SOUPS2020 2020 Aug. 7, 2020 to Aug. 7, 2020, Boston, United States

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise Gokul Chettoor Jayakrishnan , Gangadhara Reddy Sirigireddy , Sukanya Vaddepalli , Vijayanand Banahatti , Sachin Premsukh Lodha , Sankalp Suneel Pandit Usage of weak passwords for authentication within an organization can be exploited during cyberattacks leading ...
“You still use the password after all” – Exploring FIDO2 Security Keys in a Small Company Theodor Schnitzler , And Markus Dürmuth , Florian M. Farke , Lennart Lorenz , Philipp Markert The goal of the FIDO2 project is to provide secure and usable alternatives to password-based ...
Knock, Knock. Who’s There? On the Security of LG’s Knock Codes Adam J. Aviv , Philipp Markert , Raina Samuel , Iulian Neamtiu Knock Codes are a knowledge-based unlock authentication scheme used on LG smartphones where a user ...
An Empirical Study of Wireless Carrier Authentication for SIM Swaps Jonathan Mayer , Kevin Lee , Benjamin Kaiser , And Arvind Narayanan We examined the authentication procedures used by five prepaid wireless carriers when a customer attempted ...
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations L. jean Camp , Jayati Dev , Pablo Moriano The purpose of this study is to understand the privacy concerns and behavior of non-WEIRD ...
Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges Nora Mcdonald , Alison Larsen , And Allison Battisti , Galina Madjaroff , Aaron Mentis This paper investigates qualitatively what happens when couples facing a spectrum of options must arrive ...
Blind and Human: Exploring More Usable Audio CAPTCHA Designs Valerie Fanelle , Sepideh Karimi , Aditi Shah , Bharath Subramanian , And Sauvik Das For people with visual impairments (PVIs), audio CAPTCHAs are accessible alternatives to standard visual CAPTCHAs. ...
Usable Sexurity: Studying People’s Concerns and Strategies When Sexting Christine Geeng , Jevan Hutson , And Franziska Roesner Sexting, while becoming commonplace in the age of mobile phones, is still not well-studied outside ...
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault Konstantin Beznosov , Borke Obada-obieh , Lucrezia Spagnolo According to the United States Department of Justice, every 73 seconds, an American is sexually ...
Matthew Smith , Alena Naiakshina , Anastasia Danilova , And Johanna Deuter None
George Chalhoub , Ivan Flechais , Norbert Nthala , Ruba Abu-salma None
Hernan Palombo , Armin Ziaie Tabari , Daniel Lende , Jay Ligatti , And Xinming Ou None
Justin Smith , Lisa Murphy-hill None
Maybe We Have Been Doing This Wrong?: Protester as Persona Matt Mitchell Matt will speak on his experience providing usable, practical, security and privacy to those on ...
Katharina Krombholz , Emanuel Von Zezschwitz , Christian Tiefenau , Maximilian Häring None
Melanie Volkamer , Peter Mayer , Benjamin Reinheimer , Lukas Aldag , Mattia Mossano , Reyhan Duezguen , Bettina Lofthouse , Tatiana Von Landesberger None
Christof Paar , Steffen Becker , Carina Wiesen , Nils Albartus , Nikol Rummel None
Dirk Linden , Sveta Milyaeva , And Awais Rashid , Ola Aleksandra Michalec None
Serge Egelman , Primal Wijesekera , Noura Alomar , Edward Qiu None
User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach Edgar Weippl , Katharina Krombholz , Katharina Pfeffer , Alexandra Mai , Matthias Gusenbauer Frequent reports of monetary loss, fraud, and user-caused security incidents in the context of cryptocurrencies ...
Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations of Security and Privacy in Cloud Office Suites Yasemin Acar , Christian Stransky , Dominik Wermke , Nicolas Huaman , Niklas Busch , And Sascha Fahl Cloud Office suites such as Google Docs or Microsoft Office 365 are widely used and ...
From Intent to Action: Nudging Users Towards Secure Mobile Payments Alessandro Acquisti , Lorrie Faith Cranor , Florian Schaub , Peter Story , Daniel Smullen , And Norman Sadeh Despite experts agreeing on many security best practices, there remains a gap between their advice ...
Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption Natã M. Barbosa , Zhuohao Zhang , And Yang Wang While consumer adoption of smart home devices continues to grow, privacy concerns reportedly remain a ...
Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay of Curiosity, Control and Affect Agnieszka Kitkowska , Mark Warner , Yefim Shulman , Erik Martucci When people sign-up to new online services, privacy notices are the initial means by which ...
"I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences and Self-Perceptions Emilee Rader , Samantha Hautea , And Anjali Munasinghe Most people are unfamiliar with the kinds of inferences that platforms like Facebook and Google ...
Replication: Why We Still Can't Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories Sarah Bird , Ilana Segall , And Martin Lopatka We examine the threat to individuals' privacy based on the feasibility of reidentifying users through ...
How Risky Are Real Users' IFTTT Applets? Lujo Bauer , Limin Jia , Anupam Das , Mahmood Sharif , Milijana Surbatovich , Camille Cobb , Anna Kawakami Smart-home devices are becoming increasingly ubiquitous and interconnected with other devices and services, such as ...
Lightning Talk: Making GDPR Usable Johanna Johansen N/A
Lightning Talk: Overthrowing "Master" Passwords by Throwing Dice Stuart E. Schechter N/A
Lightning Talk: Security for Smart Cities Giselle Malkin N/A
Lightning Talk: Tr(b)usted Identity Proofing Aakanksha Chuzie N/A
Lightning Talk: Sustainable, Scalable and Secure IoT Architecture Khir Henderson N/A
Lightning Talk: End-to-End File Encryption in Browser with Open Source Penumbra Mike Farrell N/A
Lightning Talk: Users Are still Not the Enemy: Applying Security Usability Principles to Covid-19 Return-To-Work Security Ann-marie Horcher N/A