Workshop on Usable Security (USEC 2014) – Programme
SUNDAY, February 23
|
|
---|---|
8:45 am – 9:00 am |
Opening RemarksWelcome Message from the chairs, David Wagner and Matthew Smith. |
9:00 am – 10:00 am |
Keynote: When Everyone’s A Cyborg: Privacy and Security in The Age of Wearable ComputingSerge Egelman, UC Berkeley. |
10:00 am – 10:30 am | Break |
10:30 am – 12:10 pm |
Developer USec and Public PolicyShould I Protect You? Understanding Developers’ Behavior to Privacy-Preserving APIsShubham Jain (Rutgers University), Janne Lindqvist (Rutgers University) The Privacy and Security Behaviors of Smartphone App DevelopersRebecca Balebako (Carnegie Mellon University), Abigail Marsh (Carnegie Mellon University), Jialiu Lin (Carnegie Mellon University), Jason Hong (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University) Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public PolicyRebecca Balebako (Carnegie Mellon University), Rich Shay (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University) Learning from “Shadow Security”: Why understanding non-compliance provides the basis for effective securityIacovos Kirlappos (University College London), Simon Parkin (University College London), Angela Sasse (University College London) A Comparative Usability Study of Two-Factor AuthenticationEmiliano De Cristofaro (University College London), Honglu Du (PARC), Julien Freudiger (PARC), Greg Norcie (Indiana University) |
12:10 pm – 1:10 pm | Lunch Break |
1:10 pm – 2:30 pm |
Access Control and AuthenticationBeyond Access Control: Managing Online Privacy via ExposureMainack Mondal (MPI-SWS), Peter Druschel (MPI-SWS), Krishna P. Gummadi (MPI-SWS), Alan Mislove (Northeastern University) Spiny CACTOS: OSN users attitudes and perceptions towards cryptographic access control toolsEro Balsa (KU Leuven), Laura Brandimarte (Carnegie Mellon University), Alessandro Acquisti (Carnegie Mellon University), Claudia Diaz (KU Leuven), Seda Gürses (New York University) Dynamic Cognitive Game CAPTCHA Usability and Detection of Streaming-Enabled FarmingManar Mohamed (University of Alabama at Birmingham), Song Gao (University of Alabama at Birmingham), Nitesh Saxena (University of Alabama at Birmingham), Chengcui Zhang (University of Alabama at Birmingham) A Field Study of Run-Time Location Access Disclosures on Android SmartphonesHuiqing Fu (Rutgers University), Yulong Yang (Rutgers University), Nileema Shingte (Rutgers University), Janne Lindqvist (Rutgers University), Marco Gruteser (Rutgers University) |
2:30 pm – 3:00 pm | Break |
3:00 pm – 4:00 pm |
Privacy in Health, Life and DeathSurvey on the Fate of Digital Footprints after DeathCarsten Grimm (Carleton University), Sonia Chiasson (Carleton University) An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome SequencingEmiliano De Cristofaro (University College London) On a Scale from 1 to 10, How Private Are You? Scoring Facebook Privacy SettingsTehila Minkus (NYU Polytechnic School of Engineering), Nasir Memon (NYU Polytechnic School of Engineering) |
4:00 pm – 4:10 pm | Mini-Break |
4:10 pm – 5:10 pm |
E-Voting and AnonymityWhy Johnny Can’t Blow The Whistle: Identifying and Reducing Usability Issues in Anonymity SystemsGreg Norcie (Indiana University), Jim Blythe (Information Sciences Institute), Kelly Caine (Clemson University), L Jean Camp (Indiana University) Introducing Precautionary Behavior by Temporal Diversion of Voter Attention from Casting to Verifying their VoteJurlind Budurushi (TU Darmstadt / CASED), Marcel Woide (TU Darmstadt / CASED), Melanie Volkamer (TU Darmstadt / CASED) Voter, What Message Will Motivate You To Verify Your Vote?M. Maina Olembo (CASED, TU Darmstadt), Karen Renaud (School of Computing Science, University of Glasgow), Steffen Bartsch (CASED, TU Darmstadt), Melanie Volkamer (CASED, TU Darmstadt) |
Keynote
When Everyone’s A Cyborg: Privacy and Security in The Age of Wearable Computing
Serge Egelman
While the “wearable computer” started as an experimental research prototype in the late 1960s, the recent demand for devices like Google Glass, smart watches, and wearable fitness monitors suggests that wearable computers may soon become as ubiquitous as cellphones. These devices offer many benefits to end-users in terms of realtime access to information and the augmentation of human memory, but they are also likely to introduce new and complex privacy and security problems. In this talk, I will discuss how wearable computing will pose several unique challenges and opportunities for usable security researchers. The continuous capture of audio and video will be a critical enabler of many use cases, while also opening up new attack vectors and concerns about user privacy. Thus, we find ourselves at the ideal time to be experimenting on these devices: their widespread adoption is imminent, yet there is still ample opportunity for platforms to integrate research findings.