Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) 293 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
1. Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users / Artemij Voskobojnikov ; Borke Obada-Obieh ; Yue Huang ; Konstantin Beznosov [LERSSE-RefConfPaper-2020-003]
With the massive growth of cryptocurrency markets in recent years has come an influx of new users and investors, pushing the overall number of owners into the millions. [...]
Published in Artemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, Konstantin Beznosov. Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non)Users. In the Proceedings of Twenty-Fourth International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, 2020:
Fulltext: Download fulltextPDF;
2. The Burden of Ending Online Account Sharing / Borke Obada-Obieh ; Yue Huang ; Konstantin Beznosov [LERSSE-RefConfPaper-2020-002]
Many people share online accounts, even in situations where high privacy and security are expected. [...]
Published in Borke Obada-Obieh, Yue Huang, Konstantin Beznosov. The Burden of Ending Online Account Sharing. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), 2020.:
Fulltext: Download fulltextPDF;
3. Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks / Yue Huang ; Borke Obada-Obieh ; Konstantin Beznosov [LERSSE-RefConfPaper-2020-001]
With the rapid adoption of smart speakers in people’s homes, there is a corresponding increase in users’ privacy and security concerns. [...]
Published in Yue Huang, Borke Obada-Obieh, Konstantin Beznosov. Amazon vs. My Brother: How Users of Shared Smart Speakers Perceive and Cope with Privacy Risks. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (ACM CHI'20), 2020, pages 402:1-13.:
Fulltext: Download fulltextPDF;
4. Privacy on Social Networking Sites Among Canadian Teenagers / Salma Haghighat-Kashani [LERSSE-THESIS-2019-001]
The widespread popularity of social networking sites (SNSs) among teenagers continually raises concerns over their safety among parents, educators, and policy makers. [...]
Published in Salma Haghighat-Kashani, "Privacy on Social Networking Sites Among Canadian Teenagers", MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, May, 2019:
Fulltext: Download fulltextPDF;
5. Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones / Diogo Marques ; Tiago Guerreiro ; Luís Carriço ; Ivan Beschastnikh ; et al [LERSSE-RefConfPaper-2019-002]
Unauthorized physical access to personal devices by people known to the owner of the device is a common concern, and a common occurrence. [...]
Published in In Proceedings of CHI 2019, Glasgow, UK:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
6. Towards Understanding the Link Between Age and Smartphone Authentication / Lina Qiu ; Alexander De Luca ; Ildar Muslukhov ; Konstantin Beznosov [LERSSE-RefConfPaper-2019-001]
While previous work on smartphone (un)locking has revealed real world usage patterns, several aspects still need to be explored. [...]
Published in In Proceedings of CHI 2019, Glasgow, UK:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
7. Forecasting Suspicious Account Activity at Large-Scale Online Service Providers / Hassan Halawa ; Konstantin Beznosov ; Baris Coskun ; Meizhu Liu ; et al [LERSSE-RefConfPaper-2018-003]
In the face of large-scale automated social engineering attacks to large online services, fast detection and remediation of compromised accounts are crucial to limit the spread of the attack and to mitigate the overall damage to users, companies, and the public at large. [...]
Published in In the proceedings of Twenty-Third International Conference on Financial Cryptography and Data Security (FC'19), St. Kitts, 2019:
Fulltext: Final-verson - Download fulltextPDF; FC19-1-CameraReady-a - Download fulltextPDF Download fulltextPDF (PDFA);
8. Analysis of Data-At-Rest Security In Smartphones / Ildar Muslukhov [LERSSE-THESIS-2018-003]
With almost two billion users worldwide, smartphones are used for almost everything – booking a hotel, ordering a cup of coffee, or paying in a shop. [...]
Published in Ildar Muslukhov, "Analysis of Data-At-Rest Security In Smartphones", PhD Dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, August, 2018:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
9. Contextual Permission Models for Better Privacy Protection / Primal Wijesekera [LERSSE-THESIS-2018-002]
Despite corporate cyber intrusions attracting all the attention, privacy breaches that we, as ordinary users, should be worried about occur every day without any scrutiny. [...]
Published in Primal Wijesekera, "Contextual Permission Models for Better Privacy Protection", PhD Dissertation, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, June, 2018:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);
10. Advancing the Understanding of Android Unlocking and Usage / Lina Qiu [LERSSE-THESIS-2018-001]
Research efforts have been made towards creating mobile authentication systems to better serve users’ concerns regarding usability and security. [...]
Published in Lina Qiu, "Advancing the Understanding of Android Unlocking and Usage", MASc Thesis, Department of Electrical and Computer Engineering, THE UNIVERSITY OF BRITISH COLUMBIA, May, 2018:
Fulltext: Download fulltextPDF Download fulltextPDF (PDFA);

Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE) : 293 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Set up a personal email alert or subscribe to the RSS feed.