al Qahtani (UNC Charlotte), Yousra Javed (National University of Sciences & Technology), Heather Lipford (UNC Charlotte), Mohamed Shehab (UNC Charlotte)

link

Vision: I Don't Want to Use My Phone! A Cognitive Walkthrough for YubiKeys

Claudia Bischoff (University of Bonn); Eva Gerlitz (FraunhoferKIE); Matthew Smith (University of Bonn /raunhoferKIE)

link

Vision: Investigating Web APIeveloper Experience in Relation to Terms of Service andrivacyolicies

Aidah Ichario (Heriot-Watt University), Manuel Maarek (Heriot-Watt University)

link

Vision: Shred If Insecure –ersuasive Messageesign as a Lesson and Alternative torevious Approaches to Usable Secure Email Interface

Jan Tolsdorf (TH Köln - University of Applied Sciences); Luigi Lo Iacono (Hochschule Bonn-Rhein-Sieg

link

Vision: What If They Allie? Crypto Requirementsor Keyeople

Chan Nam Ngo (University of Trento);anieleriolo (Sapienza University of Rome);abio Massacci (University of Trento);aniele Venturi (Sapienza University of Rome); Ettore Battaiola (Cassa Centrale Banca

link

Vision: Why Johnny Can't Configure Smart Home? A Behaviouralrameworkor Smart Homerivacy Configuratio

Joseph Shams (King's College London), Nalin A. G. Arachchilage (La Trobe University), Jose M. Such (King's College London)

link

Simulating the Effects of Social Presence on Trust, Privacy Concerns & Usage Intentions in Automated Bots for Finance

Magdalene Ng (Newcastle University), Kovila P.L. Coopamootoo (Newcastle University), Ehsan Toreini (Newcastle University), Mhairi Aitken (Newcastle University), Karen Elliot (Newcastle University), Aad van Moorsel (Newcastle University)

link

Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries

Karoline Busse (University of Bonn), Mohammad Tahaei (University of Edinburgh), Katharina Krombholz (CISPA Helmholtz Center for Information Security), Emanuel von Zezschwitz (University of Bonn), Matthew Smith (University of Bonn/Fraunhofer FKIE), Jing Tian (Zhejiang University), Wenyuan Xu (Zhejiang University)

link

Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study

Wei Bai (University of Maryland), Michael Pearson (University of Maryland), Patrick Gage Kelley (Google), Michelle L. Mazurek (University of Maryland)

link

Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security

Verena Distler (University of Luxembourg); Carine Lallemand (University of Luxembourg / Eindhoven University of Technology); Vincent Koenig (University of Luxembourg)

link

End User and Expert Perceptions of Threats and Potential Countermeasures

Simon Anell (CISPA Helmholtz Center for Information Security), Lea Grober (CISPA Helmholtz Center for Information Security), Katharina Krombholz (CISPA Helmholtz Center for Information Security)

link

Security Should Be There By Default: Investigating How Journalists Perceive and Respond to Risks From the Internet of Things

Anjuli R. K. Shere (University of Oxford); Jason R. C. Nurse (University of Kent); Ivan Flechais (University of Oxford)

link

Tech Pains: Characterizations of Lived Cybersecurity Experiences

Huixin Tian (Indiana University Bloomington), Chris Kanich (University of Illinois, Chicago), Jason Polakis (University of Illinois, Chicago), Sameer Patil (Indiana University Bloomington)

link

AsiaCCS 2020 (会議のWebサイト)

Measuring the Impact of the GDPR on Data Sharing in Ad Networks

Tobias Urban (Insitute for Internet Security; Westphalian University of Applied Sciences); Dennis Tatang, Martin Degeling, and Thorsten Holz (Ruhr University Bochum; Horst Görtz Institute for IT Security); Norbert Pohlmann (Insitute for Internet Security; Westphalian University of Applied Sciences)

link

"Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders "

"Shahryar Baki, Rakesh Verma, and Omprakash Gnawali (University of Houston "

link

What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts

Tingmin Wu and Rongjunchen Zhang (Swinburne University of Technology; CSIRO's Data61); Wanlun Ma (University of Electronic Science and Technology of China); Sheng Wen (Swinburne University of Technology); Xin Xia (Monash University); Cecile Paris and Surya Nepal (CSIRO's Data61); Yang Xiang (Digital Research & Innovation Capability Platform, Swinburne University of Technology)

link

Be the Phisher - Understanding Users' Perception of Malicious Domains

Florian Quinkert (Ruhr University Bochum); Martin Degeling (Ruhr University Bochum; Horst Görtz Institute for IT Security); Jim Blythe (ISI, University of Southern California); Thorsten Holz (Ruhr-University Bochum)

link

運営について

お問い合わせ先

uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)

読破会プログラム

USP論文読破会3

ユーザブルセキュリティ・プライバシー(USP)論文読破会3

更新日:2019年11月28日

ユーザブルセキュリティ・プライバシーの分野は世界的な発展を見せ、当該分野を専門的に扱う国際会議Symposium on Usable Privacy and Security (SOUPS)への投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会が開始されました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。

第3回目となる今回は、2018年11月に開催されたUSP読破会、2019年5月に開催されたUSP読破会2に続く開催です。

開催要項

日時:2019年11月29日(金)10:00~17:30(予定)

会場:化学会館 6F 大会議室601
  〒101-8305 東京都千代田区神田駿河台1-5
  交通アクセス

参加費

発表者

無料

研究会登録会員

2,000円

情報処理学会学生会員

1,000円

一般(非会員)

3,000円

 

懇親会

読破会終了後に懇親会を行います。

場所

野菜巻きと手羽先 やじろう 御茶ノ水店

時間

18:00-20:00

会費

4,500円

 

発表者募集(締め切りました)

本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者に配布いたします。

発表申し込みは、定員に達し次第締め切ります。

論文はこの1年(2018年11月~2019年11月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文3」としてリストアップいたしました。ご参考ください。

発表ご希望の方は、次のアドレスに電子メールをお送りください。 uspread 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )

申込の電子メールについて

メール件名:USP論文読破会3:発表申込

記載いただきたい内容:

担当論文の決定方法について

メール受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。

論文担当情報

参加申込

件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

申込の電子メールについて

メール件名:USP論文読破会3:参加申込

記載いただきたい内容:

お知らせ

目玉企画!

2019年6月に開催されたEuroUSECで、早稲田大 森啓華さん主著の論文が採録されました。

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?
Keika Mori (Waseda University); Takuya Watanabe (NTT Secure Platform Laboratories); Yunao Zhou (Waseda University); Ayako Akiyama Hasegawa (NTT Secure Platform Laboratories); Mitsuaki Akiyama (NTT Secure Platform Laboratories); Tatsuya Mori (Waseda University / RIKEN AIP / NICT)

USP論文読破会3では、森さんにお越しいただき、その発表内容に加え、採録までの道のりをお話いただく予定です。

その他

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

参考:代表的な国際会議で発表されたUSP論文3

USP論文読破会USP読破会2で紹介された論文は除いています

ACM CCS 2018 (会議のWebサイト)

Asking for a Friend: Evaluating Response Biases in Security User Studies

Elissa M. Redmiles (University of Maryland), Ziyun Zhu (University of Maryland), Sean Kross (University of California San Diego), Dhruv Kuchhal (Maharaja Agrasen Institute of Technology), Tudor Dumitras (University of Maryland), Michelle L. Mazurek (University of Maryland)

link

Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses

Mauro Cherubini (UNIL – HEC Lausanne), Alexandre Meylan (UNIL – HEC Lausanne), Bertil Chapuis (UNIL – HEC Lausanne), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), Igor Bilogrevic (Google Inc.), Kévin Huguenin (UNIL – HEC Lausanne)

link

Investigating System Operators’ Perspective on Security Misconfigurations

Constanze Dietrich (Berliner Hochschule für Technik), Katharina Krombholz (CISPA Helmholtz Center (i.G.)), Kevin Borgolte (Princeton University), Tobias Fiebig (TU Delft)

link

Detecting User Experience Issues of the Tor Browser In The Wild

Kevin Gallagher (New York University), Sameer Patil (Indiana University Bloomington), Brendan Dolan-Gavitt (New York University), Damon McCoy (New York University), Nasir Memon (New York University)

link

Predicting Impending Exposure to Malicious Content from User Behavior

Mahmood Sharif (Carnegie Mellon University), Jumpei Urakawa (KDDI Research), Nicolas Christin (Carnegie Mellon University), Ayumu Kubota (KDDI Research), Akira Yamada (KDDI Research)

link

Reinforcing System-Assigned Passphrases Through Implicit Learning

Zeinab Joudaki (University of Ontario Institute of Technology), Julie Thorpe (University of Ontario Institute of Technology), Miguel Vargas Martin (University of Ontario Institute of Technology)

link

“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications

Maximilian Golla (Ruhr-University Bochum), Miranda Wei (University of Chicago), Juliette Hainline (University of Chicago), Lydia Filipe (University of Chicago), Markus Dürmuth (Ruhr-University Bochum), Elissa M. Redmiles (University of Maryland), Blase Ur (University of Chicago)

link

On the Accuracy of Password Strength Meters

Maximilian Golla (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum)

link

TextBugger: Generating Adversarial Text Against Real-world Applications

Jinfeng Li (Zhejiang University), Shouling Ji (Zhejiang University), Tianyu Du (Zhejiang University), Bo Li (University of California, Berkeley), Ting Wang (Lehigh University)

link

Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers

Muhammad Ahmad Bashir (Northeastern University), Umar Farooq (LUMS Pakistan), Maryam Shahid (LUMS Pakistan), Muhammad Fareed Zaffar (LUMS Pakistan), Christo Wilson (Northeastern University)

link

Total Recall: Persistence of Passwords in Android

Jaeho Lee (Rice University), Ang Chen (Rice University), Dan S. Wallach (Rice University)

link

How to End Password Reuse on the Web

Ke Coby Wang (UNC Chapel Hill), Michael K. Reiter (UNC Chapel Hill)

link

Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption

Kimia Tajik (Oregon State University), Akshith Gunasekaran (Oregon State University), Rhea Dutta (Cornell University), Brandon Ellis (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), Wu-Chi Feng (Portland State University)

link

Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change

Simon Parkin (University College London); Elissa M. Redmiles (University of Maryland); Lynne Coventry (Northumbria University); M. Angela Sasse (Ruhr University Bochum and University College London)

link

Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement

Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)

link

A Phish Scale: Rating Human Phishing Message Detection Difficulty

Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)

link

In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features

Jason Morris, Ingolf Becker, Simon Parkin (University College London)

link

Will They Share? Predicting Location Sharing Behaviors of Smartphone Users through Self-Reflection on Past Privacy Behaviors

Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)

link

Designing a Mobile App to Support Social Processes for Privacy and Security Decisions

Zaina Aljallad (University of Central Florida); Wentao Guo (Pomona College); Chhaya Chouhan, Christy Laperriere (University of Central Florida); Jess Kropczynski (University of Cincinnati); Pamela Wisnewski (University of Central Florida); Heather Lipford (University of North Carolina at Charlotte)

link

A First Look at the Usability of OpenVAS Vulnerability Scanner

M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)

link

Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters

Maximilian Golla, Jan Rimkus (Ruhr University Bochum); Adam J. Aviv (United States Naval Academy); Markus Dürmuth (Ruhr University Bochum)

link

Stop to Unlock - Improving the Security of Android Unlock Patterns

Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)

link

Continuous Smartphone Authentication using Wristbands

Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)

link

Work in Progress: A Comparative Long-Term Study of Fallback Authentication

Philipp Markert, Maximilian Golla (Ruhr University Bochum); Elizabeth Stobert (National Research Council of Canada); Markus Dürmuth (Ruhr University Bochum)

link

Case Study – Exploring Children’s Password Knowledge and Practices

Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)

link

ACM CHI 2019 (会議のWebサイト)

What Happens After Disclosing Stigmatized Experiences on Identified Social Media: Individual, Dyadic, and Social/Network Outcomes

Nazanin Andalibi

link

Exploring How Privacy and Security Factor into IoT Device Purchase Behavior

Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor

link

Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes

Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang

link

I (Don't) See What You Typed There! Shoulder-surfing Resistant Password Entry on Gamepads

Peter Mayer, Nina Gerber, Benjamin Reinheimer, Philipp Rack, Kristoffer Braun, and Melanie Volkamer

link

Voice Presentation Attack Detection through Text-Converted Voice Command Analysis

Il-Youp Kwak, Jun Ho Huh, Seung Taek Han, Iljoo Kim, and Jiwon Yoon

link

An Exploration of Bitcoin Mining Practices: Miners' Trust Challenges and Motivations

Irni Eliana Khairuddin and Corina Sas

link

Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps used by Gay and Bisexual Men

Mark Warner, Juan F. Maestre, Jo Gibbs, Chia-Fang Chung, and Ann Blandford

link

Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI

Jacob Abbott, Haley MacLeod, Novia Nurain, Gustave Ekobe, and Sameer Patil

link

Emotion and Experience in Negotiating HIV-Related Digital Resources: "It's not just a runny nose!"

Aneesha Singh, Jo Gibbs, and Ann Blandford

link

"This Girl is on Fire": Sensemaking in an Online Health Community for Vulvodynia

Alyson L. Young and Andrew D. Miller

link

Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment

Helena M. Mentis, Galina Madjaroff, and Aaron K. Massey

link

Automation Accuracy Is Good, but High Controllability May Be Better

Quentin Roy, Futian Zhang, and Daniel Vogel

link

AI-Mediated Communication: How the Perception that Profile Text was Written by AI Affects Trustworthiness

Maurice Jakesch, Megan French, Xiao Ma, Jeffrey T. Hancock, and Mor Naaman

link

Machine Heuristic: When We Trust Computers More than Humans with Our Personal Information

S. Shyam Sundar and Jinyoung Kim

link

Understanding Trust, Transportation, and Accessibility through Ridesharing

Robin N. Brewer and Vaishnav Kameswaran

link

23 Ways to Nudge: A Review of Technology-Mediated Nudging in Human-Computer Interaction

Ana Caraban, Evangelos Karapanos, Daniel Gonçalves, and Pedro Campos

link

REsCUE: A framework for REal-time feedback on behavioral CUEs using multimodal anomaly detection

Riku Arakawa and Hiromu Yakura

link

Towards an Effective Digital Literacy Intervention to Assist Returning Citizens with Job Search

Ihudiya Finda Ogbonnaya-Ogburu, Kentaro Toyama, and Tawanna R. Dillahunt

link

Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy

Manya Sleeper, Tara Matthews, Kathleen O'Leary, Anna Turner, Jill Palzkill Woelfer, Martin Shelton, Andrew Oplinger, Andreas Schou, and Sunny Consolvo

link

What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game

Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, and Erik Andersen

link

How Do Humans Assess the Credibility on Web Blogs: Qualifying and Verifying Human Factors with Machine Learning

Yonggeol Jo, Minwoo Kim, and Kyungsik Han

link

"Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh

Syed Ishtiaque Ahmed, Md. Romael Haque, Irtaza Haider, Jay Chen, and Nicola Dell

link

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats

Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, and Nicolas Christin

link

"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults

James Nicholson, Lynne Coventry, and Pamela Briggs

link

Security - Visible, Yet Unseen?

Verena Distler, Marie-Laure Zollinger, Carine Lallemand, Peter B. Roenne, Peter Y. A. Ryan, and Vincent Koenig

link

You `Might' Be Affected: An Empirical Analysis of Readability and Usability Issues in Data Breach Notifications

Yixin Zou, Shawn Danino, Kaiwen Sun, and Florian Schaub

link

`I make up a silly name': Understanding Children's Perception of Privacy Risks Online

Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van Kleek, and Nigel Shadbolt

link

Risk vs. Restriction: The Tension between Providing a Sense of Normalcy and Keeping Foster Teens Safe Online

Karla Badillo-Urquiola, Xinru Page, and Pamela J. Wisniewski

link

Laughing is Scary, but Farting is Cute: A Conceptual Model of Children's Perspectives of Creepy Technologies

Jason C. Yip, Kiley Sobel, Xin Gao, Allison Marie Hishikawa, Alexis Lim, Laura Meng, Romaine Flor Ofiana, Justin Park, and Alexis Hiniker

link

Think secure from the beginning': A Survey with Software Developers

Hala Assal and Sonia Chiasson

link

"If you want, I can store the encrypted password": A Password-Storage Field Study with Freelance Developers

Alena Naiakshina, Anastasia Danilova, Eva Gerlitz, Emanuel von Zezschwitz, and Matthew Smith

link

Security Managers Are Not The Enemy Either

Lena Reinfelder, Robert Landwirth, and Zinaida Benenson

link

Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers

Nora McDonald, Benjamin Mako Hill, Rachel Greenstadt, and Andrea Forte

link

Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings

Justin Petelka, Yixin Zou, and Florian Schaub

link

Let Me Explain: Impact of Personal and Impersonal Explanations on Trust in Recommender Systems

Johannes Kunkel, Tim Donkers, Lisa Michael, Catalin-Mihai Barbu, and Jürgen Ziegler

link

Towards Understanding the Link Between Age and Smartphone Authentication

Lina Qiu, Alexander De Luca, Ildar Muslukhov, and Konstantin Beznosov

link

Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones

Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, and Konstantin Beznosov

link

Passquerade: Improving Error Correction of Text Passwords on Mobile Devices by using Graphic Filters for Password Masking

Mohamed Khamis, Tobias Seitz, Leonhard Mertl, Alice Nguyen, Mario Schneller, and Zhe Li

link

"Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption

Flynn Wolf, Ravi Kuber, and Adam J. Aviv

link

Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility

Tavish Vaidya, Daniel Votipka, Michelle L. Mazurek, and Micah Sherr

link

Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms

Rakibul Hasan, Yifang Li, Eman Hassan, Kelly Caine, David J. Crandall, Roberto Hoyle, and Apu Kapadia

link

I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging

Elham Vaziripour, Devon Howard, Jake Tyler, Mark O'Neill, Justin Wu, Kent Seamons, and Daniel Zappala

link

Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content

Abu Saleh Md Noman, Sanchari Das, and Sameer Patil

link

A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions

Alisa Frik, Nathan Malkin, Marian Harbach, Eyal Peer, and Serge Egelman

link

Bringing Design to the Privacy Table: Broadening “Design” in “Privacy by Design” Through the Lens of HCI

Richmond Y. Wong and Deirdre K. Mulligan

link

Privacy, Power, and Invisible Labor on Amazon Mechanical Turk

Shruti Sannon and Dan Cosley

link

On the Usability of HTTPS Deployment

Matthew Bernhard, Jonathan Sharman, Claudia Ziegler Acemyan, Philip Kortum, Dan S. Wallach, and J. Alex Halderman

link

Hey Google, Can I Ask You Something in Private?

Eugene Cho

link

Privacy and Security Considerations For Digital Technology Use in Elementary Schools

Priya C. Kumar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak

link

EuroUSEC 2019 (会議のWebサイト)

Why Johnny Fails to Protect his Privacy

Nina Gerber (Karlsruhe Institute of Technology); Verena Zimmermann (Technische Universität Darmstadt); Melanie Volkamer (Karlsruhe Institute of Technology)

link

"Don't punish all of us": Measuring User Attitudes about Two-Factor Authentication

Jonathan Dutson, Danny Allen, Dennis Eggett, and Kent Seamons (Brigham Young University)

link

A Survey on Developer-Centred Security

Mohammad Tahaei and Kami Vaniea (University of Edinburgh)

link

How Could Serious Games Support Secure Programming? Designing a Study Replication and Intervention

Manuel Maarek and Léon McGregor (Heriot-Watt University); Sandy Louchart and Ross McMenemy (Glasgow School of Art)

link

Vision: Shining Light on Smart Homes – Supporting Informed Decision-Making of End Users

Verena Zimmermann, Ernestine Dickhaut, Paul Gerber, and Joachim Vogt (Technische Universität Darmstadt)

link

Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home

Sarah Prange (Bundeswehr University); Emanuel von Zezschwitz (University of Bonn); Florian Alt (Bundeswehr University)

link

Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

Keika Mori (Waseda University); Takuya Watanabe (NTT Secure Platform Laboratories); Yunao Zhou (Waseda University); Ayako Akiyama Hasegawa (NTT Secure Platform Laboratories); Mitsuaki Akiyama (NTT Secure Platform Laboratories); Tatsuya Mori (Waseda University / RIKEN AIP / NICT)

link

Detecting Misalignments Between System Security and User Perceptions: A Preliminary Socio-Technical Analysis of an E2E Email Encryption System

Borce Stojkovski, Itzel Vazquez Sandoval, and Gabriele Lenzini (University of Luxembourg)

link

A Review of Human- and Computer-Facing URL Phishing Features

Kholoud Althobaiti (University of Edinburgh / Taif University); Ghaidaa Rummani (Hood College); Kami Vaniea (University of Edinburgh)

link

2 Fast 2 Secure: A Case Study of Post-Breach Security Changes

Albesë Demjaha, Tristan Caulfield, M. Angela Sasse, and David Pym (University College London)

link

IEEE S&P 2019 (会議のWebサイト)

Reasoning Analytically About Password-Cracking Software

Alex Liu (University of Chicago), Amanda Nakanishi (University of Chicago), Maximilian Golla (Ruhr-University Bochum), David Cash (University of Chicago), Blase Ur (University of Chicago)

link

Beyond Credential Stuffing: Password Similarity Models using Neural Networks

Bijeeta Pal (Cornell University), Tal Daniel (Technion), Rahul Chatterjee (Cornell University), Thomas Ristenpart (Cornell Tech)

link

"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response

Elissa M. Redmiles (University of Maryland)

link

How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples

Elissa M. Redmiles (University of Maryland), Sean Kross (University of California San Diego), Michelle L. Mazurek (University of Maryland)

link

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems

Nan Zhang (Indiana University, Bloomington), Xianghang Mi (Indiana University, Bloomington), Xuan Feng (Indiana University, Bloomington; Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China), XiaoFeng Wang (Indiana University, Bloomington), Yuan Tian (University of Virginia), Feng Qian (Indiana University, Bloomington)

link

Cooperative Privacy and Security: Learning from People with Visual Impairments and Their Allies

Jordan Hayes, Smirity Kaushik, Charlotte Emily Price, and Yang Wang, Syracuse University

link

Privacy and Security Threat Models and Mitigation Strategies of Older Adults

Alisa Frik, International Computer Science Institute (ICSI) and University of California, Berkeley; Leysan Nurgalieva, University of Trento; Julia Bernd, International Computer Science Institute (ICSI); Joyce Lee, University of California, Berkeley; Florian Schaub, University of Michigan; Serge Egelman, International Computer Science Institute (ICSI) and University of California, Berkeley

link

Evaluating Users’ Perceptions about a System’s Privacy: Differentiating Social and Institutional Aspects

Oshrat Ayalon and Eran Toch, Tel Aviv University

link

A Self-Report Measure of End-User Security Attitudes (SA-6)

Cori Faklaris, Laura Dabbish, and Jason I. Hong, Carnegie Mellon University

link

The Effect of Entertainment Media on Mental Models of Computer Security

Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Richard Roberts, Yasmin Abdi, and Michelle L. Mazurek, University of Maryland

link

A Typology of Perceived Triggers for End-User Security and Privacy Behaviors

Sauvik Das, Georgia Institute of Technology; Laura A. Dabbish and Jason I. Hong, Carnegie Mellon University

link

Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice

Karoline Busse and Julia Schäfer, University of Bonn; Matthew Smith, University of Bonn/Fraunhofer FKIE

link

"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal

Justin Wu, Cyrus Gattrell, Devon Howard, and Jake Tyler, Brigham Young University; Elham Vaziripour, Utah Valley University; Kent Seamons and Daniel Zappala, Brigham Young University

link

"I was told to buy a software or lose my computer. I ignored it": A study of ransomware

Camelia Simoiu, Stanford University; Christopher Gates, Symantec; Joseph Bonneau, New York University; Sharad Goel, Stanford University

link

Enhancing Privacy through an Interactive On-demand Incremental Information Disclosure Interface: Applying Privacy-by-Design to Record Linkage

Hye-Chung Kum, Population Informatics Lab, Texas A&M University; Eric D. Ragan, INDIE Lab, University of Florida; Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, and Cason Schmit, Population Informatics Lab, Texas A&M University

link

From Usability to Secure Computing and Back Again

Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, and Ira Globus-Harris, Boston University; Shannon Roberts, University of Massachusetts Amherst; Mayank Varia, Boston University

link

Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites

Vincent Drury and Ulrike Meyer, Department of Computer Science, RWTH Aachen University

link

"We Can't Live Without Them!" App Developers' Adoption of Ad Networks and Their Considerations of Consumer Risks

Abraham H. Mhaidli, Yixin Zou, and Florian Schaub, University of Michigan School of Information

link

Usability Smells: An Analysis of Developers’ Struggle With Crypto Libraries

Nikhil Patnaik, Joseph Hallett, and Awais Rashid, University of Bristol

link

System Administrators Prefer Command Line Interfaces, Don't They? An Exploratory Study of Firewall Interfaces

Artem Voronkov, Leonardo A. Martucci, and Stefan Lindskog, Karlstad University

link

Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines

Frank Li, University of California, Berkeley; Lisa Rogers, University of Maryland; Arunesh Mathur, Princeton University; Nathan Malkin, University of California, Berkeley; Marshini Chetty, Princeton University

link

Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous Authentication Systems on Mobile Devices

Lukas Mecke, University of Applied Sciences Munich, Munich, Germany and LMU Munich, Munich, Germany; Sarah Delgado Rodriguez and Daniel Buschek, LMU Munich, Munich, Germany; Sarah Prange, University of Applied Sciences Munich, Munich, Germany and Bundeswehr University Munich, Munich, Germany and LMU Munich, Munich, Germany; Florian Alt, Bundeswehr University Munich, Munich, Germany

link

Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen Devices

Lukas Mecke, University of Applied Sciences Munich, Munich, Germany and LMU Munich, Munich, Germany; Daniel Buschek and Mathias Kiermeier, LMU Munich, Munich, Germany; Sarah Prange, University of Applied Sciences Munich, Munich, Germany and Bundeswehr University Munich, Munich, Germany and LMU Munich, Munich, Germany; Florian Alt, Bundeswehr University Munich, Munich, Germany

link

Why people (don’t) use password managers effectively

Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University

link

Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling

Stéphane Ciolino, OneSpan Innovation Centre & University College London; Simon Parkin, University College London; Paul Dunphy, OneSpan Innovation Centre

link

A Usability Study of Five Two-Factor Authentication Methods

Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons, Brigham Young University

link

Personal Information Leakage by Abusing the GDPR 'Right of Access'

Mariano Di Martino and Pieter Robyns, Hasselt University/tUL, Expertise Centre For Digital Media; Winnie Weyts, Hasselt University - Law Faculty; Peter Quax, Hasselt University/tUL, Expertise Centre For Digital Media, Flanders Make; Wim Lamotte, Hasselt University/tUL, Expertise Centre For Digital Media; Ken Andries, Hasselt University - Law Faculty, Attorney at the Brussels Bar

link

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites

Hana Habib, Carnegie Mellon University; Yixin Zou, University of Michigan; Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh, Carnegie Mellon University; Florian Schaub, University of Michigan

link

The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings

Anthony Vance, Temple University; David Eargle, University of Colorado Boulder; Jeffrey L. Jenkins, C. Brock Kirwan, and Bonnie Brinton Anderson, Brigham Young University

link

“There is nothing that I need to keep secret”: Sharing Practices and Concerns of Wearable Fitness Data

Abdulmajeed Alqhatani and Heather Richter Lipford, University of North Carolina at Charlotte

link

"I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks

Madiha Tabassum, University of North Carolina at Charlotte; Tomasz Kosinski, Chalmers University of Technology; Heather Lipford, University of North Carolina at Charlotte

link

More than Smart Speakers: Security and Privacy Perceptions of Smart Home Personal Assistants

Noura Abdi, King's College London; Kopo M. Ramokapane, University of Bristol; Jose M. Such, King's College London

link

USENIX Security 2019 (会議のWebサイト)

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors

Christine Chen, University of Washington; Nicola Dell, Cornell Tech; Franziska Roesner, University of Washington

link

Clinical Computer Security for Victims of Intimate Partner Violence

Sam Havron, Diana Freed, and Rahul Chatterjee, Cornell Tech; Damon McCoy, New York University; Nicola Dell and Thomas Ristenpart, Cornell Tech

link

Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT Toy Privacy Norms Versus COPPA

Noah Apthorpe, Sarah Varghese, and Nick Feamster, Princeton University

link

Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study

Eric Zeng and Franziska Roesner, University of Washington

link

Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography

Felix Fischer, Technical University of Munich; Huang Xiao, Bosch Center for Artificial Intelligence; Ching-Yu Kao, Fraunhofer AISEC; Yannick Stachelscheid, Benjamin Johnson, and Danial Raza, Technical University of Munich; Paul Fawkesley and Nat Buckley, Projects by IF; Konstantin Böttinger, Fraunhofer AISEC; Paul Muntean and Jens Grossklags, Technical University of Munich

link

PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play

Benjamin Andow and Samin Yaseer Mahmud, North Carolina State University; Wenyu Wang, University of Illinois at Urbana-Champaign; Justin Whitaker, William Enck, and Bradley Reaves, North Carolina State University; Kapil Singh, IBM T.J. Watson Research Center; Tao Xie, University of Illinois at Urbana-Champaign

link

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports

Ying Dong, University of Chinese Academy of Sciences and The Pennsylvania State University; Wenbo Guo, Yueqi Chen, and Xinyu Xing, The Pennsylvania State University and JD Security Research Center; Yuqing Zhang, University of Chinese Academy of Sciences; Gang Wang, Virginia Tech

link

Detecting and Characterizing Lateral Phishing at Scale

Grant Ho, UC Berkeley and Barracuda Networks; Asaf Cidon, Barracuda Networks and Columbia University; Lior Gavish and Marco Schweighauser, Barracuda Networks; Vern Paxson, UC Berkeley and ICSI; Stefan Savage and Geoffrey M. Voelker, UC San Diego; David Wagner, UC Berkeley

link

Users Really Do Answer Telephone Scams

Huahong Tu, University of Maryland; Adam Doupé, Arizona State University; Ziming Zhao, Rochester Institute of Technology; Gail-Joon Ahn, Arizona State University and Samsung Research

link

Cognitive Triaging of Phishing Attacks

Amber van der Heijden and Luca Allodi, Eindhoven University of Technology

link

Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users

Ding Wang and Ping Wang, Peking University; Debiao He, Wuhan University; Yuan Tian, University of Virginia

link

Protecting accounts from credential stuffing with password breach alerting

Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, and Sarvar Patel, Google; Dan Boneh, Stanford; Elie Bursztein, Google

link

The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators

Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne Porter Felt, Google

link

運営について

お問い合わせ先

uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)

読破会プログラム

USP論文読破会2

ユーザブルセキュリティ・プライバシー(USP)論文読破会2

更新日:2019年5月8日

これまで、セキュリティ心理学とトラスト(SPT)研究会では、プライバシーとセキュリティのユーザビリティについての国際会議Symposium on Usable Privacy and Security (SOUPS)で発表された論文の発表内容把握のためのイベントとしてSOUPS論文読破会を2011年より開催してきました。 ユーザブルセキュリティ・プライバシーの分野はSOUPSを中心に世界的な発展を見せ、SOUPSへの投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 そこで、本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会を開催することといたしました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。

第2回目となる今回は、5月9-10日に開催される情報処理学会GN研究会・SPT研究会と電子情報通信学会LOIS研究会の合同研究会における企画セッションとして実施します。

開催要項

日時:2019年5月10日(金)14:30~17:30
※5月9-10日に開催される 第108回グループウェアとネットワークサービス(GN)・第33回セキュリティト心理学とトラスト(SPT)合同研究発表会ライフインテリジェンスとオフィス情報システム(LOIS)研究会における企画セッションとして実施します。

会場:東京農工大学小金井キャンパス
  〒184-8588 東京都小金井市中町2-24-16
  交通アクセス

参加費

参加費はそれぞれの研究会の参加費に準じます。以下はSPT研究会の当日参加費です。

研究会登録会員

無料 

情報処理学会 正会員

1,500円

情報処理学会 学生会員

500円

一般(非会員)

2,500円

学生(非会員)

1,000円

 

発表者募集(締め切りました)

本読破会で論文を報告していただける方を募集します。 1論文につき15分程度(質疑込み)でご紹介ください。 紹介のスライドを事前にお送りいただいて、当日の参加者に配布いたします。

発表申し込みは、定員に達し次第締め切ります。

論文はこの1年(2018年5月~2019年5月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文2」としてリストアップいたしました。ご参考ください。

発表ご希望の方は、次のアドレスに電子メールをお送りください。 uspread 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )

申込の電子メールについて

メール件名:USP論文読破会2:発表申込

記載いただきたい内容:

担当論文の決定方法について

メール受付後、順次担当する論文を決定させていただきます。 担当が決まった論文は、担当者より発表者にご連絡し本ページ上でアナウンスいたします。

論文担当情報

参加申込

事前の参加申込は不要です。

お知らせ

その他

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします。 学会員の方の登録費は3,600円(税抜)です!
情報処理学会に入会するためには、別途入会金と年会費が必要になります。 なお非会員の方でも研究会登録することができます。 その場合の研究会登録費は4,600円です。

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

参考:代表的な国際会議で発表されたUSP論文

USP論文読破会で紹介された論文は除いています

ACM CHI 2018 (会議のWebサイト)

Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants

Tamy Guberek (University of Michigan), Allison McDonald (University of Michigan), Sylvia Simoni (University of Michigan), Abraham H. Mhaidli (University of Michigan), Kentaro Toyama (University of Michigan), Florian Schaub (University of Michigan)

link

Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization

Claire Dolin (University of Chicago), Ben Weinshel (University of Chicago), Shawn Shan (University of Chicago), Chang Min Hahn (University of Chicago), Euirim Choi (University of Chicago), Michelle L. Mazurek (University of Maryland), Blase Ur (University of Chicago)

link

An Experimental Study of Cryptocurrency Market Dynamics

Peter M Krafft (MIT), Nicolas Della Penna (Australian National University), Alex Pentland (Massachusetts Institute of Technology)

link

Making Sense of Blockchain Applications: A Typology for HCI

Chris Elsden (Northumbria University), Arthi Manohar (Northumbria University), Jo Briggs (Northumbria University), Mike Harding (Lancaster University), Chris Speed (University of Edinburgh), John Vines (Northumbria University)

link

Breaking! A Typology of Security and Privacy News and How It’s Shared

Sauvik Das (Georgia Institute of Technology), Joanne Lo (Carnegie Mellon University), Laura Dabbish (Carnegie Mellon University), Jason Hong (Carnegie Mellon University)

link

“We Are the Product”: Public Reactions to Online Data Sharing and Privacy Controversies in the Media

Casey Fiesler (University of Colorado), Blake Hallinan (University of Colorado Boulder)

link

Not Even Past: Information Aging and Temporal Privacy in Online Social Networks

Oshrat Ayalon (Tel Aviv University), Eran Toch (Tel Aviv University)

link

The Use of Private Mobile Phones at War: Accounts From the Donbas Conflict

Irina Shklovski (IT University of Copenhagen; University of Siegen), Volker Wulf (University of Siegen)

link

Co-designing Mobile Online Safety Applications with Children

Brenna McNally (University of Maryland), Priya Kumar (University of Maryland), Chelsea Hordatt (University of Maryland), Matthew Louis Mauriello (University of Maryland; University of Maryland), Shalmali Naik (University of Maryland), Leyla Norooz (University of Maryland), Alazandra Shorter (University of Maryland), Evan Golub (University of Maryland; University of Maryland), Allison Druin (University of Maryland)

link

Contextualizing Privacy Decisions for Better Prediction (and Protection)

Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Irwin Reyes (International Computer Science Institute), Lynn Tsai (University of California (Berkeley), Jung-Wei Chen (Good Research (Inc), Nathan Good (Good Research (Inc.), David Wagner (Berkeley), Konstantin Beznosov (University of British Columbia), Serge Egelman (Berkeley; International Computer Science Institute)

link

“This App Would Like to Use Your Current Location to Better Serve You”: Importance of User Assent and System Transparency in Personalized Mobile Services

Tsai-Wei Chen (United Health), S. Shyam Sundar (The Pennsylvania State University)

link

Improving User Confidence in Concept Maps: Exploring Data Driven Explanations

Pierre Le Bras (Heriot-Watt University), David A. Robb (Heriot-Watt University), Thomas S Methven (Heriot-Watt University), Stefano Padilla (Heriot-Watt University), Mike J Chantler (Heriot-Watt University)

link

Balancing Privacy and Information Disclosure in Interactive Record Linkage with Visual Masking

Eric D Ragan (Texas A&M University), Hye-Chung Kum (Texas A&M University), Gurudev Ilangovan (Texas A&M University), Han Wang (Texas A&M University)

link

Increasing User Attention with a Comic-based Policy

Madiha Tabassum (University of North Carolina at Charlotte), Abdulmajeed Alqhatani (University of North Carolina at Charlotte), Marran Aldossari (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)

link

Who Provides Phishing Training? Facts, Stories, and People Like Me

Rick Wash (Michigan State University), Molly M Cooper (Michigan State University; Nova Southeastern University)

link

X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps

Max G. Van Kleek (University of Oxford), Reuben Binns (University of Oxford), Jun Zhao (University of Oxford), Adam Slack (University of Oxford), Sauyon Lee (University of Oxford), Dean Ottewell (University of Oxford), Nigel Shadbolt (University of Oxford)

link

Evolving the Ecosystem of Personal Behavioral Data

Jason Wiese (University of Utah), Sauvik Das (Georgia Institute of Technology), Jason Hong (Carnegie Mellon University), John Zimmerman (Carnegie Mellon University)

link

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes

Ameya Hanamsagar (USC), Simon S Woo (SUNY Korea), Chris Kanich (University of Illinois), Jelena Mirkovic (USC/ISI)

link

Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition

Christina Katsini (University of Patras), Christos Fidas (University of Patras), George Raptis (University of Patras), Marios Belk (Cognitive UX GmbH; University of Cyprus), George Samaras (University of Cyprus), Nikolaos Avouris (University of Patras)

link

Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing

Hassan Khan (University of Waterloo), Urs Hengartner (University of Waterloo), Daniel Vogel (University of Waterloo)

link

Security During Application Development: an Application Security Expert Perspective

Tyler W. Thomas (University of North Carolina at Charlotte), Madiha Tabassum (University of North Carolina at Charlotte), Bill Chu (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)

link

What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes

Karola Marky (Technische Universität Darmstadt), Oksana Kulyk (Technische Universität Darmstadt), Karen Renaud (Abertay University; University of South Africa), Melanie Volkamer (Karlsruhe Institute of Technology; Technische Universität Darmstadt)

link

EuroUSEC 2018 (会議のWebサイト)

User Perception and Expectations on Deleting Instant Messages —or— "What Happens If I Press This Button?"

Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth

link

"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer

Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer

link

A Usability Study of Secure Email Deletion

Tyler Monson, Joshua Reynolds, Trevor Smith, Scott Ruoti, Daniel Zappala, Kent Seamons

link

Consolidating Principles and Patterns for Human-centred Usable Security Research and Development

Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren

link

The Role of Privacy Violations in Privacy Calculu

Maija Poikela, Sebastian Möller

link

What Can't Data Be Used For? User Privacy Expectations about Smart TVs

Nathan Malkin, Julia Bernd, Maritza Johnson, Serge Egelman

link

Permission Impossible: Teaching Firewall Configuration in a Game Environment

Sibylle Sehl, Kami Vaniea

link

The 'Retailio' Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores

Frederic Raber, David Ziemann, Antonio Krueger

link

IEEE Symp. on Security and Privacy 2018 (会議のWebサイト)

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements

Yimin Chen (Arizona State University),Tao Li (Arizona State University),Rui Zhang (University of Delaware),Yanchao Zhang (Arizona State University),Terri Hedgpeth (Arizona State University)

link

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes

Daniel Votipka (University of Maryland),Rock Stevens (University of Maryland),Elissa Redmiles (University of Maryland),Jeremy Hu (University of Maryland),Michelle Mazurek (University of Maryland)

link

Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users

Kiron Lebeck (University of Washington),Kimberly Ruth (University of Washington),Tadayoshi Kohno (University of Washington),Franziska Roesner (University of Washington)

link

Computer Security and Privacy for Refugees in the United States

Lucy Simko (University of Washington),Ada Lerner (Wellesley College),Samia Ibtasam (University of Washington),Franziska Roesner (University of Washington),Tadayoshi Kohno (University of Washington)

link

On Enforcing the Digital Immunity of a Large Humanitarian Organization

Stevens Le Blond (École Polytechnique Fédérale de Lausanne),Alejandro Cuevas (École Polytechnique Fédérale de Lausanne),Juan Ramón Troncoso-Pastoriza (École Polytechnique Fédérale de Lausanne),Philipp Jovanovic (École Polytechnique Fédérale de Lausanne),Bryan Ford (École Polytechnique Fédérale de Lausanne),Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne)

link

The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators

Marten Oltrogge (CISPA, Saarland University),Erik Derr (CISPA, Saarland University),Christian Stransky (CISPA, Saarland University),Yasemin Acar (Leibniz University Hannover),Sascha Fahl (Leibniz University Hannover),Christian Rossow (CISPA, Saarland University),Giancarlo Pellegrino (CISPA, Saarland University, Stanford University),Sven Bugiel (CISPA, Saarland University),Michael Backes (CISPA, Saarland University)

link

Tracking Certificate Misissuance in the Wild

Deepak Kumar (University of Illinois, Urbana-Champaign),Zhengping Wang (University of Illinois, Urbana-Champaign),Matthew Hyder (University of Illinois, Urbana-Champaign),Joseph Dickinson (University of Illinois, Urbana-Champaign),Gabrielle Beck (University of Michigan),David Adrian (University of Michigan),Joshua Mason (University of Illinois, Urbana-Champaign),Zakir Durumeric (University of Michigan),J. Alex Halderman (University of Michigan),Michael Bailey (University of Illinois, Urbana-Champaign)

link

On the Economics of Offline Password Cracking

Jeremiah Blocki (Purdue University),Benjamin Harsha (Purdue University),Samson Zhou (Purdue University)

link

A Tale of Two Studies: The Best and Worst of YubiKey Usability

Joshua Reynolds (University of Illinois at Urbana-Champaign), Trevor Smith (Brigham Young University), Ken Reese (Brigham Young University), Luke Dickinson (Brigham Young University), Scott Ruoti (MIT Lincoln Laboratory), Kent Seamons (Brigham Young University)

link

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios

Melanie Volkamer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt; Andreas Gutmann, OneSpan Innovation Centre and University College London; Karen Renaud, Abertay University, University of South Africa, and University of Glasgow; Paul Gerber, Technische Universität Darmstadt; Peter Mayer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt

link

User Behaviors and Attitudes Under Password Expiration Policies

Hana Habib and Pardis Emami Naeini, Carnegie Mellon University; Summer Devlin, University of California, Berkeley; Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University

link

The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians

Elham Al Qahtani and Mohamed Shehab, University of North Carolina Charlotte; Abrar Aljohani

link

Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal

Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, and Daniel Zappala, Brigham Young University

link

Informal Support Networks: an investigation into Home Data Security Practices

Norbert Nthala and Ivan Flechais, University of Oxford

link

Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships

Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong, Carnegie Mellon University

link

Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking

Arunesh Mathur, Princeton University; Jessica Vitak, University of Maryland, College Park; Arvind Narayanan and Marshini Chetty, Princeton University

link

Can Digital Face-Morphs Influence Attitudes and Online Behaviors?

Eyal Peer, Bar-Ilan University; Sonam Samat and Alessandro Acquisti, Carnegie Mellon University

link

"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography

Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su, Indiana University Bloomington

link

"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach

Yixin Zou, Abraham H. Mhaidli, Austin McCall, and Florian Schaub, School of Information, University of Michigan

link

Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data

Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, and Oxana Comanescu, Google

link

User Comfort with Android Background Resource Accesses in Different Contexts

Daniel Votipka and Seth M. Rabin, University of Maryland; Kristopher Micinski, Haverford College; Thomas Gilray, Michelle L. Mazurek, and Jeffrey S. Foster, University of Maryland

link

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens

Orçun Çetin, Lisette Altena, Carlos Gañán, and Michel van Eeten, Delft University of Technology

link

Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse

Peter Leo Gorski and Luigi Lo Iacono, Cologne University of Applied Sciences; Dominik Wermke and Christian Stransky, Leibniz University Hannover; Sebastian Möller, Technical University Berlin; Yasemin Acar, Leibniz University Hannover; Sascha Fahl, Ruhr-University Bochum

link

Security in the Software Development Lifecycle

Hala Assal and Sonia Chiasson, Carleton University

link

Deception Task Design in Developer Password Studies: Exploring a Student Sample

Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith, University of Bonn, Germany

link

"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration

Ambar Murillo, Andreas Kramm, Sebastian Schnorf, and Alexander De Luca, Google

link

Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently

Norman Hänsch, Friedrich-Alexander-Universität Erlangen-Nürnberg; Andrea Schankin, Karlsruhe Institute of Technology; Mykolai Protsenko, Fraunhofer Institute for Applied and Integrated Security; Felix Freiling and Zinaida Benenson, Friedrich-Alexander-Universität Erlangen-Nürnberg

link

"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products

Julie M. Haney and Mary F. Theofanos, National Institute of Standards and Technology; Yasemin Acar, Leibniz University Hannover; Sandra Spickard Prettyman, Culture Catalyst

link

A Comparative Usability Study of Key Management in Secure Email

Scott Ruoti, University of Tennessee; Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons, Brigham Young University

link

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection

James Nicholson, Lynne Coventry, and Pam Briggs, PaCT Lab, Northumbria University

link

Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality

Devon Adams, Alseny Bah, and Catherine Barwulor, University of Maryland Baltimore County; Nureli Musaby, James Madison University; Kadeem Pitkin, College of Westchester; Elissa M. Redmiles, University of Maryland

link

USENIX Security Symposium 2018 (会議のWebサイト)

Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse

Sanam Ghorbani Lyastani, CISPA, Saarland University; Michael Schilling, Saarland University; Sascha Fahl, Ruhr-University Bochum; Michael Backes and Sven Bugiel, CISPA Helmholtz Center i.G.

link

Forgetting of Passwords: Ecological Theory and Data

Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, and Janne Lindqvist, Rutgers University; Antti Oulasvirta, Aalto University

link

The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength

Ingolf Becker, Simon Parkin, and M. Angela Sasse, University College London

link

Rethinking Access Control and Authentication for the Home Internet of Things (IoT)

Weijia He, University of Chicago; Maximilian Golla, Ruhr-University Bochum; Roshni Padhi and Jordan Ofek, University of Chicago; Markus Dürmuth, Ruhr-University Bochum; Earlence Fernandes, University of Washington; Blase Ur, University of Chicago

link

How Do Tor Users Interact With Onion Services?

Philipp Winter, Anne Edmundson, and Laura M. Roberts, Princeton University; Agnieszka Dutkowska-Żuk, Independent; Marshini Chetty and Nick Feamster, Princeton University

link

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level

Rock Stevens, Daniel Votipka, and Elissa M. Redmiles, University of Maryland; Colin Ahern, NYC Cyber Command; Patrick Sweeney, Wake Forest University; Michelle L. Mazurek, University of Maryland

link

From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild

Chaowei Xiao and Armin Sarabi, University of Michigan; Yang Liu, Harvard University / UC Santa Cruz; Bo Li, UIUC; Mingyan Liu, University of Michigan; Tudor Dumitras, University of Maryland, College Park

link

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities

Dongliang Mu, Nanjing University; Alejandro Cuevas, The Pennsylvania State University; Limin Yang and Hang Hu, Virginia Tech; Xinyu Xing, The Pennsylvania State University; Bing Mao, Nanjing University; Gang Wang, Virginia Tech

link

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

Rolf van Wegberg and Samaneh Tajalizadehkhoob, Delft University of Technology; Kyle Soska, Carnegie Mellon University; Ugur Akyazi, Carlos Hernandez Ganan, and Bram Klievink, Delft University of Technology; Nicolas Christin, Carnegie Mellon University; Michel van Eeten, Delft University of Technology

link

Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces

Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang, Indiana University Bloomington

link

Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem

Mohammad Rezaeirad, George Mason University; Brown Farinholt, University of California, San Diego; Hitesh Dharmdasani, Informant Networks; Paul Pearce, University of California, Berkeley; Kirill Levchenko, University of California, San Diego; Damon McCoy, New York University

link

The aftermath of a crypto-ransomware attack at a large academic institution

Leah Zhang-Kennedy, University of Waterloo, Stratford Campus; Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, and Sonia Chiasson, Carleton University

link

ACM CCS 2018 (会議のWebサイト)

Asking for a Friend: Evaluating Response Biases in Security User Studies

Elissa M. Redmiles (University of Maryland), Ziyun Zhu (University of Maryland), Sean Kross (University of California San Diego), Dhruv Kuchhal (Maharaja Agrasen Institute of Technology), Tudor Dumitras (University of Maryland), Michelle L. Mazurek (University of Maryland)

link

Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses

Mauro Cherubini (UNIL – HEC Lausanne), Alexandre Meylan (UNIL – HEC Lausanne), Bertil Chapuis (UNIL – HEC Lausanne), Mathias Humbert (Swiss Data Science Center, ETH Zurich and EPFL), Igor Bilogrevic (Google Inc.), Kévin Huguenin (UNIL – HEC Lausanne)

link

Investigating System Operators’ Perspective on Security Misconfigurations

Constanze Dietrich (Berliner Hochschule für Technik), Katharina Krombholz (CISPA Helmholtz Center (i.G.)), Kevin Borgolte (Princeton University), Tobias Fiebig (TU Delft)

link

Detecting User Experience Issues of the Tor Browser In The Wild

Kevin Gallagher (New York University), Sameer Patil (Indiana University Bloomington), Brendan Dolan-Gavitt (New York University), Damon McCoy (New York University), Nasir Memon (New York University)

link

Predicting Impending Exposure to Malicious Content from User Behavior

Mahmood Sharif (Carnegie Mellon University), Jumpei Urakawa (KDDI Research), Nicolas Christin (Carnegie Mellon University), Ayumu Kubota (KDDI Research), Akira Yamada (KDDI Research)

link

Reinforcing System-Assigned Passphrases Through Implicit Learning

Zeinab Joudaki (University of Ontario Institute of Technology), Julie Thorpe (University of Ontario Institute of Technology), Miguel Vargas Martin (University of Ontario Institute of Technology)

link

“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications

Maximilian Golla (Ruhr-University Bochum), Miranda Wei (University of Chicago), Juliette Hainline (University of Chicago), Lydia Filipe (University of Chicago), Markus Dürmuth (Ruhr-University Bochum), Elissa M. Redmiles (University of Maryland), Blase Ur (University of Chicago)

link

On the Accuracy of Password Strength Meters

Maximilian Golla (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum)

link

TextBugger: Generating Adversarial Text Against Real-world Applications

Jinfeng Li (Zhejiang University), Shouling Ji (Zhejiang University), Tianyu Du (Zhejiang University), Bo Li (University of California, Berkeley), Ting Wang (Lehigh University)

link

We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy

Martin Degeling (Ruhr-Universität Bochum), Christine Utz (Ruhr-Universität Bochum), Christopher Lentzsch (Ruhr-Universität Bochum), Henry Hosseini (Ruhr-Universität Bochum), Florian Schaub (University of Michigan), Thorsten Holz (Ruhr-Universität Bochum)

link

Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers

Muhammad Ahmad Bashir (Northeastern University), Umar Farooq (LUMS Pakistan), Maryam Shahid (LUMS Pakistan), Muhammad Fareed Zaffar (LUMS Pakistan), Christo Wilson (Northeastern University)

link

Total Recall: Persistence of Passwords in Android

Jaeho Lee (Rice University), Ang Chen (Rice University), Dan S. Wallach (Rice University)

link

How to End Password Reuse on the Web

Ke Coby Wang (UNC Chapel Hill), Michael K. Reiter (UNC Chapel Hill)

link

Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption

Kimia Tajik (Oregon State University), Akshith Gunasekaran (Oregon State University), Rhea Dutta (Cornell University), Brandon Ellis (Oregon State University), Rakesh B. Bobba (Oregon State University), Mike Rosulek (Oregon State University), Charles V. Wright (Portland State University), Wu-Chi Feng (Portland State University)

link

Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies

Karoline Busse (University of Bonn); Dominik Wermke (Leibniz University Hannover); Sabrina Amft (University of Bonn); Sascha Fahl (Leibniz University Hannover); Emanuel von Zezschwitz, Matthew Smith (University of Bonn)

link

Security When it is Welcome: Exploring Device Purchase as an Opportune Moment for Security Behavior Change

Simon Parkin (University College London); Elissa M. Redmiles (University of Maryland); Lynne Coventry (Northumbria University); M. Angela Sasse (Ruhr University Bochum and University College London)

link

Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement

Mariam Nouh (University of Oxford); Jason R. C. Nurse (University of Kent); Helena Webb, Michael Goldsmith (University of Oxford)

link

A Phish Scale: Rating Human Phishing Message Detection Difficulty

Michelle P. Steves, Kristen K. Greene, Mary F. Theofanos (National Institute of Standards and Technology)

link

In Control with no Control: Perceptions and Reality of Windows 10 Home Edition Update Features

Jason Morris, Ingolf Becker, Simon Parkin (University College London)

link

Does This App Respect My Privacy? Design and Evaluation of Information Materials Supporting Privacy-Related Decisions of Smartphone Users

Oksana Kulyk (Karlsruhe Institute of Technology); Paul Gerber, Karola Marky, Christopher Beckmann (Technische Universität Darmstadt); Melanie Volkamer (Karlsruhe Institute of Technology)

link

Will They Share? Predicting Location Sharing Behaviors of Smartphone Users through Self-Reflection on Past Privacy Behaviors

Muhammad Irtaza Safi, Abhiditya Jha (University of Central Florida); Malak Eihab Aly (New York University); Xinru Page (Bentley University); Sameer Patil (Indiana University); Pamela Wisniewski (University of Central Florida)

link

Designing a Mobile App to Support Social Processes for Privacy and Security Decisions

Zaina Aljallad (University of Central Florida); Wentao Guo (Pomona College); Chhaya Chouhan, Christy Laperriere (University of Central Florida); Jess Kropczynski (University of Cincinnati); Pamela Wisnewski (University of Central Florida); Heather Lipford (University of North Carolina at Charlotte)

link

A First Look at the Usability of OpenVAS Vulnerability Scanner

M. Uğur Aksu, Enes Altuncu, Kemal Bicakci (TOBB University of Economics and Technology)

link

Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters

Maximilian Golla, Jan Rimkus (Ruhr University Bochum); Adam J. Aviv (United States Naval Academy); Markus Dürmuth (Ruhr University Bochum)

link

Stop to Unlock - Improving the Security of Android Unlock Patterns

Alexander Suchan (SBA Research); Emanuel von Zezschwitz (Usable Security Methods Group, University of Bonn, Bonn, Germany); Katharina Krombholz (CISPA Helmholtz Center for Information Security)

link

Continuous Smartphone Authentication using Wristbands

Shrirang Mare (University of Washington); Reza Rawassizadeh (University of Rochester); Ronald Peterson, David Kotz (Dartmouth College)

link

Work in Progress: A Comparative Long-Term Study of Fallback Authentication

Philipp Markert, Maximilian Golla (Ruhr University Bochum); Elizabeth Stobert (National Research Council of Canada); Markus Dürmuth (Ruhr University Bochum)

link

Case Study – Exploring Children’s Password Knowledge and Practices

Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)

link

運営について

お問い合わせ先

uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)


読破会プログラム

USP論文読破会

ユーザブルセキュリティ・プライバシー(USP)論文読破会

更新日:2018年11月20日

これまで、セキュリティ心理学とトラスト(SPT)研究会では、プライバシーとセキュリティのユーザビリティについての国際会議Symposium on Usable Privacy and Security (SOUPS)で発表された論文の発表内容把握のためのイベントとしてSOUPS論文読破会を2011年より開催してきました。 ユーザブルセキュリティ・プライバシーの分野はSOUPSを中心に世界的な発展を見せ、SOUPSへの投稿数と採録数も上昇が続いています。 加えて、セキュリティの難関国際会議でもこれらの分野の論文が多く発表されるようになり、裾野は確実に広がっています。 そこで、本分野の最先端を幅広く把握するために、SOUPS以外の国際会議も広く対象会議とし、SOUPS論文読破会を発展させたイベントとしてユーザブルセキュリティ・プライバシー論文読破会を開催することといたしました。 本読破会では、参加者同士で協力して発表論文を読破し、内容を紹介することで参加者が本分野の最先端論文を網羅的に把握することを目指します。 また最先端研究を知ることを通してSPT研究会が対象とする分野の国内研究の底上げを図ります。

開催要項

日時:平成30年11月27日(火)10:00~17:30 (受付9:30~) 

会場:理化学研究所 革新知能統合研究センター(AIP)
  〒103-0027 東京都中央区日本橋1-4-1 日本橋一丁目三井ビルディング 15階
  交通アクセス

主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会 

参加費

発表者

1,000円

研究会登録会員

2,000円

情報処理学会学生会員

1,000円

一般(非会員)

3,000円

 

懇親会

読破会終了後に懇親会を行います。

場所

MASTER’S DREAM HOUSE (マスターズドリームハウス)

時間

18:00-20:00

会費

4,500円

 

発表者募集 (締め切りました)

本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください. 紹介のスライドを事前にお送りいただいて,当日の参加者に配布いたします.

論文はこの1年(2017年12月~2018年11月)に発表されたユーザブルセキュリティやユーザブルプライバシーに関わると考えられる論文からお好きにお選びください。

参考までに、この1年で発表された論文の中で関わると考えられる論文をページ下部に「参考:代表的な国際会議で発表されたUSP論文」としてリストアップいたしました。ご参考ください。

発表ご希望の方は,次のアドレスに電子メールをお送りください. uspread 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )

申込の電子メールについて

メール件名:USP論文読破会:発表申込

記載いただきたい内容:

担当論文の決定方法について

メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.

論文担当情報(2018年11月5日現在)

参加申込

件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

申込の電子メールについて

メール件名:USP論文読破会:参加申込

記載いただきたい内容:

お知らせ

その他

研究会非会員の方は,この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。


参考:代表的な国際会議で発表されたUSP論文

Didn’t You Hear Me? – Towards More Successful Web Vulnerability Notifications

Ben Stock (CISPA, Saarland University), Giancarlo Pellegrino (CISPA, Saarland University and Stanford University), Frank Li (UC Berkeley), Michael Backes (CISPA, Saarland University), and Christian Rossow (CISPA, Saarland University)

link

rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System

Erkam Uzun (Georgia Institute of Technology), Simon Pak Ho Chung (Georgia Institute of Technology), Irfan Essa (Georgia Institute of Technology), and Wenke Lee (Georgia Institute of Technology)

link

A Security Analysis of Honeywords

Ding Wang (Peking University), Haibo Cheng (Peking University), Ping Wang (Peking University), Jeff Yan (Linkoping University), and Xinyi Huang (Fujian Normal University)

link

Broken Fingers: On the Usage of the Fingerprint API in Android

Antonio Bianchi (University of California, Santa Barbara), Yanick Fratantonio (University of California, Santa Barbara, EURECOM), Aravind Machiry (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara), Simon Pak Ho Chung (Georgia Institute of Technology), and Wenke Lee (Georgia Institute of Technology)

link

K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All

Parimarjan Negi (Stanford University), Prafull Sharma (Stanford University), Vivek sanjay Jain (Stanford University), and Bahman Bahmani (Stanford University)

link

ABC: Enabling Smartphone Authentication with Built-in Camera

Zhongjie Ba (University at Buffalo, State University of New York), Sixu Piao (University at Buffalo, State University of New York), Xinwen Fu (University of Central Florida), Dimitrios Koutsonikolas (University at Buffalo, State University of New York), Aziz Mohaisen (University of Central Florida), and Kui Ren (University at Buffalo, State University of New York)

link

Device Pairing at the Touch of an Electrode

Marc Roeschlin (University of Oxford), Ivan Martinovic (University of Oxford), and Kasper B. Rasmussen (University of Oxford)

link

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

Di Tang (Chinese University of Hong Kong), Zhe Zhou (Fudan University), Yinqian Zhang (Ohio State University), and Kehuan Zhang (Chinese University of Hong Kong)

link

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

Aylin Caliskan (Princeton University), Fabian Yamaguchi (Shiftleft Inc), Edwin Dauber (Drexel University), Richard Harang (Sophos), Konrad Rieck (TU Braunschweig), Rachel Greenstadt (Drexel University), and Arvind Narayanan (Princeton University)

link

Exploring Website Location as a Security Indicator

Der-Yeuan Yu, Elizabeth Stobert, David Basin and Srdjan Capkun

link

User Context: An Explanatory Variable in Phishing Susceptibility

Kristen Greene, Michelle Steves, Mary Theofanos and Jennifer Kostick

link

Sonification in Security Operations Centres: What do Security Practitioners Think?

Louise Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith and Sadie Creese

link

TinPal: An Enhanced Interface for Pattern Locks

Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti and Sachin Lodha

link

Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication

Adam Aviv and Ravi Kuber

link

Quantifying Users’ Beliefs about Software Updates

Arunesh Mathur, Nathan Malkin, Marian Harbach, Eyal Peer and Serge Egelman

link

Work-In-Progress: Performance of Eyes-Free Mobile Authentication

Flynn Wolf, Adam Aviv and Ravi Kuber

link

Work in Progress: Usable Security vs. Workflow Realities

Jim Blythe, Vijay Kothari, Sean Smith and Ross Koppel

link

A Survey Of the Privacy Preferences and Practices of Iranian Users of Telegram

Elham Vaziripour, Reza Farahbakhsh, Mark O’Neill, Justin Wu, Kent Seamons and Daniel Zappala

link

Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption

Albese Demjaha, Jonathan Spring, Ingolf Becker, Simon Parkin and Angela Sasse

link

Exploring Parents’ Security and Privacy Concerns and Practices

Abdulmajeed Alqhatani and Heather Lipford

link

ACM CHI 2018 (会議のWebサイト)

Keeping a Low Profile? Technology, Risk and Privacy among Undocumented Immigrants

Tamy Guberek (University of Michigan), Allison McDonald (University of Michigan), Sylvia Simoni (University of Michigan), Abraham H. Mhaidli (University of Michigan), Kentaro Toyama (University of Michigan), Florian Schaub (University of Michigan)

link

Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization

Claire Dolin (University of Chicago), Ben Weinshel (University of Chicago), Shawn Shan (University of Chicago), Chang Min Hahn (University of Chicago), Euirim Choi (University of Chicago), Michelle L. Mazurek (University of Maryland), Blase Ur (University of Chicago)

link

An Experimental Study of Cryptocurrency Market Dynamics

Peter M Krafft (MIT), Nicolas Della Penna (Australian National University), Alex Pentland (Massachusetts Institute of Technology)

link

Making Sense of Blockchain Applications: A Typology for HCI

Chris Elsden (Northumbria University), Arthi Manohar (Northumbria University), Jo Briggs (Northumbria University), Mike Harding (Lancaster University), Chris Speed (University of Edinburgh), John Vines (Northumbria University)

link

Breaking! A Typology of Security and Privacy News and How It’s Shared

Sauvik Das (Georgia Institute of Technology), Joanne Lo (Carnegie Mellon University), Laura Dabbish (Carnegie Mellon University), Jason Hong (Carnegie Mellon University)

link

“We Are the Product”: Public Reactions to Online Data Sharing and Privacy Controversies in the Media

Casey Fiesler (University of Colorado), Blake Hallinan (University of Colorado Boulder)

link

Not Even Past: Information Aging and Temporal Privacy in Online Social Networks

Oshrat Ayalon (Tel Aviv University), Eran Toch (Tel Aviv University)

link

The Use of Private Mobile Phones at War: Accounts From the Donbas Conflict

Irina Shklovski (IT University of Copenhagen; University of Siegen), Volker Wulf (University of Siegen)

link

Co-designing Mobile Online Safety Applications with Children

Brenna McNally (University of Maryland), Priya Kumar (University of Maryland), Chelsea Hordatt (University of Maryland), Matthew Louis Mauriello (University of Maryland; University of Maryland), Shalmali Naik (University of Maryland), Leyla Norooz (University of Maryland), Alazandra Shorter (University of Maryland), Evan Golub (University of Maryland; University of Maryland), Allison Druin (University of Maryland)

link

Contextualizing Privacy Decisions for Better Prediction (and Protection)

Primal Wijesekera (University of British Columbia), Joel Reardon (University of Calgary), Irwin Reyes (International Computer Science Institute), Lynn Tsai (University of California (Berkeley), Jung-Wei Chen (Good Research (Inc), Nathan Good (Good Research (Inc.), David Wagner (Berkeley), Konstantin Beznosov (University of British Columbia), Serge Egelman (Berkeley; International Computer Science Institute)

link

Privacy Lies: Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts

Shruti Sannon (Cornell University), Natalya N Bazarova (Cornell University), Dan Cosley (Cornell University)

link

“This App Would Like to Use Your Current Location to Better Serve You”: Importance of User Assent and System Transparency in Personalized Mobile Services

Tsai-Wei Chen (United Health), S. Shyam Sundar (The Pennsylvania State University)

link

Improving User Confidence in Concept Maps: Exploring Data Driven Explanations

Pierre Le Bras (Heriot-Watt University), David A. Robb (Heriot-Watt University), Thomas S Methven (Heriot-Watt University), Stefano Padilla (Heriot-Watt University), Mike J Chantler (Heriot-Watt University)

link

Balancing Privacy and Information Disclosure in Interactive Record Linkage with Visual Masking

Eric D Ragan (Texas A&M University), Hye-Chung Kum (Texas A&M University), Gurudev Ilangovan (Texas A&M University), Han Wang (Texas A&M University)

link

Examining the Demand for Spam: Who Clicks?

Elissa M Redmiles (University of Maryland), Neha Chachra (Facebook), Brian Waismeyer (Facebook)

link

Increasing User Attention with a Comic-based Policy

Madiha Tabassum (University of North Carolina at Charlotte), Abdulmajeed Alqhatani (University of North Carolina at Charlotte), Marran Aldossari (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)

link

Who Provides Phishing Training? Facts, Stories, and People Like Me

Rick Wash (Michigan State University), Molly M Cooper (Michigan State University; Nova Southeastern University)

link

X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps

Max G. Van Kleek (University of Oxford), Reuben Binns (University of Oxford), Jun Zhao (University of Oxford), Adam Slack (University of Oxford), Sauyon Lee (University of Oxford), Dean Ottewell (University of Oxford), Nigel Shadbolt (University of Oxford)

link

Evolving the Ecosystem of Personal Behavioral Data

Jason Wiese (University of Utah), Sauvik Das (Georgia Institute of Technology), Jason Hong (Carnegie Mellon University), John Zimmerman (Carnegie Mellon University)

link

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes

Ameya Hanamsagar (USC), Simon S Woo (SUNY Korea), Chris Kanich (University of Illinois), Jelena Mirkovic (USC/ISI)

link

Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition

Christina Katsini (University of Patras), Christos Fidas (University of Patras), George Raptis (University of Patras), Marios Belk (Cognitive UX GmbH; University of Cyprus), George Samaras (University of Cyprus), Nikolaos Avouris (University of Patras)

link

Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing

Hassan Khan (University of Waterloo), Urs Hengartner (University of Waterloo), Daniel Vogel (University of Waterloo)

link

"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University

Jessica Colnago (Carnegie Mellon University), Summer Devlin (UC Berkeley), Maggie Oates (Carnegie Mellon University), Chelse Swoopes (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University)

link

Security During Application Development: an Application Security Expert Perspective

Tyler W. Thomas (University of North Carolina at Charlotte), Madiha Tabassum (University of North Carolina at Charlotte), Bill Chu (University of North Carolina at Charlotte), Heather Lipford (University of North Carolina at Charlotte)

link

Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage

Mohammad Taha Khan (University of Illinois at Chicago), Maria Hyun (University of Chicago), Chris Kanich (University of Illinois at Chicago), Blase Ur (University of Chicago)

link

What Did I Really Vote For? On the Usability of Verifiable E-Voting Schemes

Karola Marky (Technische Universität Darmstadt), Oksana Kulyk (Technische Universität Darmstadt), Karen Renaud (Abertay University; University of South Africa), Melanie Volkamer (Karlsruhe Institute of Technology; Technische Universität Darmstadt)

link

An Experience Sampling Study of User Reactions to Browser Warnings in the Field

Robert W Reeder (Google (Inc.), Adrienne Porter Felt (Google), Sunny Consolvo (Inc.), Nathan Malkin (Berkeley), Christopher Thompson (Berkeley), Serge Egelman (Berkeley; International Computer Science Institute)

link

EuroUSEC 2018 (会議のWebサイト)

User Perception and Expectations on Deleting Instant Messages —or— "What Happens If I Press This Button?"

Theodor Schnitzler, Christine Utz, Florian Farke, Christina Pöpper, Markus Dürmuth

link

"This Website Uses Cookies": Users' Perceptions and Reactions to the Cookie Disclaimer

Oksana Kulyk, Nina Gerber, Annika Hilt, Melanie Volkamer

link

A Usability Study of Secure Email Deletion

Tyler Monson, Joshua Reynolds, Trevor Smith, Scott Ruoti, Daniel Zappala, Kent Seamons

link

Rethinking Home Network Security

Norbert Nthala, Ivan Flechais

link

Consolidating Principles and Patterns for Human-centred Usable Security Research and Development

Luigi Lo Iacono, Matthew Smith, Emanuel von Zezschwitz, Peter Leo Gorski, Peter Nehren

link

The Role of Privacy Violations in Privacy Calculu

Maija Poikela, Sebastian Möller

link

What Can't Data Be Used For? User Privacy Expectations about Smart TVs

Nathan Malkin, Julia Bernd, Maritza Johnson, Serge Egelman

link

Permission Impossible: Teaching Firewall Configuration in a Game Environment

Sibylle Sehl, Kami Vaniea

link

The 'Retailio' Privacy Wizard: Assisting Users with Privacy Settings for Intelligent Retail Stores

Frederic Raber, David Ziemann, Antonio Krueger

link

IEEE Symp. on Security and Privacy 2018 (会議のWebサイト)

EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements

Yimin Chen (Arizona State University),Tao Li (Arizona State University),Rui Zhang (University of Delaware),Yanchao Zhang (Arizona State University),Terri Hedgpeth (Arizona State University)

link

Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes

Daniel Votipka (University of Maryland),Rock Stevens (University of Maryland),Elissa Redmiles (University of Maryland),Jeremy Hu (University of Maryland),Michelle Mazurek (University of Maryland)

link

Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users

Kiron Lebeck (University of Washington),Kimberly Ruth (University of Washington),Tadayoshi Kohno (University of Washington),Franziska Roesner (University of Washington)

link

Computer Security and Privacy for Refugees in the United States

Lucy Simko (University of Washington),Ada Lerner (Wellesley College),Samia Ibtasam (University of Washington),Franziska Roesner (University of Washington),Tadayoshi Kohno (University of Washington)

link

On Enforcing the Digital Immunity of a Large Humanitarian Organization

Stevens Le Blond (École Polytechnique Fédérale de Lausanne),Alejandro Cuevas (École Polytechnique Fédérale de Lausanne),Juan Ramón Troncoso-Pastoriza (École Polytechnique Fédérale de Lausanne),Philipp Jovanovic (École Polytechnique Fédérale de Lausanne),Bryan Ford (École Polytechnique Fédérale de Lausanne),Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne)

link

The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators

Marten Oltrogge (CISPA, Saarland University),Erik Derr (CISPA, Saarland University),Christian Stransky (CISPA, Saarland University),Yasemin Acar (Leibniz University Hannover),Sascha Fahl (Leibniz University Hannover),Christian Rossow (CISPA, Saarland University),Giancarlo Pellegrino (CISPA, Saarland University, Stanford University),Sven Bugiel (CISPA, Saarland University),Michael Backes (CISPA, Saarland University)

link

Tracking Certificate Misissuance in the Wild

Deepak Kumar (University of Illinois, Urbana-Champaign),Zhengping Wang (University of Illinois, Urbana-Champaign),Matthew Hyder (University of Illinois, Urbana-Champaign),Joseph Dickinson (University of Illinois, Urbana-Champaign),Gabrielle Beck (University of Michigan),David Adrian (University of Michigan),Joshua Mason (University of Illinois, Urbana-Champaign),Zakir Durumeric (University of Michigan),J. Alex Halderman (University of Michigan),Michael Bailey (University of Illinois, Urbana-Champaign)

link

On the Economics of Offline Password Cracking

Jeremiah Blocki (Purdue University),Benjamin Harsha (Purdue University),Samson Zhou (Purdue University)

link

A Tale of Two Studies: The Best and Worst of YubiKey Usability

Joshua Reynolds (University of Illinois at Urbana-Champaign), Trevor Smith (Brigham Young University), Ken Reese (Brigham Young University), Luke Dickinson (Brigham Young University), Scott Ruoti (MIT Lincoln Laboratory), Kent Seamons (Brigham Young University)

link

Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios

Melanie Volkamer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt; Andreas Gutmann, OneSpan Innovation Centre and University College London; Karen Renaud, Abertay University, University of South Africa, and University of Glasgow; Paul Gerber, Technische Universität Darmstadt; Peter Mayer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt

link

User Behaviors and Attitudes Under Password Expiration Policies

Hana Habib and Pardis Emami Naeini, Carnegie Mellon University; Summer Devlin, University of California, Berkeley; Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University

link

The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians

Elham Al Qahtani and Mohamed Shehab, University of North Carolina Charlotte; Abrar Aljohani

link

Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal

Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, and Daniel Zappala, Brigham Young University

link

Informal Support Networks: an investigation into Home Data Security Practices

Norbert Nthala and Ivan Flechais, University of Oxford

link

Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships

Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong, Carnegie Mellon University

link

Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking

Arunesh Mathur, Princeton University; Jessica Vitak, University of Maryland, College Park; Arvind Narayanan and Marshini Chetty, Princeton University

link

Can Digital Face-Morphs Influence Attitudes and Online Behaviors?

Eyal Peer, Bar-Ilan University; Sonam Samat and Alessandro Acquisti, Carnegie Mellon University

link

"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia

Nithya Sambasivan and Garen Checkley, Google; Amna Batool, Information Technology University; Nova Ahmed, North South University; David Nemer, University of Kentucky; Laura Sanely Gaytán-Lugo, Universidad de Colima; Tara Matthews, Independent Researcher; Sunny Consolvo and Elizabeth Churchill, Google

link

"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography

Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su, Indiana University Bloomington

link

Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing

Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University

link

Online Privacy and Aging of Digital Artifacts

Reham Ebada Mohamed and Sonia Chiasson, Carleton University

link

"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach

Yixin Zou, Abraham H. Mhaidli, Austin McCall, and Florian Schaub, School of Information, University of Michigan

link

Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data

Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, and Oxana Comanescu, Google

link

User Comfort with Android Background Resource Accesses in Different Contexts

Daniel Votipka and Seth M. Rabin, University of Maryland; Kristopher Micinski, Haverford College; Thomas Gilray, Michelle L. Mazurek, and Jeffrey S. Foster, University of Maryland

link

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens

Orçun Çetin, Lisette Altena, Carlos Gañán, and Michel van Eeten, Delft University of Technology

link

Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse

Peter Leo Gorski and Luigi Lo Iacono, Cologne University of Applied Sciences; Dominik Wermke and Christian Stransky, Leibniz University Hannover; Sebastian Möller, Technical University Berlin; Yasemin Acar, Leibniz University Hannover; Sascha Fahl, Ruhr-University Bochum

link

Security in the Software Development Lifecycle

Hala Assal and Sonia Chiasson, Carleton University

link

Deception Task Design in Developer Password Studies: Exploring a Student Sample

Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith, University of Bonn, Germany

link

API Blindspots: Why Experienced Developers Write Vulnerable Code

Daniela Seabra Oliveira, Tian Lin, and Muhammad Sajidur Rahman, University of Florida; Rad Akefirad, Auto1 Inc.; Donovan Ellis, Eliany Perez, and Rahul Bobhate, University of Florida; Lois A. DeLong and Justin Cappos, New York University; Yuriy Brun, University of Massachusetts Amherst; Natalie C. Ebner, University of Florida

link

"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration

Ambar Murillo, Andreas Kramm, Sebastian Schnorf, and Alexander De Luca, Google

link

Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently

Norman Hänsch, Friedrich-Alexander-Universität Erlangen-Nürnberg; Andrea Schankin, Karlsruhe Institute of Technology; Mykolai Protsenko, Fraunhofer Institute for Applied and Integrated Security; Felix Freiling and Zinaida Benenson, Friedrich-Alexander-Universität Erlangen-Nürnberg

link

"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products

Julie M. Haney and Mary F. Theofanos, National Institute of Standards and Technology; Yasemin Acar, Leibniz University Hannover; Sandra Spickard Prettyman, Culture Catalyst

link

A Comparative Usability Study of Key Management in Secure Email

Scott Ruoti, University of Tennessee; Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons, Brigham Young University

link

When is a Tree Really a Truck? Exploring Mental Models of Encryption

Justin Wu and Daniel Zappala, Brigham Young University

link

"It's Scary…It's Confusing…It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security

Julie M. Haney and Wayne G. Lutters, University of Maryland, Baltimore County

link

Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection

James Nicholson, Lynne Coventry, and Pam Briggs, PaCT Lab, Northumbria University

link

Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality

Devon Adams, Alseny Bah, and Catherine Barwulor, University of Maryland Baltimore County; Nureli Musaby, James Madison University; Kadeem Pitkin, College of Westchester; Elissa M. Redmiles, University of Maryland

link

USENIX Security Symposium 2018 (会議のWebサイト)

Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse

Sanam Ghorbani Lyastani, CISPA, Saarland University; Michael Schilling, Saarland University; Sascha Fahl, Ruhr-University Bochum; Michael Backes and Sven Bugiel, CISPA Helmholtz Center i.G.

link

Forgetting of Passwords: Ecological Theory and Data

Xianyi Gao, Yulong Yang, Can Liu, Christos Mitropoulos, and Janne Lindqvist, Rutgers University; Antti Oulasvirta, Aalto University

link

The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength

Ingolf Becker, Simon Parkin, and M. Angela Sasse, University College London

link

Rethinking Access Control and Authentication for the Home Internet of Things (IoT)

Weijia He, University of Chicago; Maximilian Golla, Ruhr-University Bochum; Roshni Padhi and Jordan Ofek, University of Chicago; Markus Dürmuth, Ruhr-University Bochum; Earlence Fernandes, University of Washington; Blase Ur, University of Chicago

link

How Do Tor Users Interact With Onion Services?

Philipp Winter, Anne Edmundson, and Laura M. Roberts, Princeton University; Agnieszka Dutkowska-Żuk, Independent; Marshini Chetty and Nick Feamster, Princeton University

link

Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning

Hamza Harkous, École Polytechnique Fédérale de Lausanne (EPFL); Kassem Fawaz, University of Wisconsin-Madison; Rémi Lebret, École Polytechnique Fédérale de Lausanne (EPFL); Florian Schaub and Kang G. Shin, University of Michigan; Karl Aberer, École Polytechnique Fédérale de Lausanne (EPFL)

link

The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level

Rock Stevens, Daniel Votipka, and Elissa M. Redmiles, University of Maryland; Colin Ahern, NYC Cyber Command; Patrick Sweeney, Wake Forest University; Michelle L. Mazurek, University of Maryland

link

From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild

Chaowei Xiao and Armin Sarabi, University of Michigan; Yang Liu, Harvard University / UC Santa Cruz; Bo Li, UIUC; Mingyan Liu, University of Michigan; Tudor Dumitras, University of Maryland, College Park

link

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities

Dongliang Mu, Nanjing University; Alejandro Cuevas, The Pennsylvania State University; Limin Yang and Hang Hu, Virginia Tech; Xinyu Xing, The Pennsylvania State University; Bing Mao, Nanjing University; Gang Wang, Virginia Tech

link

Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets

Rolf van Wegberg and Samaneh Tajalizadehkhoob, Delft University of Technology; Kyle Soska, Carnegie Mellon University; Ugur Akyazi, Carlos Hernandez Ganan, and Bram Klievink, Delft University of Technology; Nicolas Christin, Carnegie Mellon University; Michel van Eeten, Delft University of Technology

link

Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces

Kan Yuan, Haoran Lu, Xiaojing Liao, and XiaoFeng Wang, Indiana University Bloomington

link

Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem

Mohammad Rezaeirad, George Mason University; Brown Farinholt, University of California, San Diego; Hitesh Dharmdasani, Informant Networks; Paul Pearce, University of California, Berkeley; Kirill Levchenko, University of California, San Diego; Damon McCoy, New York University

link

The aftermath of a crypto-ransomware attack at a large academic institution

Leah Zhang-Kennedy, University of Waterloo, Stratford Campus; Hala Assal, Jessica Rocheleau, Reham Mohamed, Khadija Baig, and Sonia Chiasson, Carleton University

link

運営について

お問い合わせ先

uspread 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)

読破会プログラム

SOUPS2017論文読破会

SOUPS2017論文読破会

更新日:2017年11月1日

SOUPS2017論文読破会は,7月12日~14日に米国サンタクララで開催された Thirteenth Symposium On Usable Privacy and Security (SOUPS 2017) の発表論文を1日で読破するセキュリティ心理学とトラスト(SPT)研究会の主催イベントです. SOUPS 2017ではパスワードやIoT,モバイル端末での支払い、開発者向けユーザビリティ,ユーザの振る舞い,フィッシングなど多岐にわたる研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します. 本読破会に参加することでSOUPS 2017 で発表された26論文全てを把握できるだけでなく,興味のある論文を確認することができます.

開催要項

日時:平成29年11月2日(木)10:00~ (受付9:30~) 

会場:セコム本社 セコムホール
  〒150-0001 東京都渋谷区神宮前1-5-1
  JR山手線「原宿」駅(竹下口改札) 徒歩5分
  東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分

主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会 

参加費

発表者

1,000円

研究会登録会員

2,000円

情報処理学会学生会員

1,000円

一般(非会員)

3,000円

 

発表者募集 (締め切りました)

本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください. 紹介のスライドを事前にお送りいただいて,当日の参加者に配布いたします.

論文はSOUPS 2017のページ上で公開されていますので,そちらから取得してください.

発表ご希望の方は,次のアドレスに電子メールをお送りください. soups2017read 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )

申込の電子メールについて

メール件名:SOUPS2017論文読破会:発表申込

記載いただきたい内容:

担当論文の決定方法について

メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.

参加申込

件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) soups2017read 【アットマーク】klab.is.sci.toho-u.ac.jp

申込の電子メールについて

メール件名:SOUPS2017論文読破会:参加申込

記載いただきたい内容:

お知らせ

その他

研究会非会員の方は,この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

一部資料のダウンロード

一部の資料についてはオンラインでダウンロード可能です。

アクセスにはパスワードが必要です。パスワードは会場でお知らせいたします。また、データ閲覧は11月9日(木)まで可能なように有効期限を設けています。

懇親会

場所

ピッツェリア カンテラ (東京都渋谷区神宮前6-28-6 Q plaza HARAJUKU 9F)

時間

18:30-20:30

会費

4,500円

運営について

お問い合わせ先

soups2017read 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)

SOUPS読破会プログラム

SOUPS2016論文読破会

SOUPS2016論文読破会

更新日:2016年9月30日

SOUPS2016論文読破会は,6月22日~24日に米国デンバーで開催された Twelfth Symposium On Usable Privacy and Security (SOUPS 2016) の発表論文を1日で読破するセキュリティ心理学とトラスト(SPT)研究会の主催イベントです. SOUPS 2016ではブラウザインターフェースやメッセージングセキュリティ,ユーザの振る舞い,モバイルセキュリティ,パスワードなど多岐にわたる研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します. 本読破会に参加することでSOUPS 2016 で発表された22論文全てを把握できるだけでなく,興味のある論文を確認することができます.

開催要項

日時:平成28年10月17日(月)10:00~ (受付9:30~) 

会場:SECOM本社 セコムホール
  〒150-0001 東京都渋谷区神宮前1-5-1
  JR山手線「原宿」駅(竹下口改札) 徒歩5分
  東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分

主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会 

参加費

発表者

1,000円

研究会登録会員

3,000円

情報処理学会学生会員

1,000円

一般(非会員)

5,000円

発表者募集 (締め切りました)

本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください. 紹介のスライドを事前にお送りいただいて,当日の参加者に配布いたします.

論文はSOUPS 2016のページ上で公開されていますので,そちらから取得してください.

発表ご希望の方は,次のアドレスに電子メールをお送りください. soups2016read 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )

申込の電子メールについて

メール件名:SOUPS2016論文読破会:発表申込

記載いただきたい内容:

担当論文の決定方法について

メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.

参加申込

件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので,すぐにはお手元に届きません.) soups2016read 【アットマーク】klab.is.sci.toho-u.ac.jp

申込の電子メールについて

メール件名:SOUPS2016論文読破会:参加申込

記載いただきたい内容:

お知らせ

その他

研究会非会員の方は,この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

運営について

お問い合わせ先

soups2016read 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)

SOUPS2016読破会プログラム

SOUPS2015論文読破会

SOUPS2015論文読破会

更新日: 2015年10月16日

SOUPS2015論文読破会は,7月22日~24日にカナダのオタワで開催されたThe 2015 Symposium On Usable Privacy and Security (SOUPS2015)の発表論文を1日で読破するセキュリティ心理学とトラスト(SPT)研究会の主催イベントです. SOUPS2015ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプライバシのユーザビリティに関する研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します. 本読破会に参加することでSOUPS2015で発表された22論文全てを把握できるだけでなく,興味のある論文を確認することができます.

開催要項

日時:平成27年10月29日(木)10:00~ (受付9:30~) 

会場:SECOM本社 セコムホール
  〒150-0001 東京都渋谷区神宮前1-5-1
  JR山手線「原宿」駅(竹下口改札) 徒歩5分
  東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分

主催:情報処理学会 セキュリティ心理学とトラスト(SPT) 研究会 

参加費

発表者

1,000円

研究会登録会員

3,000円

情報処理学会学生会員

1,000円

一般(非会員)

5,000円

 

発表者募集 (締切ました)

本勉強会で,論文を報告していただける方を募集します. 1論文につき15分程度(質疑込み)でご紹介ください。紹介のスライドを事前にお送りいただいて、当日の参加者に配布いたします。

論文はSOUPS2015のページ上で公開されていますので、そちらから取得してください。

発表ご希望の方は,次のアドレスに電子メールをお送りください. soups2015read 【アットマーク】klab.is.sci.toho-u.ac.jp (【アットマーク】は@に置換えてください。 )

申込の電子メールについて

メール件名:SOUPS2015論文読破会:発表申込

記載いただきたい内容:

担当論文の決定方法について

メール受付後,順次,担当する論文を決定させていただきます. 担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.

参加申込

件名を「参加申込」として,次のアドレスに電子メールをお送りください.
(メールは自動返信ではないので、すぐにはお手元に届きません。) soups2015read 【アットマーク】klab.is.sci.toho-u.ac.jp

申込の電子メールについて

メール件名:SOUPS2015論文読破会:参加申込

記載いただきたい内容:

お知らせ

目玉企画!

今回のSOUPS2015では、日本国内の組織から初めて論文が採録されました。

Understanding the Inconsistencies between Text Descriptions and the Use of Privacy-sensitive Resources of Mobile Apps
Takuya Watanabe (Waseda University), Mitsuaki Akiyama (NTT), and Tetsuya Sakai, Hironori Washizaki, and Tatsuya Mori (Waseda University)

SOUPS2015論文読破会では、この著者である早稲田大の森達哉先生と渡邉卓弥さんにお越しいただき、その発表内容に加え、採録までの道のりをお話いただく予定です。

その他

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします. 学会員の方の登録費は4,320円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります. なお,非会員の方でも研究会登録することができます. その場合の研究会登録費は,5,400円です.

研究会の登録の詳細については「研究会に登録する(情報処理学会)」をご参照ください。

運営について

お問い合わせ先

soups2015read 【アットマーク】klab.is.sci.toho-u.ac.jp

開催担当

金岡 晃(東邦大学)

SOUPS読破会プログラム

SOUPS2014論文読破会

SOUPS2014論文読破会では,7月9日~11日に米国カリフォルニア州のFacebook本社で開催されますSymposium On Usable Privacy and Security (SOUPS2014)の発表論文を1日で読破するイベントを開催します. SOUPS2014ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプライバシのユーザビリティに関する研究内容が発表されます. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本読破会に参加することで,SOUPS2014で発表された15論文全てを把握できるだけでなく,興味のある論文を確認することができます.

詳しい内容につきましては,別途SPTホームページにてアナウンス致します.


SOUPS2014 ホームページURL:http://cups.cs.cmu.edu/soups/2014/


[開催要項]



[発表者募集]

本勉強会で,論文を報告していただける方を募集します.
発表していただける方は,次のアドレスに電子メールをお送りください.
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
(【アットマーク】は@に置換えてください。 )

メール件名:SOUPS2014論文読破会:発表申込
内容:
1:氏名
2:メールアドレス
3:所属(会社名等、学生の場合は学校名)
4:希望する論文(第3希望まで)

担当論文の決定方法について:
メール受付後,順次,担当する論文を決定させていただきます.
担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.

[参加申し込みについて]

件名を「参加申込」として,次のアドレスに電子メールをお送りください. (メールは自動返信ではないので、すぐにはお手元に届きません。)
spt-info【アットマーク】comm.soft.iwate-pu.ac.jp
(【アットマーク】は@に置換えてください。 )

メール件名:SOUPS2014論文読破会:参加申込
送信内容:
1:氏名
2:所属(会社名等、学生の場合は学校名)
3:メールアドレス
4:SPT研究会会員・非会員の別

参加申込み〆切:10月24日(金)

[お知らせ]

・当日は,SOUPS2014で発表された論文は配布しませんので,各自でご準備ください.
・終了後は懇親会を予定しております。

研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします.
学会員の方の登録費は3,780円です!
情報処理学会に入会するためには,別途,入会金,年会費が必要になります.
なお,非会員の方でも研究会登録することができます.
その場合の研究会登録費は,4,860円です.

[プログラム]






SOUPS2013論文読破会 (於 第7回SPT研究発表会)

第7回研究会では,去る7月24日~26日に英国ニューカッスルで開催されましたSymposium On Usable Privacy and Security (SOUPS2013)の発表論文を1日で読破するイベントを開催します. SOUPS2013ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプライバシのユーザビリティに関する研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本読破会に参加することで,SOUPS2013で発表された15論文全てを把握できるだけでなく,興味のある論文を確認することができます. 発表は,1件につき15分発表および5分質疑応答を予定しております.SOUPS2013で発表された論文はSOUPS2013ホームページのプログラムから取得することができます.

(SOUPS2013 ホームページURL:http://cups.cs.cmu.edu/soups/2013/

詳しい内容につきましては,別途SPTホームページにてアナウンス致します.

(SPTホームページURL:http://www.sig-spt.org/


[開催要項]



[プログラム]

Opening Remarks

SOUPS2013について (10:00-10:05)

Participation Report (10:05-10:15)


※○は発表者

※1件20分(発表15分+質疑5分)

■(10:15-11:15)

(1)"When It's Better to Ask Forgiveness than Get Permission: Attribution Mechanisms for Smartphone Resources" の報告

○坂下卓弥,小形真平(信州大)


(2)"Formal Definitions for Usable Access Control Rule Sets From Goals to Metrics" の紹介

○葛野弘樹(セコム)


(3)"CASA: Context-Aware Scalable Authentication" の紹介

○望月翔太,高田哲司(電通大)


11:15-12:50 昼休み(95分)


■(12:50-13:50)

(4)"Retrospective Privacy:Managing Longitudinal Privacy in Online Social Networks" の紹介

○銭 亦ハン,長谷川まどか(宇都宮大)


(5)"Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes" の紹介

○宮嵜仁志(名工大),白石善明(神戸大),岩田 彰(名工大)


(6)"Your Attention Please: Designing security-decision UIs to make genuine risks harder to ignore" の紹介

○岩橋敏幸,金岡 晃(東邦大)


13:50-13:55 休憩(5分)


■(13:55-14:55)

(7)Report of "What Matters to Users? Factors that Affect Users' Willingness to Share Information with Online Advertisers"

○Nor Athiyah Binti Abdullah,西岡 大,村山優子(岩手県立大)


(8)"Do Not Embarrass: Re-Examining User Concerns for Online Tracking and Advertising" の紹介

○坂本一仁(セコム)


(9)"Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency" の紹介

○奥村香保里(名工大),白石善明(神戸大),岩田 彰(名工大)


14:55-15:00 休憩(5分)


■(15:00-16:00)

(10)"Modifying Smartphone User Locking Behavior" の紹介

○武井勇樹,長谷川まどか(宇都宮大)


(11)"Exploring the Design Space of Graphical Passwords on Smartphones" の紹介

○高橋雅香,高田哲司(電通大)


(12)"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones の報告

○可児潤也(静岡大)


16:00-16:05 休憩(5分)


■(16:05-17:05)

(13)"On The Ecological Validity of a Password Study" の紹介

○金岡 晃(東邦大)


(14)"Usability and Security Evaluation of GeoPass: a Geographic Location-Password Scheme" の紹介

○長谷川まどか(宇都宮大)


(15)"Memory Retrieval and Graphical Passwords" の紹介

○金森 祥子, 盛合 志帆(NICT)


運営委員会 17:10-17:40

懇親会 18:00-20:00


[発表者募集] (終了しました)

本勉強会で,論文を報告していただける方を募集します.

発表していただける方は,次のアドレスに電子メールをお送りください.

spt-info【アットマーク】comm.soft.iwate-pu.ac.jp

(【アットマーク】は@に置換えてください。 )


メール件名:SOUPS読破会発表申込

メール内容:

1:氏名

2:メールアドレス

3:所属(会社名等、学生の場合は学校名)

4:希望する論文(第3希望まで)


担当論文の決定方法について:

メール受付後,順次,担当する論文を決定させていただきます.

担当が決まった論文は,担当者より発表者にご連絡し,本ページ上でもアナウンスいたします.

担当論文決定後,IPSJの研究会投稿システム(URLは担当論文決定後に連絡します)の「発表申込」メニューより,発表者名,タイトル等をご登録いただきます.


予稿集と発表スライドについて:

発表者には報告内容の概要をまとめた予稿(1ページ程度)と発表スライドを作成して頂きます.

作成要領の詳細は,担当者よりご連絡差し上げます.

発表申込締切 : 2013年 9月30日(月)23:59締切(終了しました)

最終原稿締切 : 2013年10月21日(月)23:59締切(終了しました)

[お知らせ]

・当日,SOUPS2013発表論文の原著は配布しませんので,各自でご準備ください.

・終了後に懇親会を予定しております.会場予約の都合上,懇親会参加をご希望の方は事前に

  spt-info【アットマーク】comm.soft.iwate-pu.ac.jp

 までご連絡ください.

SOUPS2012論文読破会

去る7月11日~13日に米国ワシントンD.C.で開催されましたSymposium On Usable Privacy and Security(SOUPS2012)の発表論文を,1日で読破するためのイベントを開催いたします.SOUPS2012ではヒューマンコンピュータインタラクション,SNSのセキュリティ,モバイル端末における認証など,セキュリティ及びプ ライバシのユーザビリティに関する研究内容が発表されました. 本読破会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本読破会に参加することで,SOUPS2012で発表された14論文全てを把握できるだけで なく,興味のある論文を確認することがきます.発表につきましては,1件につき15分発表および5分質疑応答を予定しております. SOUPS2012で発表された論文はSOUPS2012ホームページのプログラムから取得する事が出来ます.

(SOUPS2012 ホームページURL:http://cups.cs.cmu.edu/soups/2012/

詳しい内容につきましては,別途SPTホームページにてアナウンス致します.

(SPTホームページURL:http://www.sig-spt.org/


[開催要項]


[プログラム]

Opening Remarks

SOUPS2012について (10:00-10:05)

村山優子(岩手県立大学、SPT研究会主査)


Participantion Report (10:05-10:20)

長谷川(宇都宮大)、金岡(筑波大、NICT)


Session: Mobile Privacy and Security (10:20-11:20)

(1)Measuring User Confidence in Smartphone Security and Privacy

Authors:Erika Chin, Adrienne Porter Felt, Vyas Sekar, David Wagner

報告者:可児潤也(静岡大学)


(2)Goldilocks and the Two Mobile Devices: Going Beyond All-Or-Nothing Access to a Device's Applications

Authors:Eiji Hayashi, Oriana Riva, Karin Strauss, A.J. Bernheim Brush, Stuart Schechter

報告者:上松晴信(静岡大学)


(3)Android Permissions: User Attention, Comprehension, and Behavior

Authors:Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner

報告者:高木浩光(産業技術総合研究所)


Sesion: Access Control (11:20-12:20) Session: Online Social Networks (11:20-12:20)

(4)+Your Circles: Sharing Behavior on Google+

Authors:Jason Watson, Andrew Besmer, Heather Richter Lipford

報告者:金岡 晃(筑波大学、NICT)

(4)Facebook and Privacy: It's Complicated

Authors:Maritza Johnson, Serge Egelman, Steven M. Bellovin

報告者:長谷川まどか(宇都宮大学)


(5)The PViz Comprehension Tool for Social Network Privacy Settings

Authors:Alessandra Mazzia, Kristen LeFevre, Eytan Adar

報告者:水戸 和(セコム(株))

(5)Are privacy concerns a turn-off? Engagement and privacy in social networks

Authors:Jessica Staddon, David Huffaker, Larkin Brown, Aaron Sedley

報告者:長谷川まどか(宇都宮大学)


(6)Relating Declarative Semantics and Usability in Access Control

Authors:Vivek Krishnan, Mahesh V. Tripunitara, Kinson Chik, Tony Bergstrom

報告者:尼子雄大(電気通信大学)

(6)Helping Johnny 2.0 to Encrypt His Facebook Conversations

Authors:Sascha Fahl, Marian Harbach, Thomas Muders, Uwe Sander, Matthew Smith

報告者:金岡 晃(筑波大学、NICT)


Session: Authentication (14:00-14:40)

(7)Correct horse battery staple: Exploring the usability of system-assigned passphrases

Authors:Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek,

Blase Ur, Tim Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor

報告者:石塚正也(電気通信大学)


(8)Do You See Your Password? Applying Recognition to Textual Passwords

Authors:Nicholas Wright, Andrew S. Patrick, Robert Biddle

報告者:伊藤忠彦(セコム(株))


Session: Online Social Networks (14:40-15:40) Sesion: Access Control (14:40-15:40)

(9)Facebook and Privacy: It's Complicated

Authors:Maritza Johnson, Serge Egelman, Steven M. Bellovin

報告者:長谷川まどか(宇都宮大学)

(9)+Your Circles: Sharing Behavior on Google+

Authors:Jason Watson, Andrew Besmer, Heather Richter Lipford

報告者:金岡 晃(筑波大学、NICT)


(10)Are privacy concerns a turn-off? Engagement and privacy in social networks

Authors:Jessica Staddon, David Huffaker, Larkin Brown, Aaron Sedley

報告者:長谷川まどか(宇都宮大学)

(10)The PViz Comprehension Tool for Social Network Privacy Settings

Authors:Alessandra Mazzia, Kristen LeFevre, Eytan Adar

報告者:水戸 和(セコム(株))


(11)Helping Johnny 2.0 to Encrypt His Facebook Conversations

Authors:Sascha Fahl, Marian Harbach, Thomas Muders, Uwe Sander, Matthew Smith

報告者:金岡 晃(筑波大学、NICT)

(11)Relating Declarative Semantics and Usability in Access Control

Authors:Vivek Krishnan, Mahesh V. Tripunitara, Kinson Chik, Tony Bergstrom

報告者:尼子雄大(電気通信大学)


Session: User Perceptions (16:00-17:00)

(11)Smart, Useful, Scary, Creepy: Perceptions of Behavioral Advertising

Authors:Blase Ur, Pedro G. Leon, Lorrie Faith Cranor, Richard Shay, Yang Wang

報告者:ジェンチャラッサクン ボンコット(東京大学)


(12)Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice

Authors:Sameer Patil, Greg Norcie, Apu Kapadia, Adam J. Lee

報告者:西岡 大(岩手県立大学)


(13)Stories as Informal Lessons about Security

Authors:Emilee Rader, Rick Wash, Brandon Brooks

報告者:磯貝尚明(宇都宮大学)


Discussion and Closing (17:00-17:15)



[発表者募集] (終了しました)


本勉強会で,論文を報告してくれる方を募集します.

発表していただける方は,次のアドレスに電子メールをお送りください.

spt-info【アットマーク】comm.soft.iwate-pu.ac.jp

(【アットマーク】は@に置換えてください。 )


メール件名:SOUPS読破会発表申込

内容:

1:氏名

2:メールアドレス

3:所属(会社名等、学生の場合は学校名)

4:希望する論文(第3希望まで) 順次,担当する論文を決定させていただきます.

担当が決まった論文は,担当者よりご連絡さしあげ,本ページ上でもアナウンスいたします.




[参加申し込みについて]

件名を「参加申込」として,次のアドレスに電子メールをお送りください. (メールは自動返信ではないので、すぐにはお手元に届きません。)

spt-info【アットマーク】comm.soft.iwate-pu.ac.jp

(【アットマーク】は@に置換えてください。 )


メール件名:参加申込

送信内容:

1:氏名   

2:所属(会社名等、学生の場合は学校名)   

3:メールアドレス   

4:SPT研究会会員・非会員の別   


参加申込み〆切:10月2日(火)


[お知らせ]

・当日は,SOUPS2012で発表された論文は配布しませんので,各自でご準備ください.

・終了後は懇親会を予定しております。



研究会非会員の方は、この機会にSPT研究会会員登録をお薦めします.

学会員の方の登録費は3,150円です!

情報処理学会に入会するためには,別途,入会金,年会費が必要になります.

なお,非会員の方でも研究会登録することができます.

その場合の研究会登録費は,4,150円です.

10/2までに研究会登録の申込をいただいた方は,今回のイベントの参加費が無料になります.

LAST UPDATE 2012.09.25


SOUPS2011発表論文をものすごい勢いで読破する会

去る7月20日~22日に米国カーネギーメロン大学で開催されましたSymposium On Usable Privacy and Security (SOUPS2011)の発表論文を, 1日で読破するための勉強会を開催いたします.SOUPS2011ではヒューマンコンピュータ

インタラクション, セキュリティ,及びプライバシに関する研究内容が発表されました.

本勉強会では参加者同士で協力し,発表論文を読破し,内容を紹介します.本勉強会に参加することで,

SOUPS2011で発表された15論文全て を把握できるだけでなく,興味のある論文を確認することがきます.

発表につきましては,1件につき15分発表および5分質疑応答を予定しております.

SOUPS2011で発表された論文はSOUPS2011ホームページのプログラムから取得する事が出来ます.

(SOUPS2011 ホームページURL:http://cups.cs.cmu.edu/soups/2011/

詳しい内容につきましては,別途SPTホームページにてア ナウンス致します.

(SPTホームページURL:http://www.sig-spt.org/



[開催要項]


日時:平成23年10月12日(水)10:00~

会場:SECOM本社 セコムホール

住所: 〒150-0001 東京都渋谷区神宮前1-5-1

場所:SECOM本社 セコムホール
  〒150-0001 東京都渋谷区神宮前1-5-1
  JR山手線「原宿」駅(竹下口改札) 徒歩5分
  東京メトロ千代田線・副都心線「明治神宮前」駅(出口5番) 徒歩5分

主催:情報処理学会 情報セキュリティ心理学とトラスト研究会 (SPT)

参加費:研究会会員および発表者は無料
  研究会非会員:5,000円(資料代含む)

当日は,SOUPS2011で発表された論文は配布しませんので,各自でご準備ください.

終了後は懇親会を予定しております。



[プログラム]


開会の挨拶 (10:00-10:05)

SOUPS2011について 村山優子(岩手県立大学)


Session 1: Authentication (10:05-11:05)

(1)What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID

Authors:San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey and Konstantin Beznosov

報告者:高田 哲司(電気通信大)


(2)Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior

Authors:Toni Perkovic, Asma Mumtaz, Yusra Javed, Shujun Li, Syed Ali Khayam and Mario Cagalj

報告者:"水戸 和(セコム)


(3)Shoulder Surfing Defence for Recall-based Graphical Passwords

Authors:Nur Haryani Zakaria, David Griffiths, Sacha Brostoff and Jeff Yan

報告者:長谷川 まどか(宇都宮大)


Session 2: SOUPS du jour (11:20-12:20)

(4)Heuristics for Evaluating IT Security Management Tools

Authors:Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas and Konstantin Beznosov

報告者:藤原 康宏(岩手県立大学)


(5)Smartening the Crowds: Computational Techniques for Improving Human Verification to Fight Phishing Scams

Authors:Gang Liu, Guang Xiang, Bryan A. Pendleton, Jason I. Hong and Wenyin Liu

報告者:山本 太朗(NTT)


(6)Reciprocity Attacks

Authors:Feng Zhu, Sandra Carpenter, Ajinkya Kulkarni and Swapna Kolimi

報告者:西垣 正勝(静岡大学)


Session 3: Privacy on Social Network Sites (13:30-14:30)

(7)"I regretted the minute I pressed share": A Qualitative Study of Regrets on Facebook

Authors:Yang Wang, Gregory Norcie, Saranga Komanduri, Pedro Giovanni Leon,

Lorrie Faith Cranor and Alessandro Acquisti

報告者:上松 晴信(静岡大学)


(8)ROAuth: Recommendation Based Open Authorization

Authors:Mohamed Shehab, Said Marouf and Christopher Hudel

報告者:金岡 晃(筑波大学)


(9)Privacy: Is There An App For That?

Authors:Jennifer King, Airi Lampinen and Alex Smolen

報告者:Bongkot Jenjarrussakul(東京大学)


Session 4: Perceptions of Privacy and Security (14:45-15:45)

(10)Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage

Authors:Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru and Srdjan Capkun

報告者:佐古 和恵(NEC)


(11)Eyeing your Exposure: Quantifying and Controlling Information Sharing for Improved Privacy

Authors:Roman Schlegel, Apu Kapadia and Adam J. Lee

報告者:西岡 大(岩手県立大学)


(12)Indirect Content Privacy Surveys: Measuring Privacy Without Asking About It

Authors:Alex Braunstein, Laura Granka and Jessica Staddon

報告者:西岡 大(岩手県立大学)


Sesion 5: Security Warnings (16:00-17:00)

(13)A Brick Wall, a Locked Door, and a Bandit: Promoting A Physical Security Metaphor For Firewall Warnings

Authors:Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang and Konstantin Beznosov

報告者:藤原 康宏(岩手県立大学)


(14)Using Data Type Based Security Alert Dialogs to Raise Online Security Awareness

Authors:Max-Emanuel Maurer, Alexander De Luca and Sylvia Kempe

報告者:名坂 康平(静岡大学)


(15)On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings

Authors:Andreas Sotirakopoulos, Kirstie Hawkey and Konstantin Beznosov

報告者:金岡 晃(筑波大学)

LAST UPDATE 2011.10.11