FileMood

Download USENIX SOUPS

USENIX SOUPS

Name

USENIX SOUPS

 DOWNLOAD Copy Link

Total Size

2.1 GB

Total Files

446

Last Seen

2024-11-13 23:11

Hash

661EB4B3E2C0A3BC5456E4CE3591087E677392D9

/

USENIX SOUPS logo.png

29.9 KB

USENIX SOUPS thank you.txt

1.3 KB

/USENIX SOUPS 2019/

A Self-Report Measure of End-User Security Attitudes (SA-6).mp4

21.0 MB

A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.mp4

23.2 MB

A Usability Study of Five Two-Factor Authentication Methods.eng.srt

38.6 KB

A Usability Study of Five Two-Factor Authentication Methods.mp4

14.5 MB

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.eng.srt

33.2 KB

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.mp4

17.7 MB

Certified Phishing Taking a Look at Public Key Certificates of Phishing Websites.eng.srt

29.2 KB

Certified Phishing Taking a Look at Public Key Certificates of Phishing Websites.mp4

15.5 MB

Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous.eng.srt

38.7 KB

Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous.mp4

30.6 MB

Cooperative Privacy and Security Learning from People with Visual Impairments.eng.srt

37.3 KB

Cooperative Privacy and Security Learning from People with Visual Impairments.mp4

16.9 MB

Enhancing Privacy through an Interactive On-demand Incremental Information.eng.srt

48.6 KB

Enhancing Privacy through an Interactive On-demand Incremental Information.mp4

26.1 MB

Evaluating Users’ Perceptions about a System’s Privacy Differentiating Social.eng.srt

38.0 KB

Evaluating Users’ Perceptions about a System’s Privacy Differentiating Social.mp4

20.4 MB

Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen.mp4

23.4 MB

From Usability to Secure Computing and Back Again.eng.srt

39.1 KB

From Usability to Secure Computing and Back Again.mp4

16.1 MB

I don't own the data - End User Perceptions of Smart Home Device Data.eng.srt

35.3 KB

I don't own the data - End User Perceptions of Smart Home Device Data.mp4

18.4 MB

I was told to buy a software or lose my computer. I ignored it - A study.eng.srt

32.2 KB

I was told to buy a software or lose my computer. I ignored it - A study.mp4

17.0 MB

Investigative Journalism in the Digital Age Privacy, Security and the Media.mp4

68.8 MB

Keepers of the Machines Examining How System Administrators Manage Software Updates.eng.srt

44.8 KB

Keepers of the Machines Examining How System Administrators Manage Software Updates.mp4

19.5 MB

Monday Lightning Talks.eng.srt

39.6 KB

Monday Lightning Talks.mp4

27.9 MB

More than Smart Speakers Security and Privacy Perceptions of Smart Home Personal.eng.srt

38.6 KB

More than Smart Speakers Security and Privacy Perceptions of Smart Home Personal.mp4

18.9 MB

Of Two Minds about Two-Factor Understanding Everyday FIDO U2F Usability.eng.srt

37.3 KB

Of Two Minds about Two-Factor Understanding Everyday FIDO U2F Usability.mp4

22.7 MB

Personal Information Leakage by Abusing the GDPR Right of Access.eng.srt

38.7 KB

Personal Information Leakage by Abusing the GDPR Right of Access.mp4

20.8 MB

Privacy and Security Threat Models and Mitigation Strategies of Older Adults.eng.srt

43.3 KB

Privacy and Security Threat Models and Mitigation Strategies of Older Adults.mp4

20.8 MB

Replication No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert.eng.srt

29.0 KB

Replication No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert.mp4

17.7 MB

Something isnt secure, but Im not sure how that translates into a problem.eng.srt

54.7 KB

Something isnt secure, but Im not sure how that translates into a problem.mp4

26.2 MB

System Administrators Prefer Command Line Interfaces, don't They An Exploratory Study.eng.srt

40.9 KB

System Administrators Prefer Command Line Interfaces, don't They An Exploratory Study.mp4

21.7 MB

The Effect of Entertainment Media on Mental Models of Computer Security.eng.srt

43.4 KB

The Effect of Entertainment Media on Mental Models of Computer Security.mp4

20.4 MB

The Fog of Warnings How Non-essential Notifications Blur with Security Warnings.eng.srt

40.2 KB

The Fog of Warnings How Non-essential Notifications Blur with Security Warnings.mp4

19.3 MB

There is nothing that I need to keep secret Sharing Practices and Concerns.eng.srt

31.0 KB

There is nothing that I need to keep secret Sharing Practices and Concerns.mp4

19.2 MB

Tuesday Lightning Talks 1.eng.srt

41.0 KB

Tuesday Lightning Talks 1.mp4

24.5 MB

Tuesday Lightning Talks 2.mp4

19.1 MB

Usability Smells An Analysis of Developers’ Struggle With Crypto Libraries.eng.srt

37.6 KB

Usability Smells An Analysis of Developers’ Struggle With Crypto Libraries.mp4

22.9 MB

We Cant Live Without Them - App Developers Adoption of Ad Networks and Their.eng.srt

48.6 KB

We Cant Live Without Them - App Developers Adoption of Ad Networks and Their.mp4

17.6 MB

Why people (don’t) use password managers effectively.eng.srt

43.2 KB

Why people (don’t) use password managers effectively.mp4

20.5 MB

/USENIX SOUPS 2020/

SOUPS 2020 Technical Sessions USENIX.html

204.4 KB

SOUPS 2020 USENIX.html

100.2 KB

soups2020_contents.pdf

122.1 KB

soups2020_cover.pdf

643.9 KB

soups2020_full_proceedings.pdf

28.2 MB

soups2020_full_proceedings_interior.pdf

27.6 MB

soups2020_message.pdf

109.6 KB

soups2020_title-organizers.pdf

113.3 KB

/.../SOUPS 2020 Lightning Talks/

End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk).eng.srt

8.7 KB

End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk).mp4

3.3 MB

Making GDPR Usable (Lightning Talk).mp4

6.3 MB

Overthrowing - Master - Passwords by Throwing Dice (Lightning Talk).eng.srt

8.7 KB

Overthrowing - Master - Passwords by Throwing Dice (Lightning Talk).mp4

7.3 MB

Security for Smart Cities (Lightning Talk).eng.srt

7.8 KB

Security for Smart Cities (Lightning Talk).mp4

6.0 MB

sers Are still Not the Enemy Applying Security Usability Principles(Lightning Talk).mp4

5.4 MB

Sustainable, Scalable and Secure IoT Architecture (Lightning Talk).eng.srt

8.5 KB

Sustainable, Scalable and Secure IoT Architecture (Lightning Talk).mp4

3.3 MB

Tr(b)usted Identity Proofing (Lightning Talk).eng.srt

10.7 KB

Tr(b)usted Identity Proofing (Lightning Talk).mp4

3.3 MB

/.../SOUPS 2020 Posters/

A Cybersecurity Research Ethics Decision Support UI (Poster).eng.srt

2.6 KB

A Cybersecurity Research Ethics Decision Support UI (Poster).mp4

1.9 MB

A Multilingual Comparison of Email Scams (Poster).mp4

1.3 MB

Automatic Section Title Generation to Improve the Readability of Privacy (Poster).mp4

1.4 MB

Characterizing Digital Homelessness (Poster).eng.srt

2.1 KB

Characterizing Digital Homelessness (Poster).mp4

1.3 MB

Cyber Attack A Story-driven Educational Hacking Game (Poster).mp4

1.5 MB

DeFaking Deepfakes Understanding Journalists Needs for Deepfake Detection (Poster).mp4

1.7 MB

Effect of Priming on Smart Home Privacy Preferences (Poster).eng.srt

2.2 KB

Effect of Priming on Smart Home Privacy Preferences (Poster).mp4

1.4 MB

End Users Information-sharing Behaviours and Preferences within (Poster).eng.srt

2.1 KB

End Users Information-sharing Behaviours and Preferences within (Poster).mp4

1.5 MB

Get a Free Item Pack with Every Activation - Do Incentives Increase (Poster).eng.srt

2.3 KB

Get a Free Item Pack with Every Activation - Do Incentives Increase (Poster).mp4

953.8 KB

HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises (Poster).eng.srt

2.4 KB

HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises (Poster).mp4

1.5 MB

I cannot do anything - Users Behavior and Protection Strategy upon Losing (Poster).eng.srt

2.1 KB

I cannot do anything - Users Behavior and Protection Strategy upon Losing (Poster).mp4

1.0 MB

Interactive Stories for Security Education A Case Study on Password Managers (Poster).mp4

1.3 MB

Learning through Videos Uncovering Approaches to Educating People (Poster).eng.srt

2.6 KB

Learning through Videos Uncovering Approaches to Educating People (Poster).mp4

1.8 MB

Mental Models of Domain Names and URLs (Poster).mp4

1.0 MB

mething Doesnt Feel Right Using Thermal Warnings to Improve User Security (Poster).mp4

1.6 MB

Mobile Security Behavior Observatory Long-term Monitoring of Mobile User (Poster).mp4

1.4 MB

Observation Study on Usability Challenges for Fingerprint Authentication (Poster).mp4

1.1 MB

Older Adults Perceptions of Intelligent Voice Assistant Privacy (Poster).eng.srt

2.7 KB

Older Adults Perceptions of Intelligent Voice Assistant Privacy (Poster).mp4

1.3 MB

Privacy Not Found A Study of the Availability of Privacy Policies on the Web (Poster).mp4

1.2 MB

Privacy Preferences vs. Settings A Case Study of Android Permissions (Poster).eng.srt

2.6 KB

Privacy Preferences vs. Settings A Case Study of Android Permissions (Poster).mp4

1.2 MB

Question Answering for Privacy Policies Combining Computational and Legal (Poster).eng.srt

2.3 KB

Question Answering for Privacy Policies Combining Computational and Legal (Poster).mp4

1.5 MB

Smart Home Updates User Perceptions and Experiences (Poster).eng.srt

2.2 KB

Smart Home Updates User Perceptions and Experiences (Poster).mp4

1.4 MB

Towards a Conceptual Model for Provoking Privacy Speculation (Poster).eng.srt

2.2 KB

Towards a Conceptual Model for Provoking Privacy Speculation (Poster).mp4

1.8 MB

Towards Inclusive Design for Privacy and Security Perspectives from (Poster).eng.srt

2.2 KB

Towards Inclusive Design for Privacy and Security Perspectives from (Poster).mp4

1.2 MB

UISA User Interface Security Assessment (Poster).eng.srt

1.7 KB

UISA User Interface Security Assessment (Poster).mp4

2.2 MB

What are PETs for Privacy Experts and Non-experts (Poster).mp4

1.1 MB

Why are Developers Struggling to Put GDPR into Practice when Developing (Poster).mp4

1.9 MB

Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it (Poster).mp4

1.3 MB

/.../SOUPS 2020 Talks/

An Empirical Study of Wireless Carrier Authentication for SIM Swaps.eng.srt

10.4 KB

An Empirical Study of Wireless Carrier Authentication for SIM Swaps.mp4

4.3 MB

An Ethnographic Understanding of Software (In)Security and a Co-Creation Model.eng.srt

27.7 KB

An Ethnographic Understanding of Software (In)Security and a Co-Creation Model.mp4

10.4 MB

An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Process.mp4

5.1 MB

An investigation of phishing awareness and education over time When and how to best.eng.srt

9.7 KB

An investigation of phishing awareness and education over time When and how to best.mp4

5.7 MB

Blind and Human Exploring More Usable Audio CAPTCHA Designs.mp4

7.6 MB

Cloudy with a Chance of Misconceptions Exploring Users Perceptions and Expectations.mp4

3.2 MB

Do Privacy and Security Matter to Everyone Quantifying and Clustering User-Centric.eng.srt

11.3 KB

Do Privacy and Security Matter to Everyone Quantifying and Clustering User-Centric.mp4

3.8 MB

Enhancing Privacy through the Visual Design of Privacy Notices Exploring the Interplay.mp4

15.4 MB

From Intent to Action Nudging Users Towards Secure Mobile Payments.eng.srt

30.2 KB

From Intent to Action Nudging Users Towards Secure Mobile Payments.mp4

11.2 MB

How Risky Are Real Users IFTTT Applets.mp4

9.9 MB

I Have a Narrow Thought Process - Constrain'ts on Explanations Connecting Inferences.mp4

5.9 MB

Industry Responses to the European Directive on Security of Network and Information.eng.srt

10.0 KB

Industry Responses to the European Directive on Security of Network and Information.mp4

8.8 MB

Innovation Inaction or In Action The Role of User Experience in the Security.eng.srt

10.9 KB

Innovation Inaction or In Action The Role of User Experience in the Security.mp4

3.9 MB

Keynote Maybe We Have Been Doing This Wrong Protester as Persona.eng.srt

40.0 KB

Keynote Maybe We Have Been Doing This Wrong Protester as Persona.mp4

44.5 MB

Knock, Knock. Who’s There On the Security of LG’s Knock Codes.eng.srt

24.1 KB

Knock, Knock. Who’s There On the Security of LG’s Knock Codes.mp4

8.5 MB

Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian.mp4

4.9 MB

Passworld A Serious Game to Promote Password Awareness and Diversity in an Enterprise.mp4

13.4 MB

Realizing Choice Online Safeguards for Couples Adapting to Cognitive Challenges.mp4

3.8 MB

Replication On the Ecological Validity of Online Security Developer Studies.eng.srt

8.9 KB

Replication On the Ecological Validity of Online Security Developer Studies.mp4

3.7 MB

Replication Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability.mp4

5.9 MB

Security, Availability, and Multiple Information Sources Exploring Update Behavior.mp4

5.0 MB

Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault.eng.srt

25.3 KB

Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault.mp4

9.3 MB

Usable Sexurity Studying People’s Concerns and Strategies When Sexting.eng.srt

8.7 KB

Usable Sexurity Studying People’s Concerns and Strategies When Sexting.mp4

3.7 MB

User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.mp4

9.7 MB

Why Cant Johnny Fix Vulnerabilities A Usability Evaluation of Static Analysis Tools.mp4

4.8 MB

You still use the password after all - Exploring FIDO2 Security Keys in a Small.eng.srt

9.2 KB

You still use the password after all - Exploring FIDO2 Security Keys in a Small.mp4

3.4 MB

You've Got Your Nice List of Bugs, Now What - Vulnerability Discovery and Management.eng.srt

36.6 KB

You've Got Your Nice List of Bugs, Now What - Vulnerability Discovery and Management.mp4

11.1 MB

/.../SOUPS 2020 Technical Sessions USENIX_files/

application-pdf.png

0.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css

611.0 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js

0.4 KB

js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js

16.3 KB

js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js

14.8 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js

133.2 KB

mitchell_matt_200x230.jpg

12.0 KB

package-x-generic.png

0.3 KB

pdf.svg

0.5 KB

slides.svg

0.7 KB

soups2020_logo_380x403_rev.png

3.3 KB

usenix-locked.png

1.4 KB

usenix-unlocked.png

1.4 KB

video.svg

0.8 KB

/.../SOUPS 2020 USENIX_files/

acmqueue_600x240_1.png

4.7 KB

chiasson_sonia_200x230.jpg

10.6 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css

611.0 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

dmtf_600x240.png

3.2 KB

facebook_600x240_15.png

3.9 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js

0.4 KB

js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js

16.3 KB

js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js

14.8 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js

133.2 KB

lipford_heather_200x230.png

21.8 KB

soups2020_logo_380x403_rev.png

29.9 KB

soups2020_logo_380x403_rev_002.png

3.3 KB

usenix_logo_300x150_neat_2.png

15.0 KB

/USENIX SOUPS 2021/

A Fait Accompli An Empirical Study into the Absence of Consent to Third-Party Tracking.eng.srt

10.5 KB

A Fait Accompli An Empirical Study into the Absence of Consent to Third-Party Tracking.mp4

3.5 MB

A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS.eng.srt

6.7 KB

A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS.mp4

3.1 MB

An Analysis of the Role of Situated Learning in Starting a Security Culture in a.eng.srt

10.4 KB

An Analysis of the Role of Situated Learning in Starting a Security Culture in a.mp4

4.1 MB

Benefits and Drawbacks of Adopting a Secure Programming Language Rust as a Case Study.eng.srt

10.8 KB

Benefits and Drawbacks of Adopting a Secure Programming Language Rust as a Case Study.mp4

3.6 MB

Challenges and Threats of Mass Telecommuting A Qualitative Study of Workers.eng.srt

8.4 KB

Challenges and Threats of Mass Telecommuting A Qualitative Study of Workers.mp4

4.1 MB

Code Reviewing as Methodology for Online Security Studies with Developers - A Case.eng.srt

8.1 KB

Code Reviewing as Methodology for Online Security Studies with Developers - A Case.mp4

2.8 MB

Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and.eng.srt

9.6 KB

Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and.mp4

3.5 MB

Concerned but Ineffective User Perceptions, Methods, and Challenges when Sanitizing.eng.srt

9.8 KB

Concerned but Ineffective User Perceptions, Methods, and Challenges when Sanitizing.mp4

4.7 MB

Deciding on Personalized Ads Nudging Developers About User Privacy.mp4

4.9 MB

Decision-Making Errors in Mobile Phishing.mp4

2.1 MB

Designing Toxic Content Classification for a Diversity of Perspectives.eng.srt

10.6 KB

Designing Toxic Content Classification for a Diversity of Perspectives.mp4

3.4 MB

Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for.mp4

5.9 MB

Examining the Examiners Students' Privacy and Security Perceptions of Online.mp4

5.6 MB

Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.mp4

3.5 MB

Facial Recognition Understanding Privacy Concerns and Attitudes Across Increasingly.eng.srt

11.5 KB

Facial Recognition Understanding Privacy Concerns and Attitudes Across Increasingly.mp4

5.6 MB

Gallery of Latin American Malware.mp4

2.5 MB

How I Know For Sure - People's Perspectives on Solely Automated Decision-Making (SADM).eng.srt

9.1 KB

How I Know For Sure - People's Perspectives on Solely Automated Decision-Making (SADM).mp4

4.4 MB

I have no idea what they're trying to accomplish - Enthusiastic and Casual Signal.eng.srt

11.4 KB

I have no idea what they're trying to accomplish - Enthusiastic and Casual Signal.mp4

5.2 MB

I'm Literally Just Hoping This Will Work'' Obstacles Blocking the Online Security.eng.srt

5.9 KB

I'm Literally Just Hoping This Will Work'' Obstacles Blocking the Online Security.mp4

5.2 MB

Investigating Web Service Account Remediation Advice.mp4

4.5 MB

Keynote Address Mitigating Technology Abuse in Intimate Partner Violence.eng.srt

124.7 KB

Keynote Address Mitigating Technology Abuse in Intimate Partner Violence.mp4

47.7 MB

Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.eng.srt

11.3 KB

Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.mp4

4.8 MB

Never ever or no matter what Investigating Adoption Intentions and Misconceptions.eng.srt

5.9 KB

Never ever or no matter what Investigating Adoption Intentions and Misconceptions.mp4

3.5 MB

On the Limited Impact of Visualizing Encryption Perceptions of E2E Messaging Security.eng.srt

10.1 KB

On the Limited Impact of Visualizing Encryption Perceptions of E2E Messaging Security.mp4

5.4 MB

Please do not use or your License Plate Number Analyzing Password Policies in.eng.srt

10.0 KB

Please do not use or your License Plate Number Analyzing Password Policies in.mp4

3.1 MB

PowerCut and Obfuscator An Exploration of the Design Space for Privacy-Preserving.eng.srt

11.1 KB

PowerCut and Obfuscator An Exploration of the Design Space for Privacy-Preserving.mp4

3.8 MB

Proposing the ‘Signature’ Auth Scheme More Usable AND Secure Than Status Quo.mp4

2.5 MB

Pursuing Usable and Useful Data Downloads Under GDPR CCPA Access Rights via Co-Design.eng.srt

10.4 KB

Pursuing Usable and Useful Data Downloads Under GDPR CCPA Access Rights via Co-Design.mp4

3.3 MB

Replication Effects of Media on the Mental Models of Technical Users.eng.srt

10.1 KB

Replication Effects of Media on the Mental Models of Technical Users.mp4

4.1 MB

SoK Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing.eng.srt

11.2 KB

SoK Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing.mp4

5.1 MB

Solitude A privacy analysis tool.eng.srt

5.0 KB

Solitude A privacy analysis tool.mp4

3.5 MB

The Thing Doesn't Have a Name - Learning from Emergent Real-World Interventions in.eng.srt

9.1 KB

The Thing Doesn't Have a Name - Learning from Emergent Real-World Interventions in.mp4

4.9 MB

Towards Usable and Secure Location-based Smartphone Authentication.mp4

5.6 MB

Trust by design a new old requirement.eng.srt

3.9 KB

Trust by design a new old requirement.mp4

1.8 MB

Understanding Privacy Attitudes and Concerns Towards Remote Communications During the.eng.srt

9.3 KB

Understanding Privacy Attitudes and Concerns Towards Remote Communications During the.mp4

4.0 MB

Understanding Users' Knowledge about the Privacy and Security of Browser Extensions.mp4

4.4 MB

User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming.eng.srt

9.5 KB

User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming.mp4

3.7 MB

Using a Blocklist to Improve the Security of User Selection of Android Patterns.mp4

5.7 MB

Virtual Classrooms and Real Harms Remote Learning at U.S. Universities.mp4

10.4 MB

WebAlly Making Visual Task-based CAPTCHAs Transferable for People with Visual.eng.srt

9.1 KB

WebAlly Making Visual Task-based CAPTCHAs Transferable for People with Visual.mp4

3.9 MB

Whether it's moral is a whole other story - Consumer perspectives on privacy.eng.srt

7.8 KB

Whether it's moral is a whole other story - Consumer perspectives on privacy.mp4

3.2 MB

Why They Ignore English Emails The Challenges of Non-Native Speakers in Identifying.eng.srt

7.4 KB

Why They Ignore English Emails The Challenges of Non-Native Speakers in Identifying.mp4

4.1 MB

/USENIX SOUPS 2022/

An Empirical Study of a Decentralized Identity Wallet.mp4

9.3 MB

An Empirical Study of a Decentralized Identity Wallet.srt

18.1 KB

An open door may tempt a sain't Examining situational and individual determinants.mp4

10.0 MB

An open door may tempt a sain't Examining situational and individual determinants.srt

20.0 KB

Anti-Privacy and Anti-Security Advice on TikTok Case Studies of Technology-Enabled.mp4

8.7 MB

Anti-Privacy and Anti-Security Advice on TikTok Case Studies of Technology-Enabled.srt

24.8 KB

As soon as it's a risk, I want to require MFA - How Administrators Configure.mp4

13.5 MB

As soon as it's a risk, I want to require MFA - How Administrators Configure.srt

22.6 KB

Aunties, Strangers, and the FBI Online Privacy Concerns and Experiences of Muslim.mp4

11.6 MB

Aunties, Strangers, and the FBI Online Privacy Concerns and Experiences of Muslim.srt

22.2 KB

Balancing Power Dynamics in Smart Homes Nannies' Perspectives on How Cameras.mp4

9.9 MB

Balancing Power Dynamics in Smart Homes Nannies' Perspectives on How Cameras.srt

22.7 KB

Being Hacked Understanding Victims' Experiences of IoT Hacking.mp4

9.0 MB

Being Hacked Understanding Victims' Experiences of IoT Hacking.srt

22.2 KB

Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.mp4

7.3 MB

Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.srt

13.4 KB

Detecting iPhone Security Compromise in Simulated Stalking Scenarios Strategies and.mp4

8.2 MB

Detecting iPhone Security Compromise in Simulated Stalking Scenarios Strategies and.srt

18.2 KB

Do Password Managers Nudge Secure (Random) Passwords.mp4

7.0 MB

Do Password Managers Nudge Secure (Random) Passwords.srt

16.9 KB

DualCheck Exploiting Human Verification Tasks for Opportunistic Online Safety.mp4

7.8 MB

DualCheck Exploiting Human Verification Tasks for Opportunistic Online Safety.srt

14.7 KB

Evaluating the Usability of Privacy Choice Mechanisms.mp4

7.0 MB

Evaluating the Usability of Privacy Choice Mechanisms.srt

19.5 KB

Exploring User Authentication with Windows Hello in a Small Business Environment.mp4

8.5 MB

Exploring User Authentication with Windows Hello in a Small Business Environment.srt

20.8 KB

Exploring User-Suitable Metaphors for Differentially Private Data Analyses.mp4

10.2 MB

Exploring User-Suitable Metaphors for Differentially Private Data Analyses.srt

21.4 KB

Fast, Easy, Convenient. Studying Adoption and Perception of Digital Covid Certificates.mp4

8.2 MB

Fast, Easy, Convenient. Studying Adoption and Perception of Digital Covid Certificates.srt

20.8 KB

I don’t know why I check this Investigating Expert Users' Strategies to Detect.mp4

12.0 MB

I don’t know why I check this Investigating Expert Users' Strategies to Detect.srt

22.2 KB

If You Can’t Get Them to the Lab Evaluating a Virtual Study Environment with.mp4

9.2 MB

If You Can’t Get Them to the Lab Evaluating a Virtual Study Environment with.srt

16.5 KB

Improving Password Generation Through the Design of a Password Composition Policy.mp4

7.5 MB

Improving Password Generation Through the Design of a Password Composition Policy.srt

15.8 KB

Increasing security without decreasing usability A comparison of various verifiable.mp4

7.4 MB

Increasing security without decreasing usability A comparison of various verifiable.srt

26.7 KB

Industrial practitioners' mental models of adversarial machine learning.mp4

9.4 MB

Industrial practitioners' mental models of adversarial machine learning.srt

28.1 KB

Investigating How University Students in the United States Encounter and Deal With.mp4

14.7 MB

Investigating How University Students in the United States Encounter and Deal With.srt

27.0 KB

Is it a concern or a preference An investigation into the ability of privacy scales.mp4

9.6 MB

Is it a concern or a preference An investigation into the ability of privacy scales.srt

26.1 KB

Let The Right One In Attestation as a Usable CAPTCHA Alternative.mp4

9.7 MB

Let The Right One In Attestation as a Usable CAPTCHA Alternative.srt

21.3 KB

Let’s Hash Helping Developers with Password Security.mp4

6.8 MB

Let’s Hash Helping Developers with Password Security.srt

15.1 KB

Lightning Talk - E-Commerce Payment Security Evaluation and Literature Review.mp4

3.8 MB

Lightning Talk - E-Commerce Payment Security Evaluation and Literature Review.srt

8.7 KB

Lightning Talk - Informed Consent Are your participants aware of what they share.mp4

4.3 MB

Lightning Talk - Informed Consent Are your participants aware of what they share.srt

11.1 KB

Lightning Talk - IoT Inspector a platform for real-world smart home research.mp4

4.1 MB

Lightning Talk - IoT Inspector a platform for real-world smart home research.srt

9.7 KB

Lightning Talk - Moving Usable Security and Privacy Research Out of the Lab.mp4

9.4 MB

Lightning Talk - Moving Usable Security and Privacy Research Out of the Lab.srt

13.0 KB

Lightning Talk - Skilled or Gullible Gender Stereotypes Related to Computer Security.mp4

4.4 MB

Lightning Talk - Skilled or Gullible Gender Stereotypes Related to Computer Security.srt

8.6 KB

Normative and Non-Social Beliefs about Sensor Data Implications for Collective.mp4

11.2 MB

Normative and Non-Social Beliefs about Sensor Data Implications for Collective.srt

23.4 KB

On recruiting and retaining users for security-sensitive longitudinal measurement.mp4

7.6 MB

On recruiting and retaining users for security-sensitive longitudinal measurement.srt

14.1 KB

Password policies of most top websites fail to follow best practices.mp4

7.7 MB

Password policies of most top websites fail to follow best practices.srt

17.4 KB

Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve.mp4

7.8 MB

Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve.srt

16.2 KB

Replication How Well Do My Results Generalize Now The External Validity of Online.mp4

9.0 MB

Replication How Well Do My Results Generalize Now The External Validity of Online.srt

21.3 KB

Replication Stories as Informal Lessons about Security.mp4

6.4 MB

Replication Stories as Informal Lessons about Security.srt

14.6 KB

Replication The Effect of Differential Privacy Communication on German Users'.mp4

6.5 MB

Replication The Effect of Differential Privacy Communication on German Users'.srt

17.2 KB

Runtime Permissions for Privacy in Proactive Intelligent Assistants.mp4

8.7 MB

Runtime Permissions for Privacy in Proactive Intelligent Assistants.srt

22.6 KB

Sharing without Scaring Enabling Smartphones to Become Aware of Temporary Sharing.mp4

9.3 MB

Sharing without Scaring Enabling Smartphones to Become Aware of Temporary Sharing.srt

17.1 KB

SOUPS 2022 Keynote - Understanding and Reducing Online Misinformation Across 16 Countries.mp4

34.9 MB

SOUPS 2022 Keynote - Understanding and Reducing Online Misinformation Across 16 Countries.srt

88.8 KB

The Nerd Factor The Potential of S&P Adepts to Serve as a Social Resource.mp4

6.3 MB

The Nerd Factor The Potential of S&P Adepts to Serve as a Social Resource.srt

18.0 KB

Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site.mp4

7.6 MB

Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site.srt

14.3 KB

Usability and Security of Trusted Platform Module (TPM) Library APIs.mp4

11.0 MB

Usability and Security of Trusted Platform Module (TPM) Library APIs.srt

28.8 KB

Users' Perceptions of Chrome Compromised Credential Notification.mp4

6.2 MB

Users' Perceptions of Chrome Compromised Credential Notification.srt

16.2 KB

/USENIX SOUPS 2023/

'Give Me Structure' Synthesis and Evaluation of a (Network) Threat Analysis Process.eng.srt

34.8 KB

'Give Me Structure' Synthesis and Evaluation of a (Network) Threat Analysis Process.mp4

15.9 MB

Adventures in Recovery Land Testing the Account Recovery of Popular Websites.eng.srt

21.3 KB

Adventures in Recovery Land Testing the Account Recovery of Popular Websites.mp4

8.4 MB

An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers'.eng.srt

19.7 KB

An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers'.mp4

10.7 MB

Checking, nudging or scoring Evaluating e-mail user security tools.eng.srt

28.1 KB

Checking, nudging or scoring Evaluating e-mail user security tools.mp4

13.8 MB

Data Privacy and Pluralistic Ignorance.eng.srt

26.5 KB

Data Privacy and Pluralistic Ignorance.mp4

14.4 MB

Dissecting Nudges in Password Managers Simple Defaults are Powerful.eng.srt

15.7 KB

Dissecting Nudges in Password Managers Simple Defaults are Powerful.mp4

7.8 MB

Distrust of big tech and a desire for privacy Understanding the motivations.eng.srt

22.0 KB

Distrust of big tech and a desire for privacy Understanding the motivations.mp4

8.7 MB

Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.eng.srt

20.5 KB

Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.mp4

12.6 MB

Evaluating User Behavior in Smartphone Security A Psychometric Perspective.eng.srt

21.1 KB

Evaluating User Behavior in Smartphone Security A Psychometric Perspective.mp4

10.9 MB

Evolution of Password Expiry in Companies Measuring the Adoption of Recommendations.eng.srt

21.1 KB

Evolution of Password Expiry in Companies Measuring the Adoption of Recommendations.mp4

8.2 MB

Exploring the Security Culture of Operational Technology (OT) Organisations.eng.srt

17.3 KB

Exploring the Security Culture of Operational Technology (OT) Organisations.mp4

7.9 MB

Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective.eng.srt

27.0 KB

Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective.mp4

12.7 MB

Fight Fire with Fire Hacktivists' Take on Social Media Misinformation.eng.srt

24.0 KB

Fight Fire with Fire Hacktivists' Take on Social Media Misinformation.mp4

14.0 MB

GuardLens Supporting Safer Online Browsing for People with Visual Impairments.eng.srt

18.8 KB

GuardLens Supporting Safer Online Browsing for People with Visual Impairments.mp4

10.2 MB

ImageAlly A Human-AI Hybrid Approach to Support Blind People in Detecting.eng.srt

14.9 KB

ImageAlly A Human-AI Hybrid Approach to Support Blind People in Detecting.mp4

8.1 MB

Investigating Security Indicators for Hyperlinking Within the Metaverse.eng.srt

19.7 KB

Investigating Security Indicators for Hyperlinking Within the Metaverse.mp4

8.5 MB

Is Reporting Worth the Sacrifice of Revealing What I've Sent.eng.srt

20.0 KB

Is Reporting Worth the Sacrifice of Revealing What I've Sent.mp4

8.8 MB

Iterative Design of An Accessible Crypto Wallet for Blind Users.eng.srt

21.2 KB

Iterative Design of An Accessible Crypto Wallet for Blind Users.mp4

11.3 MB

Lacking the Tools and Support to Fix Friction Results from an Interview Study.eng.srt

22.8 KB

Lacking the Tools and Support to Fix Friction Results from an Interview Study.mp4

13.0 MB

Lightning Talk - De-identification in practice professionals as end users.eng.srt

7.9 KB

Lightning Talk - De-identification in practice professionals as end users.mp4

4.0 MB

Lightning Talk - Decisions and Disruptions 2 Decide Harder.eng.srt

9.7 KB

Lightning Talk - Decisions and Disruptions 2 Decide Harder.mp4

4.5 MB

Lightning Talk - Getting the Message Out Considering a Connected Products.eng.srt

20.7 KB

Lightning Talk - Getting the Message Out Considering a Connected Products.mp4

9.0 MB

Lightning Talk - Lessons Learned in Communicating Differential Privacy to Data Subjects.eng.srt

9.7 KB

Lightning Talk - Lessons Learned in Communicating Differential Privacy to Data Subjects.mp4

4.5 MB

Lightning Talk - Look before you Link Privacy Risk Inspection of Open Data through.eng.srt

7.0 KB

Lightning Talk - Look before you Link Privacy Risk Inspection of Open Data through.mp4

4.3 MB

Lightning Talk - Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality.eng.srt

9.0 KB

Lightning Talk - Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality.mp4

6.1 MB

Lightning Talk - TAM is not SAM - Acceptance of Security Technology.eng.srt

6.8 KB

Lightning Talk - TAM is not SAM - Acceptance of Security Technology.mp4

4.1 MB

Lightning Talk - Towards a more effective system for training tier 1 SOC analysts.eng.srt

10.3 KB

Lightning Talk - Towards a more effective system for training tier 1 SOC analysts.mp4

4.2 MB

Nobody's Happy - Design Insights from Privacy-Conscious Smart Home Power Users.eng.srt

21.9 KB

Nobody's Happy - Design Insights from Privacy-Conscious Smart Home Power Users.mp4

11.9 MB

On the Recruitment of Company Developers for Security Studies.eng.srt

20.9 KB

On the Recruitment of Company Developers for Security Studies.mp4

9.8 MB

Privacy Mental Models of Electronic Health Records A German Case Study.eng.srt

16.6 KB

Privacy Mental Models of Electronic Health Records A German Case Study.mp4

8.1 MB

Prospects for Improving Password Selection.eng.srt

20.4 KB

Prospects for Improving Password Selection.mp4

8.7 MB

SoK I Have the (Developer) Power Sample Size Estimation for.eng.srt

21.1 KB

SoK I Have the (Developer) Power Sample Size Estimation for.mp4

8.5 MB

SOUPS 2023 Keynote Address - Weaponizing Technology Examining the Importance of Privacy.eng.srt

137.3 KB

SOUPS 2023 Keynote Address - Weaponizing Technology Examining the Importance of Privacy.mp4

56.1 MB

Stalking is immoral but not illegal - Understanding Security, Cyber Crimes.eng.srt

25.5 KB

Stalking is immoral but not illegal - Understanding Security, Cyber Crimes.mp4

13.5 MB

Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor.eng.srt

23.2 KB

Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor.mp4

9.9 MB

There will be less privacy, of course - How and why people in 10 countries expect AI.eng.srt

30.4 KB

There will be less privacy, of course - How and why people in 10 countries expect AI.mp4

13.6 MB

Towards Usable Security Analysis Tools for Trigger-Action Programming.eng.srt

26.5 KB

Towards Usable Security Analysis Tools for Trigger-Action Programming.mp4

9.7 MB

Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.eng.srt

22.8 KB

Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.mp4

9.0 MB

What can central bank digital currency designers learn from asking potential users.eng.srt

23.4 KB

What can central bank digital currency designers learn from asking potential users.mp4

12.1 MB

Who Comes Up with this Stuff Interviewing Authors to Understand How They Produce.eng.srt

20.2 KB

Who Comes Up with this Stuff Interviewing Authors to Understand How They Produce.mp4

9.8 MB

Would You Give the Same Priority to the Bank and a Game I Do Not.eng.srt

23.9 KB

Would You Give the Same Priority to the Bank and a Game I Do Not.mp4

10.0 MB

Youth understandings of online privacy and security A dyadic study of children.eng.srt

24.7 KB

Youth understandings of online privacy and security A dyadic study of children.mp4

14.0 MB

 

Total files 446


Copyright © 2024 FileMood.com