Symposium On Usable Privacy and Security 2012 July 11, 2012 to July 19, 2012, Washington

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome and best paper award presentation Lorrie Faith Cranor , Konstantin Beznosov , Heather richter Lipford N/A
NSF Secure and Trustworthy Cyberspace Program Jeremy Epstein , Peter Muhlberger N/A
Invited talk: Privacy in the mobile world: A big task on a small screen Julie Brill In her remarks, Commissioner Brill will discuss the privacy implications of the increasing shift of ...
Technical paper session: Mobile Privacy and Security, Mary Ellen Zurko N/A
Measuring User Confidence in Smartphone Security and Privacy David A. Wagner , Erika Chin , Vyas Sekar , Adrienne porter Felt N/A
Goldilocks and the Two Mobile Devices: Going Beyond All-Or-Nothing Access to a Device's Applications Stuart E. Schechter , Eiji Hayashi , Oriana Riva , Karin Strauss , A.j. bernheim Brush N/A
Android Permissions: User Attention, Comprehension, and Behavior David A. Wagner , Serge Egelman , Erika Chin , Adrienne porter Felt , Elizabeth Ha , Ariel Haney N/A
Technical paper session: User Perceptions, Serge Egelman N/A
Smart, Useful, Scary, Creepy: Perceptions of Behavioral Advertising Lorrie Faith Cranor , Blase Ur , Pedro g. Leon , Richard Shay , Yang Wang N/A
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice Apu Kapadia , Greg Norcie , Sameer Patil , Adam j. Lee N/A
Stories as Informal Lessons about Security [slides] Rick Wash , Emilee Rader , Brandon Brooks N/A
Technical paper session: Authentication, Stuart E. Schechter N/A
Correct horse battery staple: Exploring the usability of system-assigned passphrases Tim Vidas , Lorrie Faith Cranor , Lujo Bauer , Nicolas Christin , Blase Ur , Richard Shay , Patrick gage Kelley , Saranga Komanduri , Michelle l. Mazurek N/A
Do You See Your Password? Applying Recognition to Textual Passwords Robert Biddle , Nicholas Wright , Andrew s. Patrick N/A
InViz: Instant Visualization of Security Attacks Lucas Layman , Nico Zazworka N/A
Audiotegrity Richard Carback , Alex Florescu , Tyler Kaczmarek , Jan Rubio , Noel Runyan , Poorvi l. Vora , John Wittrock , Filip Zagrski N/A
A Chrome Extension to Prevent the SSLstripping Attack Daniel Fairweather , Dongwan Shin N/A
Prototype System for Visualizing Security Risks on Mobile Device Shinichiro Matsuo , Akira Kanaoka , Takeshi Takahashi , Tadashi Minowa N/A
Remotegrity: Are Usable and Secure Remote Voting Schemes Possible? Poorvi l. Vora , Filip Zagrski N/A
Emotional CAPTCHA: Bots Cannot Feel Happiness or Sadness! Konstantin Beznosov , Hyoungshick Kim , Hootan Rashtian N/A
AppWindow: Tracking Mobile Apps Tracking You Fuming Shih , Frances Zhang N/A
Smartphones and Election 2012: Rewards and Risks of e-Democracy Lillie Coney N/A Security
Usability Considerations for DNSSEC Steve Sheng N/A Security
The Fine Print: Adding UX to Terms + Conditions Gregg Bernstein N/A Security
Scamicry! Rob Reeder N/A Security
Technical paper session: Online Social Networks, Robert Biddle N/A
Facebook and Privacy: It's Complicated Steven M. Bellovin , Serge Egelman , Maritza Johnson N/A
Are privacy concerns a turn-off? Engagement and privacy in social networks Jessica Staddon , David Huffaker , Larkin Brown , Aaron Sedley N/A
Helping Johnny 2.0 to Encrypt His Facebook Conversations Matthew Smith , Sascha Fahl , Marian Harbach , Thomas Muders , Uwe Sander N/A
Technical paper session: Access Control, Rob Reeder N/A
+Your Circles: Sharing Behavior on Google+ Heather richter Lipford , Jason Watson , Andrew Besmer N/A
The PViz Comprehension Tool for Social Network Privacy Settings Kristen Lefevre , Alessandra Mazzia , Eytan Adar N/A
Relating Declarative Semantics and Usability in Access Control Vivek Krishnan , Mahesh v. Tripunitara , Kinson Chik , Tony Bergstrom N/A