21.
|
Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks
/ Yue Huang ; Borke Obada-Obieh ; Konstantin Beznosov
[LERSSE-RefConfPaper-2020-001]
With the rapid adoption of smart speakers in people’s homes, there is a corresponding increase in users’ privacy and security concerns. [...]
Published in Yue Huang, Borke Obada-Obieh, Konstantin Beznosov. Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), 2020, pages 402:1-13.:
Fulltext: PDF;
|
22.
|
Privacy on Social Networking Sites Among Canadian Teenagers
/ Salma Haghighat-Kashani
[LERSSE-THESIS-2019-001]
The widespread popularity of social networking sites (SNSs) among teenagers continually raises concerns over their safety among parents, educators, and policy makers. [...]
Published in Salma Haghighat-Kashani, "Privacy on Social Networking Sites Among Canadian Teenagers", MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, May, 2019:
Fulltext: PDF;
|
23.
|
Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones
/ Diogo Marques ; Tiago Guerreiro ; Luís Carriço ; Ivan Beschastnikh ; et al
[LERSSE-RefConfPaper-2019-002]
Unauthorized physical access to personal devices by people known to the owner of the device is a common concern, and a common occurrence. [...]
Published in In Proceedings of CHI 2019, Glasgow, UK:
Fulltext: PDF PDF (PDFA);
|
24.
|
Towards Understanding the Link Between Age and Smartphone Authentication
/ Lina Qiu ; Alexander De Luca ; Ildar Muslukhov ; Konstantin Beznosov
[LERSSE-RefConfPaper-2019-001]
While previous work on smartphone (un)locking has revealed real world usage patterns, several aspects still need to be explored. [...]
Published in In Proceedings of CHI 2019, Glasgow, UK:
Fulltext: PDF PDF (PDFA);
|
25.
|
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers
/ Hassan Halawa ; Konstantin Beznosov ; Baris Coskun ; Meizhu Liu ; et al
[LERSSE-RefConfPaper-2018-003]
In the face of large-scale automated social engineering attacks to large online services, fast detection and remediation of compromised accounts are crucial to limit the spread of the attack and to mitigate the overall damage to users, companies, and the public at large. [...]
Published in In the proceedings of Twenty-Third International Conference on Financial Cryptography and Data Security (FC'19), St. Kitts, 2019:
Fulltext: Final-verson - PDF; FC19-1-CameraReady-a - PDF PDF (PDFA);
|
26.
|
Analysis of Data-At-Rest Security In Smartphones
/ Ildar Muslukhov
[LERSSE-THESIS-2018-003]
With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. [...]
Published in Ildar Muslukhov, "Analysis of Data-At-Rest Security In Smartphones", PhD Dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, August, 2018:
Fulltext: PDF PDF (PDFA);
|
27.
|
Contextual Permission Models for Better Privacy Protection
/ Primal Wijesekera
[LERSSE-THESIS-2018-002]
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordinary users, should be worried about occur every day without any scrutiny. [...]
Published in Primal Wijesekera, "Contextual Permission Models for Better Privacy Protection", PhD Dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, June, 2018:
Fulltext: PDF PDF (PDFA);
|
28.
|
Advancing the Understanding of Android Unlocking and Usage
/ Lina Qiu
[LERSSE-THESIS-2018-001]
Research efforts have been made towards creating mobile authentication systems to better serve users’ concerns regarding usability and security. [...]
Published in Lina Qiu, "Advancing the Understanding of Android Unlocking and Usage", MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, May, 2018:
Fulltext: PDF PDF (PDFA);
|
29.
|
Source Attribution of Cryptographic API Misuse in Android Applications
/ Ildar Muslukhov ; Yazan Boshmaf ; Konstantin Beznosov
[LERSSE-RefConfPaper-2018-002]
Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at least one mistake, which results in an insecure implementation. [...]
Published in Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov. Source Attribution of Cryptographic API Misuse in Android Applications. Proceedings of the 13th ACM ASIA Conference on Information, Computer and Communications Security (ACM ASIACCS '18), 2018.:
Fulltext: PDF PDF (PDFA);
|
30.
|
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers
/ Hassan Halawa ; Matei Ripeanu ; Konstantin Beznosov ; Baris Coskun ; et al
[LERSSE-REPORT-2018-001]
In the face of large-scale automated social engineering attacks to large online services, fast detection and remediation of compromised accounts are crucial to limit the spread of new attacks and to mitigate the overall damage to users, companies, and the public at large. [...]
Published in H. Halawa, M. Ripeanu, K. Beznosov, B. Coskun, and M. Liu "Forecasting Suspicious Account Activity at Large-Scale Online Service Providers", published in arXiv https://arxiv.org/abs/1801.08629v1:
Fulltext: PDF PDF (PDFA);
|