Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 268 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
1. Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones / Masoud Mehrabi Koushki ; Yue Huang ; Julia Rubin ; Konstantin Beznosov [LERSSE-RefConfPaper-2022-004]
The incumbent all-or-nothing model of access control on smartphones has been known to dissatisfy users, due to high overhead (both cognitive and physical) and lack of device-sharing support. [...]
Published in Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, and Konstantin Beznosov. Neither Access nor Control: A Longitudinal Investigation of The Efficacy of User Access Control Solutions on Smartphones. In Proceedings of the 31st USENIX Security Symposium, 2022.:
Fulltext: Download fulltextPDF;
2. Users' Perceptions of Chrome's Compromised Credential Notification / Yue Huang ; Borke Obada-Obieh ; Konstantin Beznosov [LERSSE-RefConfPaper-2022-003]
This paper reports the challenges that users experienced and their concerns regarding the Chrome compromised credentials notification. [...]
Published in Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov, Users' Perceptions of Chrome’s Compromised Credential Notification, In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022):
Fulltext: Download fulltextPDF;
3. SoK: The Dual Nature of Technology in Sexual Abuse / Borke Obada-Obieh, ; Yue Huang, ; Lucrezia Spagnolo, ; Konstantin Beznosov [LERSSE-RefConfPaper-2022-002]
This paper systematizes and contextualizes the ex- isting body of knowledge on technology’s dual nature regarding sexual abuse: facilitator of it and assistant to its prevention, reporting, and restriction. [...]
Published in Borke Obada-Obieh,Yue Huang, Lucrezia Spagnolo, & Konstantin Beznosov. (2022, May). SoK: The Dual Nature of Technology in Sexual Assault. In Proceedings of the Forty-Third Symposium of the Institute of Electrical and Electronics Engineers, Security and Privacy (IEEE S&P 2022):
Fulltext: Download fulltextPDF;
4. COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention / Yue Huang ; Borke Obada-Obieh ; Elissa M. Redmiles ; Satya Lokam ; et al [LERSSE-RefConfPaper-2022-001]
Numerous information-tracking solutions have been implemented worldwide to fight the COVID-19 pandemic. [...]
Published in Yue Huang, Borke Obada-Obieh, Elissa M. Redmiles, Satya Lokam, and Konstantin Beznosov. 2022. COVID 19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention. In Proceedings of the 2022 ACM SIGIR Conference on Human Information Interaction and Retrieval (CHIIR ’22), March 14–18, 2022, Regensburg, Germany. ACM, New York, NY, USA, 23 pages. https://doi.org/10.1145/3498366.3505756:
Fulltext: Download fulltextPDF;
5. Challenges and Threats of Mass Telecommuting: A Qualitative Study of Workers / Borke Obada-Obieh ; Yue Huang ; Konstantin Beznosov [LERSSE-RefConfPaper-2021-008]
This paper reports the security and privacy challenges and threats that people experience while working from home. [...]
Published in Obada-Obieh, B., Huang, Y., & Beznosov, K. (2021, August). Challenges and Threats of Mass Telecommuting: A Qualitative Study of Workers. In Seventeenth Symposium on Usable Privacy and Security ({SOUPS} 2021) (pp. 675-694).:
Fulltext: Download fulltextPDF;
6. What Makes Security-Related Code Examples Different / Azadeh Mokhberi ; Tiffany Quon ; Konstantin Beznosov [LERSSE-RefConfPaper-2021-007]
Developers relying on code examples (CEs) in software engineering can impact code security. [...]
Published in Azadeh Mokhberi, Tiffany Quon, Konstantin Beznosov. What Makes Security-Related Code Examples Different. In The 7th Workshop on Security Information Workers at SOUPS workshops, 2021.:
Fulltext: Download fulltextPDF;
7. SoK: Human, Organizational, and Technological Dimensions of Developers’ Challenges in Engineering Secure Software / Azadeh Mokhberi ; Konstantin Beznosov [LERSSE-RefConfPaper-2021-006]
Despite all attempts to improve software security, vulnerabilities are still propagated within software. [...]
Published in Azadeh Mokhberi, Konstantin Beznosov. SoK: Human, Organizational, and Technological Dimensions of Developers’ Challenges in Engineering Secure Software. Proceedings of the ACM European Symposium on Usable Security (ACM EuroUSEC'21), 2021:
Fulltext: Download fulltextPDF;
8. Non-Adoption Of Crypto-Assets: Exploring The Role Of Trust, Self-Efficacy, And Risk / Artemij Voskobojnikov ; Svetlana Abramova ; Konstantin Beznosov ; Rainer Böhme [LERSSE-RefConfPaper-2021-005]
Over the last years, crypto-assets have gained significant interest from private investors, academia, and industry. [...]
Published in Voskobojnikov, Artemij; Abramova, Svetlana; Beznosov, Konstantin (Kosta); and Böhme, Rainer, “Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk” (2021). In Proceedings of the 29th European Conference on Information Systems (ECIS), An Online AIS Conference, June 14-16, 2021.:
Fulltext: Download fulltextPDF;
9. Security Notifications in Static Analysis Tools: Developers’ Attitudes, Comprehension, and Ability to Act on Them / Mohammad Tahaei ; Kami Vaniea ; Konstantin Beznosov ; Maria K. Wolters [LERSSE-RefConfPaper-2021-004]
Static analysis tools (SATs) have the potential to assist developers in finding and fixing vulnerabilities in the early stages of software development, requiring them to be able to understand and act on tools’ notifications. [...]
Published in Mohammad Tahaei, Kami Vaniea, Konstantin Beznosov, Maria K. Wolters. Security Notifications in Static Analysis Tools: Developers’ Attitudes, Comprehension, and Ability to Act on Them. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'21), 2021:
Fulltext: Download fulltextPDF;
10. On Smartphone Users’ Difficulty with Understanding Implicit Authentication / Masoud Mehrabi Koushki ; Borke Obada-Obieh ; Jun Ho Huh ; Konstantin Beznosov [LERSSE-RefConfPaper-2021-003]
Implicit authentication (IA) has recently become a popular approach for providing physical security on smartphones. [...]
Published in Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, Konstantin Beznosov. On Smartphone Users’ Difficulty with Understanding Implicit Authentication. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'21), 2021.:
Fulltext: Download fulltextPDF;

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 268 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.