EuroUSEC 2017 Workshop
The 2nd European Workshop on Usable Security
April 29, 2017
Paris, France
Visit the EuroUSEC 2017 Workshop page
EuroUSEC 2017 Proceedings Front Matter
Registration, Coffee & Refreshments
08:00 – 09:00
Introduction
09:00 – 09:10
Session #1: IT professionals
09:10 – 10:30
I’d Like to Have an Argument, Please: Using Dialectic for Effective App Security
C. Weir, A. Rashid (Lancaster University, UK); J. Noble (Victoria University of Wellington, NZ)
C. Weir, A. Rashid (Lancaster University, UK); J. Noble (Victoria University of Wellington, NZ)
Finding Security Champions in Blends of Security Culture
I. Becker, S. Parkin, M. Sasse (University College London)
I. Becker, S. Parkin, M. Sasse (University College London)
Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols
Ksenia Ermoshina (CNRS); Harry Halpin (INRIA); Francesca Musiani (CNRS)
Ksenia Ermoshina (CNRS); Harry Halpin (INRIA); Francesca Musiani (CNRS)
I Do and I Understand. Not Yet True for Security APIs. So Sad
Luigi Lo Iacono, Peter Leo Gorski (Cologne University of Applied Sciences)
Luigi Lo Iacono, Peter Leo Gorski (Cologne University of Applied Sciences)
Coffee Break
10:30 – 11:00
Session #2: Work in Progress
11:00 – 12:00
Security Narrative: Can (Language) Insecurities be Beneficial for Security Departments?
Karoline Busse (University of Bonn); Jennifer Seifert (University of Hannover); Matthew Smith (University of Bonn)
Karoline Busse (University of Bonn); Jennifer Seifert (University of Hannover); Matthew Smith (University of Bonn)
An Inquiry into Perception and Usage of Smartphone Permissions Models
Sophie Russ, Lena Reinfelder (University of Erlangen-Nuremberg); Andrea Schankin (Karlsruhe Institute of Technology); Zinaida Benenson (University of Erlangen-Nuremberg)
Sophie Russ, Lena Reinfelder (University of Erlangen-Nuremberg); Andrea Schankin (Karlsruhe Institute of Technology); Zinaida Benenson (University of Erlangen-Nuremberg)
Riddle me this! Context Sensitive CAPTCHAs
Tobias Urban, René Riedel, Norbert Pohlmann (Institute for Internet-Security, Westphalian University of Applied Sciences, Gelsenkirchen); Ulrike Schmuntzsch Matthias Rötting (Human-Machine-Systems, Berlin Institute of Technology, Berlin)
Tobias Urban, René Riedel, Norbert Pohlmann (Institute for Internet-Security, Westphalian University of Applied Sciences, Gelsenkirchen); Ulrike Schmuntzsch Matthias Rötting (Human-Machine-Systems, Berlin Institute of Technology, Berlin)
Providing smartphone data visualizations to support Privacy Literacy
Timo Jakobi (Bonn-Rhein-Sieg University of Applied Science, Sankt Augustin); Edna Kropp (Akquinet AG, Berlin); Gunnar Stevens (Bonn-Rhein-Sieg University of Applied Science, Sankt Augustin); Mats Schmal (University of Siegen, Siegen)
Timo Jakobi (Bonn-Rhein-Sieg University of Applied Science, Sankt Augustin); Edna Kropp (Akquinet AG, Berlin); Gunnar Stevens (Bonn-Rhein-Sieg University of Applied Science, Sankt Augustin); Mats Schmal (University of Siegen, Siegen)
Lunch Break
12:00 – 14:00
Keynote
14:00 – 14:50
Would you like some Anti-Virus Protection with that? Adventures in Point-of-Sale Security
Angela Sasse
Professor of Human-Centred Security and Director of the UK Research Institute in Science of Cyber Security
Angela Sasse
Professor of Human-Centred Security and Director of the UK Research Institute in Science of Cyber Security
Session #3: What is secure?
14:50 – 15:30
What is a Secure Email?
Joscha Lausch, Oliver Wiese, Volker Roth (Freie Universität Berlin)
Joscha Lausch, Oliver Wiese, Volker Roth (Freie Universität Berlin)
Effects of information security risk visualization on managerial decision making
Esra Yildiz (Universität Münster); Rainer Böhme (Universität Innsbruck)
Esra Yildiz (Universität Münster); Rainer Böhme (Universität Innsbruck)
Break
15:30 – 16:00
Session #4A: Protecting end users
16:00 – 17:00
The Security Blanket of the Chat World: An Analytic Evaluation and a User Study of Telegram
Ruba Abu-Salma (University College London (UCL), UK); Kat Krol (University of Cambridge, UK); Simon Parkin, Victoria Koh, Kevin Kwan, Jazib Mahboob, Zahra Traboulsi, M. Angela Sasse (University College London (UCL), UK)
Ruba Abu-Salma (University College London (UCL), UK); Kat Krol (University of Cambridge, UK); Simon Parkin, Victoria Koh, Kevin Kwan, Jazib Mahboob, Zahra Traboulsi, M. Angela Sasse (University College London (UCL), UK)
Personalized Security Messaging: Nudges for Compliance with Browser Warnings
Nathan Malkin (University of California, Berkeley); Arunesh Mathur (Princeton University); Marian Harbach (International Computer Science Institute); Serge Egelman (University of California, Berkeley; International Computer Science Institute); Eyal Peer (Bar-Ilan University)
Nathan Malkin (University of California, Berkeley); Arunesh Mathur (Princeton University); Marian Harbach (International Computer Science Institute); Serge Egelman (University of California, Berkeley; International Computer Science Institute); Eyal Peer (Bar-Ilan University)
Information Leakage through Mobile Motion Sensors: User Awareness and Concerns
Kirsten Crager, Anindya Maiti, Murtuza Jadliwala, Jibo He (Wichita State University)
Kirsten Crager, Anindya Maiti, Murtuza Jadliwala, Jibo He (Wichita State University)
Session #4B: People and Passwords
17:00 – 18:00
Pass-Roll and Pass-Scroll : New Graphical User Interfaces for Improving Text Passwords
Harshal Tupsamudre (TCS Research, India); Akhil Dixit (UC Santa Cruz); Vijayanand Banahatti, Sachin Lodha (TCS Research, India)
Harshal Tupsamudre (TCS Research, India); Akhil Dixit (UC Santa Cruz); Vijayanand Banahatti, Sachin Lodha (TCS Research, India)
Pico in the Wild: Replacing Passwords, One Site at a Time
Seb Aebischer, Claudio Dettoni, Graeme Jenkinson, Kat Krol, David Llewellyn-Jones (University of Cambridge, UK); Toshiyuki Masui (Keio University, Japan); Frank Stajano (University of Cambridge, UK)
Seb Aebischer, Claudio Dettoni, Graeme Jenkinson, Kat Krol, David Llewellyn-Jones (University of Cambridge, UK); Toshiyuki Masui (Keio University, Japan); Frank Stajano (University of Cambridge, UK)
Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors
Vijay Kothari (Dartmouth College); Ross Koppel (University of Pennsylvania); Jim Blythe (ISI, University of Southern California); Sean Smith (Dartmouth College)
Vijay Kothari (Dartmouth College); Ross Koppel (University of Pennsylvania); Jim Blythe (ISI, University of Southern California); Sean Smith (Dartmouth College)