Schedule for Fall 2020
-
Dec 8, 2020: Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements. Joshua Tan, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. CCS’20
-
Nov 24, 2020: Saha, Debjani, Anna Chan, Brook Stacy, Kiran Javkar, Sushant Patkar, and Michelle L. Mazurek. “User Attitudes On Direct-to-Consumer Genetic Testing.” In 2020 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 120-138. IEEE, 2020.
-
Nov 17, 2020: The Many Kinds of Creepware Used for Interpersonal Attacks. Kevin Roundy (NortonLifeLock Research Group), Paula Barmaimon Mendelberg (Cornell Tech), Nicola Dell (Cornell Tech), Damon McCoy (New York University), Daniel Nissani (Cornell Tech), Thomas Ristenpart (Cornell Tech), Acar Tamersoy (NortonLifeLock Research Group) . SP’20
-
Nov 10, 2020: The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums. Emily Tseng, Cornell University; Rosanna Bellini, Open Lab, Newcastle University; Nora McDonald, University of Maryland, Baltimore County; Matan Danos, Weizmann Institute of Science; Rachel Greenstadt and Damon McCoy, New York University; Nicola Dell and Thomas Ristenpart, Cornell Tech
-
Oct 27, 2020: Jayati Dev, Emilee Rader, and Sameer Patil. 2020. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ‘20). Association for Computing Machinery, New York, NY, USA, 1–12. DOI:https://doi.org/10.1145/3313831.3376165
-
Oct 20, 2020: Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers’ Privacy Perceptions and Decisions to Disclose Private Information. Julia Hanson, Miranda Wei, Sophie Veys, Matthew Kugler, Lior Strahilevitz, Blase Ur. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI). Online, April 2020.CHI ‘20
-
Oct 13, 2020: What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users’ Own Twitter Data. Miranda Wei, University of Washington / University of Chicago; Madison Stamos and Sophie Veys, University of Chicago; Nathan Reitinger and Justin Goodman, University of Maryland; Margot Herman, University of Chicago; Dorota Filipczuk, University of Southampton; Ben Weinshel, University of Chicago; Michelle L. Mazurek, University of Maryland; Blase Ur, University of Chicago
-
Oct 6, 2020: CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks. Shehroze Farooqi (The University of Iowa), Maaz Musa (The University of Iowa), Zubair Shafiq (The University of Iowa), and Fareed Zaffar (Lahore University of Management and Sciences)
-
Sept. 29, 2020: Emotional and Practical Considerations towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Moses Namara (Clemson University), Daricia Wilkinson (Clemson University), Kelly Caine (Clemson University), and Bart Knijnenburg (Clemson University)
-
Sept. 22, 2020: The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections. Michael A. Specter, James Koppel, and Daniel Weitzner. USENIX Sec. 2020.
-
Sept. 15, 2020: Angel or Devil? A Privacy Study of Mobile Parental Control Apps. Álvaro Feal (IMDEA Networks Institute / Universidad Carlos III de Madrid), Paolo Calciati (IMDEA Software Institute / Universidad Politécnica de Madrid), Narseo Vallina-Rodriguez (IMDEA Networks Institute / ICSI), Carmela Troncoso (EPFL), and Alessandra Gorla (IMDEA Software Institute)
- Sept. 8, 2020: “I Have a Narrow Thought Process”: Constraints on Explanations Connecting Inferences and Self-Perceptions. Emilee Rader, Samantha Hautea, and Anjali Munasinghe. SOUPS’20.
- Presenter/Discussion Lead: David Balash
- Sept. 1, 2020: Who’s Calling? Characterizing Robocalls through Audio and Metadata Analysis. Sathvik Prasad, Elijah Bouma-Sims, Athishay Kiran Mylappan, and Bradley Reaves. USENIX Sec’ 2020.
- Presenter/Discussion Lead: Sathvik Prasad.