31.
|
I Don’t Use Apple Pay Because It’s Less Secure ...: Perception of Security and Usability in Mobile Tap-and-Pay
/ Jun Ho Huh ; Saurabh Verma ; Swathi Sri V Rayala ; Rakesh B. Bobba ; et al
[LERSSE-RefConfPaper-2017-001]
This paper reports on why people use, not use, or have stopped using mobile tap-and-pay in stores. [...]
Published in J. H. Huh, S. Verma, S. S. V. Rayala, R. B. Bobba, K. Beznosov, H. Kim, “I Don’t Use Apple Pay Because It’s Less Secure ...: Perception of Security and Usability in Mobile Tap-and-Pay,” to appear in Proceedings of the Workshop on Usable Security (USEC), 2017, 12 pages.:
Fulltext: PDF PDF (PDFA);
|
32.
|
Harvesting the Low-hanging Fruits: Defending Against Automated Large-Scale Cyber-Intrusions by Focusing on the Vulnerable Populations
/ Hassan Halawa ; Konstantin Beznosov ; Yazan Boshmaf ; Baris Coskun ; et al
[LERSSE-RefConfPaper-2016-003]
The orthodox paradigm to defend against automated social-engineering attacks in large-scale socio-technical systems is reactive and victim-agnostic [...]
Published in In Proceedings of the New Security Paradigms Workshop (NSPW), September 26-29, 2016, Granby, CO, USA.:
Fulltext: PDF PDF (PDFA);
|
33.
|
Snooping on Mobile Phones: Prevalence and Trends
/ Diogo Marques ; Ildar Muslukhov ; Tiago Guerreiro ; Konstantin Beznosov ; et al
[LERSSE-RefConfPaper-2016-002]
Personal mobile devices keep private information which people other than the owner may try to access [...]
Published in Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Konstantin Beznosov and Luis Carrico. 2016. Snooping on Mobile Phones: Prevalence and Trends, SOUPS'16: Symposium On Usable Privacy and Security. Denver, Colorado, USA:
Fulltext: PDF PDF (PDFA);
|
34.
|
Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users
/ Sadegh Torabi ; Konstantin Beznosov
[LERSSE-RefConfPaper-2016-001]
Motivated by the benefits, people have used a variety of webbased services to share health information (HI) online. [...]
Published in Sadegh Torabi and Konstantin Beznosov. 2016. Sharing Health Information on Facebook: Practices, Preferences, and Risk Perceptions of North American Users, SOUPS'16: Symposium On Usable Privacy and Security. Denver, Colorado, USA:
Fulltext: PDF PDF (PDFA);
|
35.
|
Phishing threat avoidance behaviour: An empirical investigation
/ Nalin Asanka Gamagedara Arachchilage ; Steve Love ; Konstantin Beznosov
[LERSSE-RefJnlPaper-2016-001]
Abstract Phishing is an online identity theft that aims to steal sensitive information such as username, password and online banking details from its victims. [...]
Published in Nalin Asanka Gamagedara Arachchilage, Steve Love, Konstantin Beznosov, Phishing threat avoidance behaviour: An empirical investigation, Computers in Human Behavior, Volume 60, July 2016, Pages 185-197, ISSN 0747-5632:
Fulltext: PDF PDF (PDFA);
|
36.
|
Android Rooting: Methods, Detection, and Evasion
/ San-Tsai Sun ; Andrea Cuadros ; Konstantin Beznosov
[LERSSE-RefConfPaper-2015-007]
Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. [...]
Published in San-Tsai Sun, Andrea Cuadros and Konstantin Beznosov. Android Rooting: Methods, Detection, and Evasion. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, October 2015.:
Fulltext: PDF PDF (PDFA);
|
37.
|
Surpass: System-initiated User-replaceable Passwords
/ Jun Ho Huh ; Seongyeol Oh ; Hyoungshick Kim ; Konstantin Beznosov
[LERSSE-RefConfPaper-2015-006]
System-generated random passwords have maximum pass- word security and are highly resistant to guessing attacks. [...]
Published in Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim and Konstantin Beznosov. Surpass: System-initiated User-replaceable Passwords. In Proceedings of ACM Conference on Computer and Communications Security (CCS'15), October 2015.:
Fulltext: PDF PDF (PDFA);
|
38.
|
Thwarting Fake OSN Accounts by Predicting their Victims
/ Yazan Boshmaf ; Matei Ripeanu ; Konstantin Beznosov
[LERSSE-RefConfPaper-2015-005]
Traditional defense mechanisms for fighting against automated fake accounts in online social networks are victim-agnostic. [...]
Published in Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov. Thwarting Fake OSN Accounts by Predicting their Victims. In Proceedings of the 2015 Workshop on Artificial Intelligent and Security Workshop (AISec'15), Denver, Colorado, USA, Oct, 2015:
Fulltext: PDF PDF (PDFA);
|
39.
|
Android Permissions Remystified: A Field Study on Contextual Integrity
/ Primal Wijesekera ; Arjun Baokar ; Ashkan Hosseini ; Serge Egelman ; et al
[LERSSE-RefConfPaper-2015-004]
We instrumented the Android platform to collect data regarding how often and under what circumstances smartphone applications access protected resources regulated by permissions. [...]
Published in Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. USENIX Security 2015, Washington DC, USA.:
Fulltext: PDF PDF (PDFA);
|
40.
|
On the Memorability of System-generated PINs: Can Chunking Help?
/ Jun Ho Huh ; Hyoungschick Kim ; Rakesh B. Bobba ; Masooda N. Bashir ; et al
[LERSSE-RefConfPaper-2015-003]
To ensure that users do not choose weak personal identification numbers (PINs), many banks give out system-generated random PINs. [...]
Published in Jun Ho Huh, Hyoungschick Kim, Rakesh B. Bobba, Masooda N. Bashir and Konstantin Beznosov. 2015. On the Memorability of System-generated PINs: Can Chunking Help? SOUPS'15: Symposium On Usable Privacy and Security. Ottawa, Ontario, Canada:
Fulltext: PDF PDF (PDFA);
|