


default search action
17th SOUPS @ USENIX Security Symposium 2021
- Sonia Chiasson:

Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021. USENIX Association 2021
Authentication
- Geumhwan Cho, Sungsu Kwag

, Jun Ho Huh, Bedeuro Kim, Choong-Hoon Lee, Hyoungshick Kim:
Towards Usable and Secure Location-based Smartphone Authentication. 1-16 - Eva Gerlitz, Maximilian Häring, Matthew Smith

:
Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies. 17-36 - Collins W. Munyendo, Miles Grant, Philipp Markert, Timothy J. Forman, Adam J. Aviv

:
Using a Blocklist to Improve the Security of User Selection of Android Patterns. 37-56 - Kentrell Owens, Olabode Anise, Amanda Krauss, Blase Ur:

User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. 57-76
User Attitudes and (Mis)understandings
- Maximilian Häring, Eva Gerlitz, Christian Tiefenau, Matthew Smith

, Dominik Wermke, Sascha Fahl, Yasemin Acar:
Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany. 77-98 - Ankit Kariryaa, Gian-Luca Savino, Carolin Stellmacher, Johannes Schöning:

Understanding Users' Knowledge about the Privacy and Security of Browser Extensions. 99-118 - Khadija Baig, Elisa Kazan, Kalpana Hundlani, Sana Maqsood, Sonia Chiasson:

Replication: Effects of Media on the Mental Models of Technical Users. 119-138 - Desiree Abrokwa, Shruti Das, Omer Akgul, Michelle L. Mazurek:

Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and Smart-Speaker Platforms. 139-158
Perspectives and Policy
- Smirity Kaushik, Yaxing Yao, Pierre Dewitte, Yang Wang:

"How I Know For Sure": People's Perspectives on Solely Automated Decision-Making (SADM). 159-180 - Konrad Kollnig, Pierre Dewitte, Max Van Kleek, Ge Wang, Daniel Omeiza, Helena Webb, Nigel Shadbolt:

A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps. 181-196 - Leah Zhang-Kennedy, Sonia Chiasson:

"Whether it's moral is a whole other story": Consumer perspectives on privacy regulations and corporate data practices. 197-216 - Sophie Veys, Daniel Serrano, Madison Stamos, Margot Herman, Nathan Reitinger, Michelle L. Mazurek, Blase Ur:

Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design. 217-242
Inclusive Privacy and Security
- Shikun Zhang, Yuanyuan Feng, Norman M. Sadeh:

Facial Recognition: Understanding Privacy Concerns and Attitudes Across Increasingly Diverse Deployment Scenarios. 243-262 - Daniela Napoli, Khadija Baig, Sana Maqsood, Sonia Chiasson:

"I'm Literally Just Hoping This Will Work: " Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities. 263-280 - Zhuohao Zhang, Zhilin Zhang, Haolin Yuan, Natã M. Barbosa, Sauvik Das, Yang Wang:

WebAlly: Making Visual Task-based CAPTCHAs Transferable for People with Visual Impairments. 281-298 - Deepak Kumar, Patrick Gage Kelley, Sunny Consolvo, Joshua Mason, Elie Bursztein, Zakir Durumeric, Kurt Thomas, Michael D. Bailey:

Designing Toxic Content Classification for a Diversity of Perspectives. 299-318
Phishing and Account Compromise
- Ayako Akiyama Hasegawa, Naomi Yamashita, Mitsuaki Akiyama, Tatsuya Mori:

Why They Ignore English Emails: The Challenges of Non-Native Speakers in Identifying Phishing Emails. 319-338 - Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, Joachim Vogt:

SoK: Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. 339-358 - Lorenzo Neil, Elijah Robert Bouma-Sims, Evan Lafontaine, Yasemin Acar, Bradley Reaves:

Investigating Web Service Account Remediation Advice. 359-376 - Rick Wash, Norbert Nthala, Emilee Rader:

Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection. 377-396
Security in Practice
- Anastasia Danilova, Alena Naiakshina, Anna Rasgauski, Matthew Smith

:
Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage. 397-416 - Daniel V. Bailey, Philipp Markert, Adam J. Aviv:

"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs. 417-436 - Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, Sascha Fahl:

On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. 437-454 - Jason Ceci, Hassan Khan, Urs Hengartner, Daniel Vogel:

Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal. 455-474
Ubiquitous Computing
- Alexander Ponticello, Matthias Fassl, Katharina Krombholz:

Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants. 475-492 - Brennen Bouwmeester, Elsa Turcios Rodriguez, Carlos Gañán, Michel van Eeten, Simon Parkin:

"The Thing Doesn't Have a Name": Learning from Emergent Real-World Interventions in Smart Home Security. 493-512 - David Harborth, Alisa Frik:

Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for Mobile Augmented Reality Apps. 513-534 - Varun Chandrasekaran, Suman Banerjee, Bilge Mutlu, Kassem Fawaz

:
PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers. 535-552
Developers
- Stephan Plöger, Mischa Meier, Matthew Smith:

A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS Students and CTF Players. 553-572 - Mohammad Tahaei, Alisa Frik, Kami Vaniea:

Deciding on Personalized Ads: Nudging Developers About User Privacy. 573-596 - Kelsey R. Fulton, Anna Chan, Daniel Votipka, Michael Hicks, Michelle L. Mazurek:

Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. 597-616 - Anwesh Tuladhar, Daniel Lende, Jay Ligatti, Xinming Ou:

An Analysis of the Role of Situated Learning in Starting a Security Culture in a Software Company. 617-632
Work (and Learn) from Home
- David G. Balash, Dongkun Kim, Darikia Shaibekova, Rahel A. Fainchtein, Micah Sherr, Adam J. Aviv

:
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services. 633-652 - Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo:

Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities. 653-674 - Borke Obada-Obieh, Yue Huang, Konstantin Beznosov:

Challenges and Threats of Mass Telecommuting: A Qualitative Study of Workers. 675-694 - Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:

Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. 695-714

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














