Search results

    Improving Password Generation Through the Design of a Password Composition Policy Description LanguageSOUPS 2022Anuj Gautam, Shan Lalani, Scott Ruoti
    Industrial practitioners' mental models of adversarial machine learningSOUPS 2022Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz
    Being Hacked: Understanding Victims' Experiences of IoT HackingSOUPS 2022Asreen Rostami, Minna Vigren, Shahid Raza, Barry Brown
    Password policies of most top websites fail to follow best practicesSOUPS 2022Kevin Lee, Sten Sjöberg, Arvind Narayanan
    Aunties, Strangers, and the FBI: Online Privacy Concerns and Experiences of Muslim-American WomenSOUPS 2022Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, Florian Schaub
    Runtime Permissions for Privacy in Proactive Intelligent AssistantsSOUPS 2022Nathan Malkin, David Wagner, Serge Egelman
    Replication: Stories as Informal Lessons about SecuritySOUPS 2022Katharina Pfeffer, Alexandra Mai, Edgar Weippl, Emilee Rader, Katharina Krombholz
    Let’s Hash: Helping Developers with Password SecuritySOUPS 2022Lisa Geierhaas, Anna-Marie Ortloff, Matthew Smith, Alena Naiakshina
    Evaluating the Usability of Privacy Choice MechanismsSOUPS 2022Hana Habib, Lorrie Faith Cranor
    Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy ManagementSOUPS 2022Emilee Rader
    DualCheck: Exploiting Human Verification Tasks for Opportunistic Online Safety MicrolearningSOUPS 2022Ryo Yoshikawa, Hideya Ochiai, Koji Yatani
    "As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based AuthenticationSOUPS 2022Philipp Markert, Theodor Schnitzler, Maximilian Golla, Markus Dürmuth
    Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve Phishing DetectionSOUPS 2022Sarah Zheng, Ingolf Becker
    Replication: The Effect of Differential Privacy Communication on German Users' Comprehension and Data Sharing AttitudesSOUPS 2022Patrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt
    Investigating How University Students in the United States Encounter and Deal With Misinformation in Private WhatsApp Chats During COVID-19SOUPS 2022K. J. Kevin Feng, Kevin Song, Kejing Li, Oishee Chakrabarti, Marshini Chetty
    Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A SiteSOUPS 2022Ayako A. Hasegawa, Naomi Yamashita, Tatsuya Mori, Daisuke Inoue, Mitsuaki Akiyama
    Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child RelationshipsSOUPS 2022Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner
    Comparing User Perceptions of Anti-Stalkerware Apps with the Technical RealitySOUPS 2022Matthias Fassl, Simon Anell, Sabine Houy, Martina Lindorfer, Katharina Krombholz
    Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructsSOUPS 2022Jessica Colnago, Lorrie Faith Cranor, Alessandro Acquisti, Kate Hazel Stanton
    Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary SharingSOUPS 2022Jiayi Chen, Urs Hengartner, Hassan Khan
    Exploring User Authentication with Windows Hello in a Small Business EnvironmentSOUPS 2022Florian M. Farke, Leona Lassak, Jannis Pinter, Markus Dürmuth
    “Fast, Easy, Convenient.” Studying Adoption and Perception of Digital Covid CertificatesSOUPS 2022Franziska Herbert, Marvin Kowalewski, Theodor Schnitzler, Leona Lassak, Markus Dürmuth
    Increasing security without decreasing usability: A comparison of various verifiable voting systemsSOUPS 2022Melanie Volkamer, Oksana Kulyk, Jonas Ludwig, Niklas Fuhrberg
    Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and ObstaclesSOUPS 2022Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, Lorrie Cranor
    Usability and Security of Trusted Platform Module (TPM) Library APIsSOUPS 2022Siddharth Prakash Rao, Gabriela Limonta, Janne Lindqvist