/
|
USENIX SOUPS logo.png
|
29.9 KB
|
USENIX SOUPS thank you.txt
|
1.3 KB
|
/USENIX SOUPS 2019/
|
A Self-Report Measure of End-User Security Attitudes (SA-6).mp4
|
21.0 MB
|
A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.mp4
|
23.2 MB
|
A Usability Study of Five Two-Factor Authentication Methods.eng.srt
|
38.6 KB
|
A Usability Study of Five Two-Factor Authentication Methods.mp4
|
14.5 MB
|
An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.eng.srt
|
33.2 KB
|
An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.mp4
|
17.7 MB
|
Certified Phishing Taking a Look at Public Key Certificates of Phishing Websites.eng.srt
|
29.2 KB
|
Certified Phishing Taking a Look at Public Key Certificates of Phishing Websites.mp4
|
15.5 MB
|
Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous.eng.srt
|
38.7 KB
|
Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous.mp4
|
30.6 MB
|
Cooperative Privacy and Security Learning from People with Visual Impairments.eng.srt
|
37.3 KB
|
Cooperative Privacy and Security Learning from People with Visual Impairments.mp4
|
16.9 MB
|
Enhancing Privacy through an Interactive On-demand Incremental Information.eng.srt
|
48.6 KB
|
Enhancing Privacy through an Interactive On-demand Incremental Information.mp4
|
26.1 MB
|
Evaluating Users’ Perceptions about a System’s Privacy Differentiating Social.eng.srt
|
38.0 KB
|
Evaluating Users’ Perceptions about a System’s Privacy Differentiating Social.mp4
|
20.4 MB
|
Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen.mp4
|
23.4 MB
|
From Usability to Secure Computing and Back Again.eng.srt
|
39.1 KB
|
From Usability to Secure Computing and Back Again.mp4
|
16.1 MB
|
I don't own the data - End User Perceptions of Smart Home Device Data.eng.srt
|
35.3 KB
|
I don't own the data - End User Perceptions of Smart Home Device Data.mp4
|
18.4 MB
|
I was told to buy a software or lose my computer. I ignored it - A study.eng.srt
|
32.2 KB
|
I was told to buy a software or lose my computer. I ignored it - A study.mp4
|
17.0 MB
|
Investigative Journalism in the Digital Age Privacy, Security and the Media.mp4
|
68.8 MB
|
Keepers of the Machines Examining How System Administrators Manage Software Updates.eng.srt
|
44.8 KB
|
Keepers of the Machines Examining How System Administrators Manage Software Updates.mp4
|
19.5 MB
|
Monday Lightning Talks.eng.srt
|
39.6 KB
|
Monday Lightning Talks.mp4
|
27.9 MB
|
More than Smart Speakers Security and Privacy Perceptions of Smart Home Personal.eng.srt
|
38.6 KB
|
More than Smart Speakers Security and Privacy Perceptions of Smart Home Personal.mp4
|
18.9 MB
|
Of Two Minds about Two-Factor Understanding Everyday FIDO U2F Usability.eng.srt
|
37.3 KB
|
Of Two Minds about Two-Factor Understanding Everyday FIDO U2F Usability.mp4
|
22.7 MB
|
Personal Information Leakage by Abusing the GDPR Right of Access.eng.srt
|
38.7 KB
|
Personal Information Leakage by Abusing the GDPR Right of Access.mp4
|
20.8 MB
|
Privacy and Security Threat Models and Mitigation Strategies of Older Adults.eng.srt
|
43.3 KB
|
Privacy and Security Threat Models and Mitigation Strategies of Older Adults.mp4
|
20.8 MB
|
Replication No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert.eng.srt
|
29.0 KB
|
Replication No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert.mp4
|
17.7 MB
|
Something isnt secure, but Im not sure how that translates into a problem.eng.srt
|
54.7 KB
|
Something isnt secure, but Im not sure how that translates into a problem.mp4
|
26.2 MB
|
System Administrators Prefer Command Line Interfaces, don't They An Exploratory Study.eng.srt
|
40.9 KB
|
System Administrators Prefer Command Line Interfaces, don't They An Exploratory Study.mp4
|
21.7 MB
|
The Effect of Entertainment Media on Mental Models of Computer Security.eng.srt
|
43.4 KB
|
The Effect of Entertainment Media on Mental Models of Computer Security.mp4
|
20.4 MB
|
The Fog of Warnings How Non-essential Notifications Blur with Security Warnings.eng.srt
|
40.2 KB
|
The Fog of Warnings How Non-essential Notifications Blur with Security Warnings.mp4
|
19.3 MB
|
There is nothing that I need to keep secret Sharing Practices and Concerns.eng.srt
|
31.0 KB
|
There is nothing that I need to keep secret Sharing Practices and Concerns.mp4
|
19.2 MB
|
Tuesday Lightning Talks 1.eng.srt
|
41.0 KB
|
Tuesday Lightning Talks 1.mp4
|
24.5 MB
|
Tuesday Lightning Talks 2.mp4
|
19.1 MB
|
Usability Smells An Analysis of Developers’ Struggle With Crypto Libraries.eng.srt
|
37.6 KB
|
Usability Smells An Analysis of Developers’ Struggle With Crypto Libraries.mp4
|
22.9 MB
|
We Cant Live Without Them - App Developers Adoption of Ad Networks and Their.eng.srt
|
48.6 KB
|
We Cant Live Without Them - App Developers Adoption of Ad Networks and Their.mp4
|
17.6 MB
|
Why people (don’t) use password managers effectively.eng.srt
|
43.2 KB
|
Why people (don’t) use password managers effectively.mp4
|
20.5 MB
|
/USENIX SOUPS 2020/
|
SOUPS 2020 Technical Sessions USENIX.html
|
204.4 KB
|
SOUPS 2020 USENIX.html
|
100.2 KB
|
soups2020_contents.pdf
|
122.1 KB
|
soups2020_cover.pdf
|
643.9 KB
|
soups2020_full_proceedings.pdf
|
28.2 MB
|
soups2020_full_proceedings_interior.pdf
|
27.6 MB
|
soups2020_message.pdf
|
109.6 KB
|
soups2020_title-organizers.pdf
|
113.3 KB
|
/.../SOUPS 2020 Lightning Talks/
|
End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk).eng.srt
|
8.7 KB
|
End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk).mp4
|
3.3 MB
|
Making GDPR Usable (Lightning Talk).mp4
|
6.3 MB
|
Overthrowing - Master - Passwords by Throwing Dice (Lightning Talk).eng.srt
|
8.7 KB
|
Overthrowing - Master - Passwords by Throwing Dice (Lightning Talk).mp4
|
7.3 MB
|
Security for Smart Cities (Lightning Talk).eng.srt
|
7.8 KB
|
Security for Smart Cities (Lightning Talk).mp4
|
6.0 MB
|
sers Are still Not the Enemy Applying Security Usability Principles(Lightning Talk).mp4
|
5.4 MB
|
Sustainable, Scalable and Secure IoT Architecture (Lightning Talk).eng.srt
|
8.5 KB
|
Sustainable, Scalable and Secure IoT Architecture (Lightning Talk).mp4
|
3.3 MB
|
Tr(b)usted Identity Proofing (Lightning Talk).eng.srt
|
10.7 KB
|
Tr(b)usted Identity Proofing (Lightning Talk).mp4
|
3.3 MB
|
/.../SOUPS 2020 Posters/
|
A Cybersecurity Research Ethics Decision Support UI (Poster).eng.srt
|
2.6 KB
|
A Cybersecurity Research Ethics Decision Support UI (Poster).mp4
|
1.9 MB
|
A Multilingual Comparison of Email Scams (Poster).mp4
|
1.3 MB
|
Automatic Section Title Generation to Improve the Readability of Privacy (Poster).mp4
|
1.4 MB
|
Characterizing Digital Homelessness (Poster).eng.srt
|
2.1 KB
|
Characterizing Digital Homelessness (Poster).mp4
|
1.3 MB
|
Cyber Attack A Story-driven Educational Hacking Game (Poster).mp4
|
1.5 MB
|
DeFaking Deepfakes Understanding Journalists Needs for Deepfake Detection (Poster).mp4
|
1.7 MB
|
Effect of Priming on Smart Home Privacy Preferences (Poster).eng.srt
|
2.2 KB
|
Effect of Priming on Smart Home Privacy Preferences (Poster).mp4
|
1.4 MB
|
End Users Information-sharing Behaviours and Preferences within (Poster).eng.srt
|
2.1 KB
|
End Users Information-sharing Behaviours and Preferences within (Poster).mp4
|
1.5 MB
|
Get a Free Item Pack with Every Activation - Do Incentives Increase (Poster).eng.srt
|
2.3 KB
|
Get a Free Item Pack with Every Activation - Do Incentives Increase (Poster).mp4
|
953.8 KB
|
HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises (Poster).eng.srt
|
2.4 KB
|
HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises (Poster).mp4
|
1.5 MB
|
I cannot do anything - Users Behavior and Protection Strategy upon Losing (Poster).eng.srt
|
2.1 KB
|
I cannot do anything - Users Behavior and Protection Strategy upon Losing (Poster).mp4
|
1.0 MB
|
Interactive Stories for Security Education A Case Study on Password Managers (Poster).mp4
|
1.3 MB
|
Learning through Videos Uncovering Approaches to Educating People (Poster).eng.srt
|
2.6 KB
|
Learning through Videos Uncovering Approaches to Educating People (Poster).mp4
|
1.8 MB
|
Mental Models of Domain Names and URLs (Poster).mp4
|
1.0 MB
|
mething Doesnt Feel Right Using Thermal Warnings to Improve User Security (Poster).mp4
|
1.6 MB
|
Mobile Security Behavior Observatory Long-term Monitoring of Mobile User (Poster).mp4
|
1.4 MB
|
Observation Study on Usability Challenges for Fingerprint Authentication (Poster).mp4
|
1.1 MB
|
Older Adults Perceptions of Intelligent Voice Assistant Privacy (Poster).eng.srt
|
2.7 KB
|
Older Adults Perceptions of Intelligent Voice Assistant Privacy (Poster).mp4
|
1.3 MB
|
Privacy Not Found A Study of the Availability of Privacy Policies on the Web (Poster).mp4
|
1.2 MB
|
Privacy Preferences vs. Settings A Case Study of Android Permissions (Poster).eng.srt
|
2.6 KB
|
Privacy Preferences vs. Settings A Case Study of Android Permissions (Poster).mp4
|
1.2 MB
|
Question Answering for Privacy Policies Combining Computational and Legal (Poster).eng.srt
|
2.3 KB
|
Question Answering for Privacy Policies Combining Computational and Legal (Poster).mp4
|
1.5 MB
|
Smart Home Updates User Perceptions and Experiences (Poster).eng.srt
|
2.2 KB
|
Smart Home Updates User Perceptions and Experiences (Poster).mp4
|
1.4 MB
|
Towards a Conceptual Model for Provoking Privacy Speculation (Poster).eng.srt
|
2.2 KB
|
Towards a Conceptual Model for Provoking Privacy Speculation (Poster).mp4
|
1.8 MB
|
Towards Inclusive Design for Privacy and Security Perspectives from (Poster).eng.srt
|
2.2 KB
|
Towards Inclusive Design for Privacy and Security Perspectives from (Poster).mp4
|
1.2 MB
|
UISA User Interface Security Assessment (Poster).eng.srt
|
1.7 KB
|
UISA User Interface Security Assessment (Poster).mp4
|
2.2 MB
|
What are PETs for Privacy Experts and Non-experts (Poster).mp4
|
1.1 MB
|
Why are Developers Struggling to Put GDPR into Practice when Developing (Poster).mp4
|
1.9 MB
|
Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it (Poster).mp4
|
1.3 MB
|
/.../SOUPS 2020 Talks/
|
An Empirical Study of Wireless Carrier Authentication for SIM Swaps.eng.srt
|
10.4 KB
|
An Empirical Study of Wireless Carrier Authentication for SIM Swaps.mp4
|
4.3 MB
|
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model.eng.srt
|
27.7 KB
|
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model.mp4
|
10.4 MB
|
An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Process.mp4
|
5.1 MB
|
An investigation of phishing awareness and education over time When and how to best.eng.srt
|
9.7 KB
|
An investigation of phishing awareness and education over time When and how to best.mp4
|
5.7 MB
|
Blind and Human Exploring More Usable Audio CAPTCHA Designs.mp4
|
7.6 MB
|
Cloudy with a Chance of Misconceptions Exploring Users Perceptions and Expectations.mp4
|
3.2 MB
|
Do Privacy and Security Matter to Everyone Quantifying and Clustering User-Centric.eng.srt
|
11.3 KB
|
Do Privacy and Security Matter to Everyone Quantifying and Clustering User-Centric.mp4
|
3.8 MB
|
Enhancing Privacy through the Visual Design of Privacy Notices Exploring the Interplay.mp4
|
15.4 MB
|
From Intent to Action Nudging Users Towards Secure Mobile Payments.eng.srt
|
30.2 KB
|
From Intent to Action Nudging Users Towards Secure Mobile Payments.mp4
|
11.2 MB
|
How Risky Are Real Users IFTTT Applets.mp4
|
9.9 MB
|
I Have a Narrow Thought Process - Constrain'ts on Explanations Connecting Inferences.mp4
|
5.9 MB
|
Industry Responses to the European Directive on Security of Network and Information.eng.srt
|
10.0 KB
|
Industry Responses to the European Directive on Security of Network and Information.mp4
|
8.8 MB
|
Innovation Inaction or In Action The Role of User Experience in the Security.eng.srt
|
10.9 KB
|
Innovation Inaction or In Action The Role of User Experience in the Security.mp4
|
3.9 MB
|
Keynote Maybe We Have Been Doing This Wrong Protester as Persona.eng.srt
|
40.0 KB
|
Keynote Maybe We Have Been Doing This Wrong Protester as Persona.mp4
|
44.5 MB
|
Knock, Knock. Who’s There On the Security of LG’s Knock Codes.eng.srt
|
24.1 KB
|
Knock, Knock. Who’s There On the Security of LG’s Knock Codes.mp4
|
8.5 MB
|
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian.mp4
|
4.9 MB
|
Passworld A Serious Game to Promote Password Awareness and Diversity in an Enterprise.mp4
|
13.4 MB
|
Realizing Choice Online Safeguards for Couples Adapting to Cognitive Challenges.mp4
|
3.8 MB
|
Replication On the Ecological Validity of Online Security Developer Studies.eng.srt
|
8.9 KB
|
Replication On the Ecological Validity of Online Security Developer Studies.mp4
|
3.7 MB
|
Replication Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability.mp4
|
5.9 MB
|
Security, Availability, and Multiple Information Sources Exploring Update Behavior.mp4
|
5.0 MB
|
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault.eng.srt
|
25.3 KB
|
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault.mp4
|
9.3 MB
|
Usable Sexurity Studying People’s Concerns and Strategies When Sexting.eng.srt
|
8.7 KB
|
Usable Sexurity Studying People’s Concerns and Strategies When Sexting.mp4
|
3.7 MB
|
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.mp4
|
9.7 MB
|
Why Cant Johnny Fix Vulnerabilities A Usability Evaluation of Static Analysis Tools.mp4
|
4.8 MB
|
You still use the password after all - Exploring FIDO2 Security Keys in a Small.eng.srt
|
9.2 KB
|
You still use the password after all - Exploring FIDO2 Security Keys in a Small.mp4
|
3.4 MB
|
You've Got Your Nice List of Bugs, Now What - Vulnerability Discovery and Management.eng.srt
|
36.6 KB
|
You've Got Your Nice List of Bugs, Now What - Vulnerability Discovery and Management.mp4
|
11.1 MB
|
/.../SOUPS 2020 Technical Sessions USENIX_files/
|
application-pdf.png
|
0.3 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
|
611.0 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
font-awesome.css
|
26.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
|
0.4 KB
|
js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
|
16.3 KB
|
js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
|
14.8 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
|
133.2 KB
|
mitchell_matt_200x230.jpg
|
12.0 KB
|
package-x-generic.png
|
0.3 KB
|
pdf.svg
|
0.5 KB
|
slides.svg
|
0.7 KB
|
soups2020_logo_380x403_rev.png
|
3.3 KB
|
usenix-locked.png
|
1.4 KB
|
usenix-unlocked.png
|
1.4 KB
|
video.svg
|
0.8 KB
|
/.../SOUPS 2020 USENIX_files/
|
acmqueue_600x240_1.png
|
4.7 KB
|
chiasson_sonia_200x230.jpg
|
10.6 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
|
611.0 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
dmtf_600x240.png
|
3.2 KB
|
facebook_600x240_15.png
|
3.9 KB
|
font-awesome.css
|
26.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
|
0.4 KB
|
js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
|
16.3 KB
|
js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
|
14.8 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
|
133.2 KB
|
lipford_heather_200x230.png
|
21.8 KB
|
soups2020_logo_380x403_rev.png
|
29.9 KB
|
soups2020_logo_380x403_rev_002.png
|
3.3 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
/USENIX SOUPS 2021/
|
A Fait Accompli An Empirical Study into the Absence of Consent to Third-Party Tracking.eng.srt
|
10.5 KB
|
A Fait Accompli An Empirical Study into the Absence of Consent to Third-Party Tracking.mp4
|
3.5 MB
|
A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS.eng.srt
|
6.7 KB
|
A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS.mp4
|
3.1 MB
|
An Analysis of the Role of Situated Learning in Starting a Security Culture in a.eng.srt
|
10.4 KB
|
An Analysis of the Role of Situated Learning in Starting a Security Culture in a.mp4
|
4.1 MB
|
Benefits and Drawbacks of Adopting a Secure Programming Language Rust as a Case Study.eng.srt
|
10.8 KB
|
Benefits and Drawbacks of Adopting a Secure Programming Language Rust as a Case Study.mp4
|
3.6 MB
|
Challenges and Threats of Mass Telecommuting A Qualitative Study of Workers.eng.srt
|
8.4 KB
|
Challenges and Threats of Mass Telecommuting A Qualitative Study of Workers.mp4
|
4.1 MB
|
Code Reviewing as Methodology for Online Security Studies with Developers - A Case.eng.srt
|
8.1 KB
|
Code Reviewing as Methodology for Online Security Studies with Developers - A Case.mp4
|
2.8 MB
|
Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and.eng.srt
|
9.6 KB
|
Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and.mp4
|
3.5 MB
|
Concerned but Ineffective User Perceptions, Methods, and Challenges when Sanitizing.eng.srt
|
9.8 KB
|
Concerned but Ineffective User Perceptions, Methods, and Challenges when Sanitizing.mp4
|
4.7 MB
|
Deciding on Personalized Ads Nudging Developers About User Privacy.mp4
|
4.9 MB
|
Decision-Making Errors in Mobile Phishing.mp4
|
2.1 MB
|
Designing Toxic Content Classification for a Diversity of Perspectives.eng.srt
|
10.6 KB
|
Designing Toxic Content Classification for a Diversity of Perspectives.mp4
|
3.4 MB
|
Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for.mp4
|
5.9 MB
|
Examining the Examiners Students' Privacy and Security Perceptions of Online.mp4
|
5.6 MB
|
Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.mp4
|
3.5 MB
|
Facial Recognition Understanding Privacy Concerns and Attitudes Across Increasingly.eng.srt
|
11.5 KB
|
Facial Recognition Understanding Privacy Concerns and Attitudes Across Increasingly.mp4
|
5.6 MB
|
Gallery of Latin American Malware.mp4
|
2.5 MB
|
How I Know For Sure - People's Perspectives on Solely Automated Decision-Making (SADM).eng.srt
|
9.1 KB
|
How I Know For Sure - People's Perspectives on Solely Automated Decision-Making (SADM).mp4
|
4.4 MB
|
I have no idea what they're trying to accomplish - Enthusiastic and Casual Signal.eng.srt
|
11.4 KB
|
I have no idea what they're trying to accomplish - Enthusiastic and Casual Signal.mp4
|
5.2 MB
|
I'm Literally Just Hoping This Will Work'' Obstacles Blocking the Online Security.eng.srt
|
5.9 KB
|
I'm Literally Just Hoping This Will Work'' Obstacles Blocking the Online Security.mp4
|
5.2 MB
|
Investigating Web Service Account Remediation Advice.mp4
|
4.5 MB
|
Keynote Address Mitigating Technology Abuse in Intimate Partner Violence.eng.srt
|
124.7 KB
|
Keynote Address Mitigating Technology Abuse in Intimate Partner Violence.mp4
|
47.7 MB
|
Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.eng.srt
|
11.3 KB
|
Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.mp4
|
4.8 MB
|
Never ever or no matter what Investigating Adoption Intentions and Misconceptions.eng.srt
|
5.9 KB
|
Never ever or no matter what Investigating Adoption Intentions and Misconceptions.mp4
|
3.5 MB
|
On the Limited Impact of Visualizing Encryption Perceptions of E2E Messaging Security.eng.srt
|
10.1 KB
|
On the Limited Impact of Visualizing Encryption Perceptions of E2E Messaging Security.mp4
|
5.4 MB
|
Please do not use or your License Plate Number Analyzing Password Policies in.eng.srt
|
10.0 KB
|
Please do not use or your License Plate Number Analyzing Password Policies in.mp4
|
3.1 MB
|
PowerCut and Obfuscator An Exploration of the Design Space for Privacy-Preserving.eng.srt
|
11.1 KB
|
PowerCut and Obfuscator An Exploration of the Design Space for Privacy-Preserving.mp4
|
3.8 MB
|
Proposing the ‘Signature’ Auth Scheme More Usable AND Secure Than Status Quo.mp4
|
2.5 MB
|
Pursuing Usable and Useful Data Downloads Under GDPR CCPA Access Rights via Co-Design.eng.srt
|
10.4 KB
|
Pursuing Usable and Useful Data Downloads Under GDPR CCPA Access Rights via Co-Design.mp4
|
3.3 MB
|
Replication Effects of Media on the Mental Models of Technical Users.eng.srt
|
10.1 KB
|
Replication Effects of Media on the Mental Models of Technical Users.mp4
|
4.1 MB
|
SoK Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing.eng.srt
|
11.2 KB
|
SoK Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing.mp4
|
5.1 MB
|
Solitude A privacy analysis tool.eng.srt
|
5.0 KB
|
Solitude A privacy analysis tool.mp4
|
3.5 MB
|
The Thing Doesn't Have a Name - Learning from Emergent Real-World Interventions in.eng.srt
|
9.1 KB
|
The Thing Doesn't Have a Name - Learning from Emergent Real-World Interventions in.mp4
|
4.9 MB
|
Towards Usable and Secure Location-based Smartphone Authentication.mp4
|
5.6 MB
|
Trust by design a new old requirement.eng.srt
|
3.9 KB
|
Trust by design a new old requirement.mp4
|
1.8 MB
|
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the.eng.srt
|
9.3 KB
|
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the.mp4
|
4.0 MB
|
Understanding Users' Knowledge about the Privacy and Security of Browser Extensions.mp4
|
4.4 MB
|
User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming.eng.srt
|
9.5 KB
|
User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming.mp4
|
3.7 MB
|
Using a Blocklist to Improve the Security of User Selection of Android Patterns.mp4
|
5.7 MB
|
Virtual Classrooms and Real Harms Remote Learning at U.S. Universities.mp4
|
10.4 MB
|
WebAlly Making Visual Task-based CAPTCHAs Transferable for People with Visual.eng.srt
|
9.1 KB
|
WebAlly Making Visual Task-based CAPTCHAs Transferable for People with Visual.mp4
|
3.9 MB
|
Whether it's moral is a whole other story - Consumer perspectives on privacy.eng.srt
|
7.8 KB
|
Whether it's moral is a whole other story - Consumer perspectives on privacy.mp4
|
3.2 MB
|
Why They Ignore English Emails The Challenges of Non-Native Speakers in Identifying.eng.srt
|
7.4 KB
|
Why They Ignore English Emails The Challenges of Non-Native Speakers in Identifying.mp4
|
4.1 MB
|
/USENIX SOUPS 2022/
|
An Empirical Study of a Decentralized Identity Wallet.mp4
|
9.3 MB
|
An Empirical Study of a Decentralized Identity Wallet.srt
|
18.1 KB
|
An open door may tempt a sain't Examining situational and individual determinants.mp4
|
10.0 MB
|
An open door may tempt a sain't Examining situational and individual determinants.srt
|
20.0 KB
|
Anti-Privacy and Anti-Security Advice on TikTok Case Studies of Technology-Enabled.mp4
|
8.7 MB
|
Anti-Privacy and Anti-Security Advice on TikTok Case Studies of Technology-Enabled.srt
|
24.8 KB
|
As soon as it's a risk, I want to require MFA - How Administrators Configure.mp4
|
13.5 MB
|
As soon as it's a risk, I want to require MFA - How Administrators Configure.srt
|
22.6 KB
|
Aunties, Strangers, and the FBI Online Privacy Concerns and Experiences of Muslim.mp4
|
11.6 MB
|
Aunties, Strangers, and the FBI Online Privacy Concerns and Experiences of Muslim.srt
|
22.2 KB
|
Balancing Power Dynamics in Smart Homes Nannies' Perspectives on How Cameras.mp4
|
9.9 MB
|
Balancing Power Dynamics in Smart Homes Nannies' Perspectives on How Cameras.srt
|
22.7 KB
|
Being Hacked Understanding Victims' Experiences of IoT Hacking.mp4
|
9.0 MB
|
Being Hacked Understanding Victims' Experiences of IoT Hacking.srt
|
22.2 KB
|
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.mp4
|
7.3 MB
|
Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.srt
|
13.4 KB
|
Detecting iPhone Security Compromise in Simulated Stalking Scenarios Strategies and.mp4
|
8.2 MB
|
Detecting iPhone Security Compromise in Simulated Stalking Scenarios Strategies and.srt
|
18.2 KB
|
Do Password Managers Nudge Secure (Random) Passwords.mp4
|
7.0 MB
|
Do Password Managers Nudge Secure (Random) Passwords.srt
|
16.9 KB
|
DualCheck Exploiting Human Verification Tasks for Opportunistic Online Safety.mp4
|
7.8 MB
|
DualCheck Exploiting Human Verification Tasks for Opportunistic Online Safety.srt
|
14.7 KB
|
Evaluating the Usability of Privacy Choice Mechanisms.mp4
|
7.0 MB
|
Evaluating the Usability of Privacy Choice Mechanisms.srt
|
19.5 KB
|
Exploring User Authentication with Windows Hello in a Small Business Environment.mp4
|
8.5 MB
|
Exploring User Authentication with Windows Hello in a Small Business Environment.srt
|
20.8 KB
|
Exploring User-Suitable Metaphors for Differentially Private Data Analyses.mp4
|
10.2 MB
|
Exploring User-Suitable Metaphors for Differentially Private Data Analyses.srt
|
21.4 KB
|
Fast, Easy, Convenient. Studying Adoption and Perception of Digital Covid Certificates.mp4
|
8.2 MB
|
Fast, Easy, Convenient. Studying Adoption and Perception of Digital Covid Certificates.srt
|
20.8 KB
|
I don’t know why I check this Investigating Expert Users' Strategies to Detect.mp4
|
12.0 MB
|
I don’t know why I check this Investigating Expert Users' Strategies to Detect.srt
|
22.2 KB
|
If You Can’t Get Them to the Lab Evaluating a Virtual Study Environment with.mp4
|
9.2 MB
|
If You Can’t Get Them to the Lab Evaluating a Virtual Study Environment with.srt
|
16.5 KB
|
Improving Password Generation Through the Design of a Password Composition Policy.mp4
|
7.5 MB
|
Improving Password Generation Through the Design of a Password Composition Policy.srt
|
15.8 KB
|
Increasing security without decreasing usability A comparison of various verifiable.mp4
|
7.4 MB
|
Increasing security without decreasing usability A comparison of various verifiable.srt
|
26.7 KB
|
Industrial practitioners' mental models of adversarial machine learning.mp4
|
9.4 MB
|
Industrial practitioners' mental models of adversarial machine learning.srt
|
28.1 KB
|
Investigating How University Students in the United States Encounter and Deal With.mp4
|
14.7 MB
|
Investigating How University Students in the United States Encounter and Deal With.srt
|
27.0 KB
|
Is it a concern or a preference An investigation into the ability of privacy scales.mp4
|
9.6 MB
|
Is it a concern or a preference An investigation into the ability of privacy scales.srt
|
26.1 KB
|
Let The Right One In Attestation as a Usable CAPTCHA Alternative.mp4
|
9.7 MB
|
Let The Right One In Attestation as a Usable CAPTCHA Alternative.srt
|
21.3 KB
|
Let’s Hash Helping Developers with Password Security.mp4
|
6.8 MB
|
Let’s Hash Helping Developers with Password Security.srt
|
15.1 KB
|
Lightning Talk - E-Commerce Payment Security Evaluation and Literature Review.mp4
|
3.8 MB
|
Lightning Talk - E-Commerce Payment Security Evaluation and Literature Review.srt
|
8.7 KB
|
Lightning Talk - Informed Consent Are your participants aware of what they share.mp4
|
4.3 MB
|
Lightning Talk - Informed Consent Are your participants aware of what they share.srt
|
11.1 KB
|
Lightning Talk - IoT Inspector a platform for real-world smart home research.mp4
|
4.1 MB
|
Lightning Talk - IoT Inspector a platform for real-world smart home research.srt
|
9.7 KB
|
Lightning Talk - Moving Usable Security and Privacy Research Out of the Lab.mp4
|
9.4 MB
|
Lightning Talk - Moving Usable Security and Privacy Research Out of the Lab.srt
|
13.0 KB
|
Lightning Talk - Skilled or Gullible Gender Stereotypes Related to Computer Security.mp4
|
4.4 MB
|
Lightning Talk - Skilled or Gullible Gender Stereotypes Related to Computer Security.srt
|
8.6 KB
|
Normative and Non-Social Beliefs about Sensor Data Implications for Collective.mp4
|
11.2 MB
|
Normative and Non-Social Beliefs about Sensor Data Implications for Collective.srt
|
23.4 KB
|
On recruiting and retaining users for security-sensitive longitudinal measurement.mp4
|
7.6 MB
|
On recruiting and retaining users for security-sensitive longitudinal measurement.srt
|
14.1 KB
|
Password policies of most top websites fail to follow best practices.mp4
|
7.7 MB
|
Password policies of most top websites fail to follow best practices.srt
|
17.4 KB
|
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve.mp4
|
7.8 MB
|
Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve.srt
|
16.2 KB
|
Replication How Well Do My Results Generalize Now The External Validity of Online.mp4
|
9.0 MB
|
Replication How Well Do My Results Generalize Now The External Validity of Online.srt
|
21.3 KB
|
Replication Stories as Informal Lessons about Security.mp4
|
6.4 MB
|
Replication Stories as Informal Lessons about Security.srt
|
14.6 KB
|
Replication The Effect of Differential Privacy Communication on German Users'.mp4
|
6.5 MB
|
Replication The Effect of Differential Privacy Communication on German Users'.srt
|
17.2 KB
|
Runtime Permissions for Privacy in Proactive Intelligent Assistants.mp4
|
8.7 MB
|
Runtime Permissions for Privacy in Proactive Intelligent Assistants.srt
|
22.6 KB
|
Sharing without Scaring Enabling Smartphones to Become Aware of Temporary Sharing.mp4
|
9.3 MB
|
Sharing without Scaring Enabling Smartphones to Become Aware of Temporary Sharing.srt
|
17.1 KB
|
SOUPS 2022 Keynote - Understanding and Reducing Online Misinformation Across 16 Countries.mp4
|
34.9 MB
|
SOUPS 2022 Keynote - Understanding and Reducing Online Misinformation Across 16 Countries.srt
|
88.8 KB
|
The Nerd Factor The Potential of S&P Adepts to Serve as a Social Resource.mp4
|
6.3 MB
|
The Nerd Factor The Potential of S&P Adepts to Serve as a Social Resource.srt
|
18.0 KB
|
Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site.mp4
|
7.6 MB
|
Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site.srt
|
14.3 KB
|
Usability and Security of Trusted Platform Module (TPM) Library APIs.mp4
|
11.0 MB
|
Usability and Security of Trusted Platform Module (TPM) Library APIs.srt
|
28.8 KB
|
Users' Perceptions of Chrome Compromised Credential Notification.mp4
|
6.2 MB
|
Users' Perceptions of Chrome Compromised Credential Notification.srt
|
16.2 KB
|
/USENIX SOUPS 2023/
|
'Give Me Structure' Synthesis and Evaluation of a (Network) Threat Analysis Process.eng.srt
|
34.8 KB
|
'Give Me Structure' Synthesis and Evaluation of a (Network) Threat Analysis Process.mp4
|
15.9 MB
|
Adventures in Recovery Land Testing the Account Recovery of Popular Websites.eng.srt
|
21.3 KB
|
Adventures in Recovery Land Testing the Account Recovery of Popular Websites.mp4
|
8.4 MB
|
An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers'.eng.srt
|
19.7 KB
|
An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers'.mp4
|
10.7 MB
|
Checking, nudging or scoring Evaluating e-mail user security tools.eng.srt
|
28.1 KB
|
Checking, nudging or scoring Evaluating e-mail user security tools.mp4
|
13.8 MB
|
Data Privacy and Pluralistic Ignorance.eng.srt
|
26.5 KB
|
Data Privacy and Pluralistic Ignorance.mp4
|
14.4 MB
|
Dissecting Nudges in Password Managers Simple Defaults are Powerful.eng.srt
|
15.7 KB
|
Dissecting Nudges in Password Managers Simple Defaults are Powerful.mp4
|
7.8 MB
|
Distrust of big tech and a desire for privacy Understanding the motivations.eng.srt
|
22.0 KB
|
Distrust of big tech and a desire for privacy Understanding the motivations.mp4
|
8.7 MB
|
Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.eng.srt
|
20.5 KB
|
Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.mp4
|
12.6 MB
|
Evaluating User Behavior in Smartphone Security A Psychometric Perspective.eng.srt
|
21.1 KB
|
Evaluating User Behavior in Smartphone Security A Psychometric Perspective.mp4
|
10.9 MB
|
Evolution of Password Expiry in Companies Measuring the Adoption of Recommendations.eng.srt
|
21.1 KB
|
Evolution of Password Expiry in Companies Measuring the Adoption of Recommendations.mp4
|
8.2 MB
|
Exploring the Security Culture of Operational Technology (OT) Organisations.eng.srt
|
17.3 KB
|
Exploring the Security Culture of Operational Technology (OT) Organisations.mp4
|
7.9 MB
|
Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective.eng.srt
|
27.0 KB
|
Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective.mp4
|
12.7 MB
|
Fight Fire with Fire Hacktivists' Take on Social Media Misinformation.eng.srt
|
24.0 KB
|
Fight Fire with Fire Hacktivists' Take on Social Media Misinformation.mp4
|
14.0 MB
|
GuardLens Supporting Safer Online Browsing for People with Visual Impairments.eng.srt
|
18.8 KB
|
GuardLens Supporting Safer Online Browsing for People with Visual Impairments.mp4
|
10.2 MB
|
ImageAlly A Human-AI Hybrid Approach to Support Blind People in Detecting.eng.srt
|
14.9 KB
|
ImageAlly A Human-AI Hybrid Approach to Support Blind People in Detecting.mp4
|
8.1 MB
|
Investigating Security Indicators for Hyperlinking Within the Metaverse.eng.srt
|
19.7 KB
|
Investigating Security Indicators for Hyperlinking Within the Metaverse.mp4
|
8.5 MB
|
Is Reporting Worth the Sacrifice of Revealing What I've Sent.eng.srt
|
20.0 KB
|
Is Reporting Worth the Sacrifice of Revealing What I've Sent.mp4
|
8.8 MB
|
Iterative Design of An Accessible Crypto Wallet for Blind Users.eng.srt
|
21.2 KB
|
Iterative Design of An Accessible Crypto Wallet for Blind Users.mp4
|
11.3 MB
|
Lacking the Tools and Support to Fix Friction Results from an Interview Study.eng.srt
|
22.8 KB
|
Lacking the Tools and Support to Fix Friction Results from an Interview Study.mp4
|
13.0 MB
|
Lightning Talk - De-identification in practice professionals as end users.eng.srt
|
7.9 KB
|
Lightning Talk - De-identification in practice professionals as end users.mp4
|
4.0 MB
|
Lightning Talk - Decisions and Disruptions 2 Decide Harder.eng.srt
|
9.7 KB
|
Lightning Talk - Decisions and Disruptions 2 Decide Harder.mp4
|
4.5 MB
|
Lightning Talk - Getting the Message Out Considering a Connected Products.eng.srt
|
20.7 KB
|
Lightning Talk - Getting the Message Out Considering a Connected Products.mp4
|
9.0 MB
|
Lightning Talk - Lessons Learned in Communicating Differential Privacy to Data Subjects.eng.srt
|
9.7 KB
|
Lightning Talk - Lessons Learned in Communicating Differential Privacy to Data Subjects.mp4
|
4.5 MB
|
Lightning Talk - Look before you Link Privacy Risk Inspection of Open Data through.eng.srt
|
7.0 KB
|
Lightning Talk - Look before you Link Privacy Risk Inspection of Open Data through.mp4
|
4.3 MB
|
Lightning Talk - Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality.eng.srt
|
9.0 KB
|
Lightning Talk - Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality.mp4
|
6.1 MB
|
Lightning Talk - TAM is not SAM - Acceptance of Security Technology.eng.srt
|
6.8 KB
|
Lightning Talk - TAM is not SAM - Acceptance of Security Technology.mp4
|
4.1 MB
|
Lightning Talk - Towards a more effective system for training tier 1 SOC analysts.eng.srt
|
10.3 KB
|
Lightning Talk - Towards a more effective system for training tier 1 SOC analysts.mp4
|
4.2 MB
|
Nobody's Happy - Design Insights from Privacy-Conscious Smart Home Power Users.eng.srt
|
21.9 KB
|
Nobody's Happy - Design Insights from Privacy-Conscious Smart Home Power Users.mp4
|
11.9 MB
|
On the Recruitment of Company Developers for Security Studies.eng.srt
|
20.9 KB
|
On the Recruitment of Company Developers for Security Studies.mp4
|
9.8 MB
|
Privacy Mental Models of Electronic Health Records A German Case Study.eng.srt
|
16.6 KB
|
Privacy Mental Models of Electronic Health Records A German Case Study.mp4
|
8.1 MB
|
Prospects for Improving Password Selection.eng.srt
|
20.4 KB
|
Prospects for Improving Password Selection.mp4
|
8.7 MB
|
SoK I Have the (Developer) Power Sample Size Estimation for.eng.srt
|
21.1 KB
|
SoK I Have the (Developer) Power Sample Size Estimation for.mp4
|
8.5 MB
|
SOUPS 2023 Keynote Address - Weaponizing Technology Examining the Importance of Privacy.eng.srt
|
137.3 KB
|
SOUPS 2023 Keynote Address - Weaponizing Technology Examining the Importance of Privacy.mp4
|
56.1 MB
|
Stalking is immoral but not illegal - Understanding Security, Cyber Crimes.eng.srt
|
25.5 KB
|
Stalking is immoral but not illegal - Understanding Security, Cyber Crimes.mp4
|
13.5 MB
|
Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor.eng.srt
|
23.2 KB
|
Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor.mp4
|
9.9 MB
|
There will be less privacy, of course - How and why people in 10 countries expect AI.eng.srt
|
30.4 KB
|
There will be less privacy, of course - How and why people in 10 countries expect AI.mp4
|
13.6 MB
|
Towards Usable Security Analysis Tools for Trigger-Action Programming.eng.srt
|
26.5 KB
|
Towards Usable Security Analysis Tools for Trigger-Action Programming.mp4
|
9.7 MB
|
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.eng.srt
|
22.8 KB
|
Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.mp4
|
9.0 MB
|
What can central bank digital currency designers learn from asking potential users.eng.srt
|
23.4 KB
|
What can central bank digital currency designers learn from asking potential users.mp4
|
12.1 MB
|
Who Comes Up with this Stuff Interviewing Authors to Understand How They Produce.eng.srt
|
20.2 KB
|
Who Comes Up with this Stuff Interviewing Authors to Understand How They Produce.mp4
|
9.8 MB
|
Would You Give the Same Priority to the Bank and a Game I Do Not.eng.srt
|
23.9 KB
|
Would You Give the Same Priority to the Bank and a Game I Do Not.mp4
|
10.0 MB
|
Youth understandings of online privacy and security A dyadic study of children.eng.srt
|
24.7 KB
|
Youth understandings of online privacy and security A dyadic study of children.mp4
|
14.0 MB
|
Total files 446
|