Schedule for Spring 2022
-
Jan 13, 2022: Jian Gong, Xinyu Zhang, Ju Ren, and Yaoxue Zhang. 2021. The Invisible Shadow: How Security Cameras Leak Private Activities. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘21). Association for Computing Machinery, New York, NY, USA, 2780–2793. DOI
-
Jan 20, 2022: Duc Bui, Yuan Yao, Kang G. Shin, Jong-Min Choi, and Junbum Shin. 2021. Consistency Analysis of Data-Usage Purposes in Mobile Apps. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘21). Association for Computing Machinery, New York, NY, USA, 2824–2843. DOI
-
Jan 27, 2022: 12 Angry Developers – A Qualitative Study on Developers’ Struggles with CSP. Roth, Sebastian and Gröber, Lea and Backes, Michael and Krombholz, Katharina and Stock, Ben. ACM CCS 2021. paper video
-
Feb 10, 2022: L. Simko, A. Lerner, S. Ibtasam, F. Roesner and T. Kohno, “Computer Security and Privacy for Refugees in the United States,” 2018 IEEE Symposium on Security and Privacy (SP), 2018, pp. 409-423, doi. video
-
Feb 17, 2022: Martin R. Albrecht, Jorge Blasco, Rikke Bjerg Jensen, and Lenka Mareková, Royal Holloway, University of London. Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong. USENIS Sec’21. paper
-
Mar 3, 2022: Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters. Maia Boyd, Jamar Sullivan, Marshini Chetty, Blase Ur. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI). Online, May 2021. Paper (video)
-
Mar 10, 2022: Joel Lenin Pinargote Bravo, Rafael Beto Mpfumo, Luis Alejandro Madruga Milanés, Ximena Michelle Cueva, Gretel García Gómez, Amalia Gómez Marcheco, Alberto Fernández Oliva, Jeanna Neefe Matthews, and Sam P. Kellogg. 2018. Lessons from El Paquete, Cuba’s Offline Internet. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS ‘18). Association for Computing Machinery, New York, NY, USA, Article 11, 1–12. doi youtube
-
March 24, 2022: How I learned to be secure: A census-representative survey of security advice sources and behavior. Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. In CCS 2016: ACM Conference on Computer and Communications Security. October 2016. PDF youtube
-
April 7, 2022: E. M. Redmiles, S. Kross and M. L. Mazurek, “How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples,” 2019 IEEE Symposium on Security and Privacy (SP), 2019, pp. 1326-1343, doi: 10.1109/SP.2019.00014.
-
April 21, 2022: Replication: No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert Security Practices and Advice. Karoline Busse and Julia Schäfer, University of Bonn; Matthew Smith, University of Bonn/Fraunhofer FKIE
-
May 5, 2022: Dancing pigs or externalities? Measuring the rationality of security decisions. Elissa M. Redmiles, Michelle L. Mazurek, and J.P. Dickerson. In EC 2018: ACM Conference on Economics and Computation. June 2018. PDF youtube
-
May 12, 2022: Collins W. Munyendo, Yasemin Acar, and Adam J. Aviv. “Desperate Times Call for Desperate Measures”: User Concerns with Mobile Loan Apps in Kenya. 43rd IEEE Symposium on Security and Privacy (IEEE S&P ‘22). May 2022 url