USEC 2018 Workshop Programme
Workshop on Usable Security
Sunday, February 18, 2018
USEC Workshop Proceedings Front Matter
8:00 | Registration | |
8:30 | Welcome from the Chairs | |
8:40 | Session 1: | |
Exploring Website Location as a Security Indicator | Der-Yeuan Yu, Elizabeth Stobert, David Basin and Srdjan Capkun | |
User Context: An Explanatory Variable in Phishing Susceptibility | Kristen Greene, Michelle Steves, Mary Theofanos and Jennifer Kostick | |
Sonification in Security Operations Centres: What do Security Practitioners Think? | Louise Axon, Bushra Alahmadi, Jason R. C. Nurse, Michael Goldsmith and Sadie Creese | |
10:00 | Coffee Break | |
10:30 | Session 2: | |
TinPal: An Enhanced Interface for Pattern Locks | Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Banahatti and Sachin Lodha | |
Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication | Adam Aviv and Ravi Kuber | |
Quantifying Users’ Beliefs about Software Updates | Arunesh Mathur, Nathan Malkin, Marian Harbach, Eyal Peer and Serge Egelman | |
Work-In-Progress: Performance of Eyes-Free Mobile Authentication | Flynn Wolf, Adam Aviv and Ravi Kuber | |
Work in Progress: Usable Security vs. Workflow Realities | Jim Blythe, Vijay Kothari, Sean Smith and Ross Koppel | |
12:30 | Lunch | |
13:30 | Session 3: (Joint session with DNS Privacy workshop) | |
DNS-over-TLS on Android | Ben Schwartz (Google), Erik Kline (Google) | |
Stubby – A DNS Privacy client: Current status and GUI | Sara Dickinson (Sinodun) | |
Panel Session: DNS Privacy Usability | Panel Members: Mary Ellen Zurko (MIT), Emily Stark (Google), Ben Schwartz (Google), Daniel Kahn Gillmor (ACLU)Moderator: Allison Mankin | |
Privacy and usability implications of onion domains | Phillip Winter (Princeton University) | |
15:00 | Coffee Break | |
15:30 | Session 4: | |
A Survey Of the Privacy Preferences and Practices of Iranian Users of Telegram | Elham Vaziripour, Reza Farahbakhsh, Mark O’Neill, Justin Wu, Kent Seamons and Daniel Zappala | |
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption | Albese Demjaha, Jonathan Spring, Ingolf Becker, Simon Parkin and Angela Sasse | |
Exploring Parents’ Security and Privacy Concerns and Practices | Abdulmajeed Alqhatani and Heather Lipford | |
17:00 | Session 5: | |
Closing Keynote | Emily Stark, Google Inc. | |
18:00 | Adjourn |