1.
|
Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users
/ Svetlana Abramova ; Artemij Voskobojnikov ; Konstantin Beznosov ; Rainer Böhme
[LERSSE-RefConfPaper-2021-001]
Crypto-assets are unique in tying financial wealth to the secrecy of private keys. [...]
Published in Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov, Rainer Böhme. Bits Under the Mattress: Understanding Different Risk Perceptions and Security Behaviors of Crypto-Asset Users. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'21), 2021.:
Fulltext: PDF;
|
2.
|
Analysis of Data-At-Rest Security In Smartphones
/ Ildar Muslukhov
[LERSSE-THESIS-2018-003]
With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. [...]
Published in Ildar Muslukhov, "Analysis of Data-At-Rest Security In Smartphones", PhD Dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, August, 2018:
Fulltext: PDF PDF (PDFA);
|
3.
|
Contextual Permission Models for Better Privacy Protection
/ Primal Wijesekera
[LERSSE-THESIS-2018-002]
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordinary users, should be worried about occur every day without any scrutiny. [...]
Published in Primal Wijesekera, "Contextual Permission Models for Better Privacy Protection", PhD Dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, June, 2018:
Fulltext: PDF PDF (PDFA);
|
4.
|
Dynamically Regulating Mobile Application Permissions
/ Primal Wijesekera ; Arjun Baokar ; Lynn Tsai ; Joel Reardon ; et al
[LERSSE-etc-2018-001]
Current smartphone operating systems employ permission systems to regulate how apps access sensitive resources. [...]
Published in P. Wijesekera et al., "Dynamically Regulating Mobile Application Permissions," in IEEE Security & Privacy, vol. 16, no. 1, pp. 64-71, January/February 2018. doi: 10.1109/MSP.2018.1331031 keywords: {Computer security;Medical devices;Mobile communication;Privacy;Smart phones;IEEE Symposium on Security and Privacy;machine learning;mobile privacy;permission systems;security}, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8283440&isnumber=8283426:
Fulltext: PDF PDF (PDFA);
|
5.
|
Towards understanding how Touch ID impacts users’ authentication secrets selection for iPhone lock.
/ Ivan Cherapau
[LERSSE-THESIS-2015-004]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-THESIS-2015-003:
Fulltext: PDF PDF (PDFA);
|
6.
|
On the Impact of Touch ID on iPhone Passcodes
/ Ivan Cherapau ; Ildar Muslukhov ; Nalin Asanka ; Konstantin Beznosov
[LERSSE-RefConfPaper-2015-001]
Smartphones today store large amounts of data that can be confidential, private or sensitive. [...]
Published in LERSSE-RefConfPaper-2015-001:
Fulltext: PDF PDF (PDFA);
|
7.
|
Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders
/ Ildar Muslukhov ; Yazan Boshmaf ; Cynthia Kuo ; Jonathan Lester ; et al
[LERSSE-RefConfPaper-2013-002]
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. [...]
Published in Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester and Konstantin Beznosov, Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services companion:
Fulltext: paper.rev2 - PDF; paper - PDF PDF (PDFA); ASONAM_2013 - PDF PDF (PDFA);
|
8.
|
Usability Meets Access Control: Challenges and Research Opportunities
/ Konstantin Beznosov ; Philip Inglesant ; Jorge Lobo ; Rob Reeder ; et al
[LERSSE-UnrefConfPaper-2009-005]
This panel discusses specific challenges in the usability of access control technologies and new opportunities for research [...]
Published in Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, and Mary Ellen Zurko, "Usability Meets Access Control: Challenges and Research Opportunities," in Proceedings of the ACM Symposium on Access Control Models and Aechnologies (SACMAT), Stresa, Italy, ACM, 3-5 June, 2009 :
Transfer from CDS 0.99.7: PDF;
|
9.
|
A Usability Analysis of Microsoft Windows Vista’s Firewall
/ Arun Chebium ; Pooya Jaferian ; Nima Kaviani ; Fahimeh Raja
[LERSSE-REPORT-2009-031]
The usability of personal firewalls has not received a significant amount of attention in the literature. [...]
Published in Arun Chebium, Pooya Jaferian, Nima Kaviani, Fahimeh Raja, "A Usability Analysis of Microsoft Windows Vista’s Firewall", term project report, CPSC 544, University of British Columbia, Canada, Spring 2007. :
Transfer from CDS 0.99.7: PDF;
|
10.
|
Usability of Windows Vista Firewall: A Laboratory User Study
/ Fahimeh Raja ; Robert Boeck ; Ganapathy Viswanathan ; Pouyan Arjmandi
[LERSSE-REPORT-2009-030]
In this project we conducted a user study of Microsoft Windows Vista Firewall: a lab study followed by a questionnaire to evaluate the usability of Vista’s personal firewall. [...]
Published in Fahimeh Raja, Robert Boeck, Ganapathy Viswanathan, Pouyan Arjmandi, "Usability of Windows Vista Firewall: A Laboratory User Study", EECE 412 report, University of British Columbia, Canada, Fall 2007 :
Transfer from CDS 0.99.7: PDF;
|