Home
Papertalks
About
Help
Improve
Upload
Login
Register
Login Required
×
You have to login to use this feature.
SOUPS
Member since:
2021-01-07
Last seen:
2021-01-08
User details
Name:
Sixteenth Symposium on Usable Privacy and Security (SOUPS)
Affiliation:
USENIX: The Advanced Computing Systems Association
Website:
https://www.usenix.org/
About me:
SOUPS brings together an interdisciplinary group of researchers and practitioners in human-computer interaction, security, and privacy.
Papertalks of SOUPS
07/08/2020
Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise
Gokul Chettoor Jayakrishnan
,
Gangadhara Reddy Sirigireddy
,
Sukanya Vaddepalli
and
Vijayanand Banahatti
,
Sachin Premsukh Lodha
,
Sankalp Suneel Pandit
Keywords
Abstract
Paper
10:26
07/08/2020
“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company
Florian M. Farke
,
Lennart Lorenz
,
Theodor Schnitzler
and
Philipp Markert
,
Markus Dürmuth
Keywords
Abstract
Paper
4:40
07/08/2020
Knock, Knock. Who’s There? On the Security of LG’s Knock Codes
Raina Samuel
,
Philipp Markert
,
Adam J. Aviv
,
Iulian Neamtiu
Keywords
Abstract
Paper
13:05
07/08/2020
An Empirical Study of Wireless Carrier Authentication for SIM Swaps
Kevin Lee
,
Benjamin Kaiser
,
Jonathan Mayer
,
Arvind Narayanan
Keywords
Abstract
Paper
5:29
07/08/2020
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations
Jayati Dev
,
Pablo Moriano
,
L. Jean Camp
Keywords
Abstract
Paper
5:10
07/08/2020
Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges
Nora McDonald
,
Alison Larsen
,
Allison Battisti
and
Galina Madjaroff
,
Aaron Massey
,
Helena Mentis
Keywords
Abstract
Paper
5:24
07/08/2020
Blind and Human: Exploring More Usable Audio CAPTCHA Designs
Valerie Fanelle
,
Sepideh Karimi
,
Aditi Shah
and
Bharath Subramanian
,
Sauvik Das
Keywords
Abstract
Paper
10:27
07/08/2020
Usable Sexurity: Studying People’s Concerns and Strategies When Sexting
Christine Geeng
,
Jevan Hutson
,
Franziska Roesner
Keywords
Abstract
Paper
5:04
07/08/2020
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault
Borke Obada-Obieh
,
Lucrezia Spagnolo
,
Konstantin Beznosov
Keywords
Abstract
Paper
13:53
07/08/2020
Replication: On the Ecological Validity of Online Security Developer Studies: Exploring Deception in a Password-Storage Study with Freelancers
Anastasia Danilova
,
Alena Naiakshina
,
Johanna Deuter
,
Matthew Smith
Keywords
Abstract
Paper
4:49
07/08/2020
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras
George Chalhoub
,
Ivan Flechais
,
Norbert Nthala
,
Ruba Abu-Salma
Keywords
Abstract
Paper
5:18
07/08/2020
An Ethnographic Understanding of Software (In)Security and a Co-Creation Model to Improve Secure Software Development
Hernan Palombo
,
Armin Ziaie Tabari
,
Daniel Lende
and
Jay Ligatti
,
Xinming Ou
Keywords
Abstract
Paper
14:36
07/08/2020
Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security
Justin Smith
,
Lisa Nguyen Quang Do
,
Emerson Murphy-Hill
Keywords
Abstract
Paper
5:19
07/08/2020
Security, Availability, and Multiple Information Sources: Exploring Update Behavior of System Administrators
Christian Tiefenau
,
Maximilian Häring
,
Katharina Krombholz
,
Emanuel von Zezschwitz
Keywords
Abstract
Paper
5:16
07/08/2020
An investigation of phishing awareness and education over time: When and how to best remind users
Benjamin Reinheimer
,
Lukas Aldag
,
Peter Mayer
and
Mattia Mossano
,
Reyhan Duezguen
,
Bettina Lofthouse
,
Tatiana von Landesberger
,
Melanie Volkamer
Keywords
Abstract
Paper
5:01
07/08/2020
An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Processes
Steffen Becker
,
Carina Wiesen
,
Nils Albartus
and
Nikol Rummel
,
Christof Paar
Keywords
Abstract
Paper
5:30
07/08/2020
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures
Ola Aleksandra Michalec
,
Dirk van der Linden
,
Sveta Milyaeva
,
Awais Rashid
Keywords
Abstract
Paper
4:59
07/08/2020
"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild
Noura Alomar
,
Primal Wijesekera
,
Edward Qiu
,
Serge Egelman
Keywords
Abstract
Paper
15:27
07/08/2020
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach
Alexandra Mai
,
Katharina Pfeffer
,
Matthias Gusenbauer
and
Edgar Weippl
,
Katharina Krombholz
Keywords
Abstract
Paper
13:51
07/08/2020
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites
Dominik Wermke
,
Nicolas Huaman
,
Christian Stransky
and
Niklas Busch
,
Yasemin Acar
,
Sascha Fahl
Keywords
Abstract
Paper
5:01
07/08/2020
From Intent to Action: Nudging Users Towards Secure Mobile Payments
Peter Story
,
Daniel Smullen
,
Alessandro Acquisti
and
Lorrie Faith Cranor
,
Norman Sadeh
,
Florian Schaub
Keywords
Abstract
Paper
14:59
07/08/2020
Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption
Natã M. Barbosa
,
Zhuohao Zhang
,
Yang Wang
Keywords
Abstract
Paper
5:16
07/08/2020
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect
Agnieszka Kitkowska
,
Mark Warner
,
Yefim Shulman
and
Erik Wästlund
,
Leonardo A. Martucci
Keywords
Abstract
Paper
15:13
07/08/2020
"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions
Emilee Rader
,
Samantha Hautea
,
Anjali Munasinghe
Keywords
Abstract
Paper
5:18
07/08/2020
Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories
Sarah Bird
,
Ilana Segall
,
Martin Lopatka
Keywords
Abstract
Paper
5:46
07/08/2020
How Risky Are Real Users' IFTTT Applets?
Camille Cobb
,
Milijana Surbatovich
,
Anna Kawakami
and
Mahmood Sharif
,
Lujo Bauer
,
Anupam Das
,
Limin Jia
Keywords
Abstract
Paper
14:24