•
|
Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle.
Password Advice Shouldn't Be Boring: Visualizing Password Guessing Attacks
,
In IEEE eCrime Researchers Summit
, 2013.
|
•
|
Ravina Samaroo, Judith M. Brown, Steven Greenspan, Robert Biddle.
Day in the life: A method for documenting user expereince in complex environments
,
In Emerging Technologies for a Smarter World (CEWIT), 10th International Conference Expo, IEEE
, 2013.
|
•
|
Gerardo Reynaga, Sonia Chiasson.
The Usability of Captchas on Smartphones
,
In International Conference on Security and Cryptography (SECRYPT)
, 2013.
|
•
|
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, J Lester, Konstantin Beznosov.
Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders
,
In 15th International Conference on Human-computer Interaction with Mobile Devices and Services (Mobile HCI)
, 2013.
|
•
|
Fanny Lalonde-Levesque, Jude Nsiempba, Jose M. Fernandez, Sonia Chiasson, Anil Somayaji.
A Clinical Study of Risk Factors Related to Malware Infections
,
In ACM Conference on Computer and Communications Security (to appear)
, 2013.
|
•
|
Hsin-Yi Chiang, Sonia Chiasson.
Improving user authentication on mobile devices: A Touchscreen Graphical Password
,
In ACM MobileHCI
, 2013.
|
•
|
Judith M. Brown, Steven Greenspan, Robert Biddle.
Complex activities in an operations center: A case study and model for engineering interaction
,
In Engineering Interactive Computing Systems (EICS2013)
, 2013.
|
•
|
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, J Lester, Konstantin Beznosov.
Understanding Users’ Requirements for Data Protection in Smartphones
,
In 1st Workshop on Secure Data Management on Smartphones and Mobiles (SDMSM)
, 2012.
|
•
|
M. Mahmoud, Sonia Chiasson, Ashraf Matrawy.
Does Context Influence Responses to Firewall Warnings?
,
In APWG eCrime Summit
, 2012.
|
•
|
Alain Forget, Sonia Chiasson, Robert Biddle.
Supporting Learning of an Unfamiliar Authentication Scheme
,
In Association for the Advancement of Computing in Education (AACE E-Learn)
, 2012.
|
•
|
Sonia Chiasson, C. Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Machado Freitas, Alain Forget, N. Wright, G. Chan, Robert Biddle.
The MVP Web-based Authentication Framework [Short Paper]
,
In Financial Cryptography (FC)
, 2012.
|
•
|
David Barrera, W. Enck, Paul C. van Oorschot.
Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems
,
In IEEE MoST 2012 (Mobile Security Technologies Workshop)
, 2012.
|
•
|
San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, Konstantin Beznosov.
What makes users refuse web single sign-on? An empirical investigation of OpenID
,
In Symposium on Usable Privacy and Security (SOUPS’11)
, 2011.
|
•
|
Andreas Sotirakopoulos, Kirstie Hawkey, Konstantin Beznosov.
On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings
,
In 7th Symposium on Usable Privacy and Security (SOUPS)
, 2011.
|
•
|
Fahimeh Raja, Kirstie Hawkey, S. Hsu, K.-L. Wang, Konstantin Beznosov.
A Brick Wall, a Locked Door, & a Bandit: A Physical Security Metaphor For Firewall Warnings
,
In 7th Symposium on Usable Privacy and Security (SOUPS)
, 2011.
|
•
|
Eric Lin, S. Greenberg, E. Trotter, D. Ma, John Aycock.
Does Domain Highlighting Help People Identify Phishing Sites?
,
In ACM Conference on Human Factors in Computing Systems (ACM CHI)
, 2011.
|
•
|
Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Konstantin Beznosov.
Heuristics for Evaluating IT Security Management Tools (Extended Abstract)
,
In 29th International Conference Extended Abstracts on Human Factors in Computing Systems (CHI)
, 2011.
|
•
|
Pooya Jaferian, Kirstie Hawkey, Andreas Sotirakopoulos, Maria Velez-Rojas, Konstantin Beznosov.
Heuristics for Evaluating IT Security Management Tools
,
In Symposium on Usable Privacy and Security (SOUPS)
, 2011.
|
•
|
Max Hlywa, Robert Biddle, Andrew S Patrick.
Facing the facts about image type in recognition-based graphical passwords
,
In 27th Annual Computer Security Applications Conference (ACSAC)
, 2011.
|
•
|
Sonia Chiasson, M. Modi, Robert Biddle.
Auction Hero: The Design of a Game to Learn and Teach about Computer Security
,
In AACE World Conference on E-Learning in Corporate, Government, Healthcare & Higher Education (E-Learn)
, 2011.
|
•
|
Kemal Bicakci, Nart Bedin Atalay, M. Yuceel, Paul C. van Oorschot.
Exploration and Field Study of a Browser-based Password Manager using Icon-based Passwords
,
In 2nd Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS'11)
,
Springer (2012) LNCS 7126
, 2011.
|
•
|
Elizabeth Stobert.
Usability and Strength in Click-based Graphical Passwords (Extended abstract)
,
In ACM Special Interest Group on Computer-Human Interaction Student Research Competition Entry (SIGCHI SRC)
, 2010.
|
•
|
Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle.
Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords
,
In Annual Computer Security Applications Conference (ACSAC)
, 2010.
|
•
|
Andreas Sotirakopoulos, Kirstie Hawkey, Konstantin Beznosov.
I did it because I trusted you: Challenges with the study environment biasing participant behaviours
,
In Symposium of Usable Privacy & Security (SOUPS) Usable Security Experiment Reports (USER) Workshop
, 2010.
|
•
|
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov.
The Challenges of Understanding Users’ Security-related Knowledge, Behaviour, and Motivations
,
In Symposium of Usable Privacy & Security (SOUPS) Usable Security Experiment Reports (USER) Workshop
, 2010.
|
•
|
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov.
Do windows users follow the principle of least privilege?: Investigating user account control practices
,
In 6th Symposium on Usable Privacy Security
, 2010.
|
•
|
Pooya Jaferian, Kirstie Hawkey, Konstantin Beznosov.
Challenges in evaluating complex IT security management systems
,
In SOUPS Usable Security Experiment Reports (USER) Workshop
, 2010.
|
•
|
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov.
Towards enabling Web 2.0 content sharing beyond walled gardens
,
In Workshop on Security and Privacy in Online Social Networking
, 2009.
|
•
|
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov.
Secure Web 2.0 content sharing beyond walled gardens
,
In 25th Annual Computer Security Applications Conference (ACSAC)
, 2009.
|
•
|
San-Tsai Sun, Konstantin Beznosov.
Open problems in Web 2.0 user content sharing
,
In iNetSec Workshop
, 2009.
|
•
|
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov.
Revealing hidden context: Improving mental models of personal firewall users
,
In 5th Symposium on Usable Privacy and Security (SOUPS)
, 2009.
|
•
|
Alain Forget, Sonia Chiasson, Robert Biddle.
Lessons from brain age on persuasion for computer security
,
In CHI' 09 extended abstracts on Human Factors in Computing Systems
, 2009.
|
•
|
Robert Biddle, Paul C. van Oorschot, Andrew S Patrick, Jennifer Sobey, Tara Whalen.
Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study
,
In ACM Cloud Computing Security Workshop (CCSW)
, 2009.
|
•
|
R. Werlinger, Kirstie Hawkey, K. Mulder, Pooya Jaferian, Konstantin Beznosov.
The challenges of using an intrusion detection system: Is it worth the effort?
,
In ACM Symposium on Usable Privacy and Security (SOUPS)
, 2008.
|
•
|
A. Salehi-Abari, Julie Thorpe, Paul C. van Oorschot.
On Purely Automated Attacks and Click-Based Graphical Passwords
,
In 24th Annual Computer Security Applications Conference (ACSAC)
, 2008.
|
•
|
Alain Forget, Sonia Chiasson, Paul C. Van Oorschot, Robert Biddle.
Persuasion for Stronger Passwords: Motivation and Pilot Study
,
In 3rd Conference on Persuasive Technology
,
Springer LNCS
, 2008.
|