You are here

Workshop on Usable Security (USEC 2014) - Programme

SUNDAY, February 23
8:45 am - 9:00 am

Opening Remarks

Welcome Message from the chairs, David Wagner and Matthew Smith.

9:00 am - 10:00 am

Keynote:

When Everyone's A Cyborg: Privacy and Security in The Age of Wearable Computing

Serge Egelman, UC Berkeley. 

While the "wearable computer" started as an experimental research prototype in the late 1960s, the recent demand for devices like Google Glass, smart watches, and wearable fitness monitors suggests that wearable computers may soon become as ubiquitous as cellphones. These devices offer many benefits to end-users in terms of realtime access to information and the augmentation of human memory, but they are also likely to introduce new and complex privacy and security problems. In this talk, I will discuss how wearable computing will pose several unique challenges and opportunities for usable security researchers. The continuous capture of audio and video will be a critical enabler of many use cases, while also opening up new attack vectors and concerns about user privacy. Thus, we find ourselves at the ideal time to be experimenting on these devices: their widespread adoption is imminent, yet there is still ample opportunity for platforms to integrate research findings.

10:00 am – 10:30 am Break

10:30 am – 12:10 pm

Developer USec and Public Policy

Should I Protect You? Understanding Developers' Behavior to Privacy-Preserving APIs

Shubham Jain (Rutgers University), Janne Lindqvist (Rutgers University)

The Privacy and Security Behaviors of Smartphone App Developers

Rebecca Balebako (Carnegie Mellon University), Abigail Marsh (Carnegie Mellon University), Jialiu Lin (Carnegie Mellon University), Jason Hong (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University)

Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy

Rebecca Balebako (Carnegie Mellon University), Rich Shay (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University)

Learning from “Shadow Security”: Why understanding non-compliance provides the basis for effective security

Iacovos Kirlappos (University College London), Simon Parkin (University College London),  Angela Sasse (University College London)

A Comparative Usability Study of Two-Factor Authentication

Emiliano De Cristofaro (University College London), Honglu Du (PARC), Julien Freudiger (PARC), Greg Norcie (Indiana University)

12:10 pm - 1:10 pm Lunch Break
1:10 pm - 2:30 pm

Access Control and Authentication

Beyond Access Control: Managing Online Privacy via Exposure

Mainack Mondal (MPI-SWS), Peter Druschel (MPI-SWS), Krishna P. Gummadi (MPI-SWS), Alan Mislove (Northeastern University)

Spiny CACTOS: OSN users attitudes and perceptions towards cryptographic access control tools

Ero Balsa (KU Leuven), Laura Brandimarte (Carnegie Mellon University), Alessandro Acquisti (Carnegie Mellon University), Claudia Diaz (KU Leuven), Seda Gürses (New York University)

Dynamic Cognitive Game CAPTCHA Usability and Detection of Streaming-Enabled Farming

Manar Mohamed (University of Alabama at Birmingham), Song Gao (University of Alabama at Birmingham), Nitesh Saxena (University of Alabama at Birmingham), Chengcui Zhang (University of Alabama at Birmingham)

A Field Study of Run-Time Location Access Disclosures on Android Smartphones

Huiqing Fu (Rutgers University), Yulong Yang (Rutgers University), Nileema Shingte (Rutgers University), Janne Lindqvist (Rutgers University), Marco Gruteser (Rutgers University)

2:30 pm - 3:00 pm Break
3:00 pm - 4:00 pm

Privacy in Health, Life and Death

Survey on the Fate of Digital Footprints after Death

Carsten Grimm (Carleton University), Sonia Chiasson (Carleton University)

An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing

Emiliano De Cristofaro (University College London)

On a Scale from 1 to 10, How Private Are You? Scoring Facebook Privacy Settings

Tehila Minkus (NYU Polytechnic School of Engineering), Nasir Memon (NYU Polytechnic School of Engineering)

4:00 pm - 4:10 pm Mini-Break
4:10 pm - 5:10 pm

E-Voting and Anonymity

Why Johnny Can't Blow The Whistle: Identifying and Reducing Usability Issues in Anonymity Systems

Greg Norcie (Indiana University), Jim Blythe (Information Sciences Institute), Kelly Caine (Clemson University), L Jean Camp (Indiana University)

Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their Vote

Jurlind Budurushi (TU Darmstadt / CASED), Marcel Woide (TU Darmstadt / CASED), Melanie Volkamer (TU Darmstadt / CASED)

Voter, What Message Will Motivate You To Verify Your Vote?

M. Maina Olembo (CASED, TU Darmstadt), Karen Renaud (School of Computing Science, University of Glasgow), Steffen Bartsch (CASED, TU Darmstadt), Melanie Volkamer (CASED, TU Darmstadt)