default search action
Michelle L. Mazurek
Person information
- affiliation: University of Maryland, College Park, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Nathan Reitinger, Bruce Wen, Michelle L. Mazurek, Blase Ur:
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads. Proc. Priv. Enhancing Technol. 2024(3): 715-743 (2024) - [c96]Lev Velykoivanenko, Kavous Salehzadeh Niksirat, Stefan Teofanovic, Bertil Chapuis, Michelle L. Mazurek, Kévin Huguenin:
Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize Surveys. CHI 2024: 498:1-498:22 - [c95]Yang Trista Cao, Lovely-Frances Domingo, Sarah A. Gilbert, Michelle L. Mazurek, Katie Shilton, Hal Daumé III:
Toxicity Detection is NOT all you Need: Measuring the Gaps to Supporting Volunteer Content Moderators through a User-Centric Method. EMNLP 2024: 3567-3587 - [c94]Samantha Katcher, Liana Wang, Caroline Yang, Chloé Messdaghi, Michelle L. Mazurek, Marshini Chetty, Kelsey R. Fulton, Daniel Votipka:
A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community. SOUPS @ USENIX Security Symposium 2024: 1-20 - [c93]Kelsey R. Fulton, Joseph Lewis, Nathan Malkin, Michelle L. Mazurek:
Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies. SOUPS @ USENIX Security Symposium 2024: 81-100 - [c92]Phoebe Moh, Andrew Yang, Nathan Malkin, Michelle L. Mazurek:
Understanding How People Share Passwords. SOUPS @ USENIX Security Symposium 2024: 219-237 - [c91]Noel Warford, Nicholas Farber, Michelle L. Mazurek:
How Entertainment Journalists Manage Online Hate and Harassment. SOUPS @ USENIX Security Symposium 2024: 279-295 - [c90]Carson Powers, Nickolas Gravel, Christopher Pellegrini, Micah Sherr, Michelle L. Mazurek, Daniel Votipka:
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts. SOUPS @ USENIX Security Symposium 2024: 353-372 - [c89]Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. SP 2024: 635-654 - [c88]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. USENIX Security Symposium 2024 - [c87]Arthur Borem, Elleen Pan, Olufunmilola Obielodan, Aurelie Roubinowitz, Luca Dovichi, Michelle L. Mazurek, Blase Ur:
Data Subjects' Reactions to Exercising Their Right of Access. USENIX Security Symposium 2024 - [i13]Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin:
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends. CoRR abs/2403.02292 (2024) - [i12]Omer Akgul, Richard Roberts, Emma Shroyer, Dave Levin, Michelle L. Mazurek:
As Advertised? Understanding the Impact of Influencer VPN Ads. CoRR abs/2406.13017 (2024) - 2023
- [j21]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(1): 1-4 (2023) - [j20]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(2): 1-4 (2023) - [j19]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(3): 1-4 (2023) - [j18]Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2023(4): 1-4 (2023) - [c86]Nathan Reitinger, Nathan Malkin, Omer Akgul, Michelle L. Mazurek, Ian Miers:
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging. SP 2023: 274-292 - [c85]Kelsey R. Fulton, Samantha Katcher, Kevin Song, Marshini Chetty, Michelle L. Mazurek, Chloé Messdaghi, Daniel Votipka:
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery. SP 2023: 1997-2014 - [c84]Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek:
Characterizing Everyday Misuse of Smart Home Devices. SP 2023: 2835-2849 - [c83]Nathan Malkin, Alan F. Luo, Julio Poveda, Michelle L. Mazurek:
Optimistic Access Control for the Smart Home. SP 2023: 3043-3060 - [c82]Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka:
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. USENIX Security Symposium 2023: 2275-2291 - [c81]Wentao Guo, Jason Walter, Michelle L. Mazurek:
The Role of Professional Product Reviewers in Evaluating Security and Privacy. USENIX Security Symposium 2023: 2563-2580 - [c80]Alan F. Luo, Noel Warford, Samuel Dooley, Rachel Greenstadt, Michelle L. Mazurek, Nora McDonald:
How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities. USENIX Security Symposium 2023: 5647-5664 - [c79]Nathan Reitinger, Bruce Wen, Michelle L. Mazurek, Blase Ur:
Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered. WPES@CCS 2023: 167-172 - [i11]Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka:
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem. CoRR abs/2301.04781 (2023) - [i10]Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart:
SoK: Safer Digital-Safety Research Involving At-Risk Users. CoRR abs/2309.00735 (2023) - [i9]Yang Trista Cao, Lovely-Frances Domingo, Sarah Ann Gilbert, Michelle L. Mazurek, Katie Shilton, Hal Daumé III:
Toxicity Detection is NOT all you Need: Measuring the Gaps to Supporting Volunteer Content Moderators. CoRR abs/2311.07879 (2023) - 2022
- [j17]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(1): 1-5 (2022) - [j16]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(2): 1-5 (2022) - [j15]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(3): 1-5 (2022) - [j14]Florian Kerschbaum, Michelle L. Mazurek:
Editors' Introduction. Proc. Priv. Enhancing Technol. 2022(4): 1-5 (2022) - [c78]Michelle L. Mazurek:
We Are the Experts, and We Are the Problem: The Security Advice Fiasco. CCS 2022: 7 - [c77]Kelsey R. Fulton, Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek, Michael Hicks, James Parker:
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition. CCS 2022: 1141-1155 - [c76]Rock Stevens, Daniel Votipka, Josiah Dykstra, Fernando Tomlinson, Erin Quartararo, Colin Ahern, Michelle L. Mazurek:
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks. CHI 2022: 589:1-589:18 - [c75]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Garbage Collection Makes Rust Easier to Use: A Randomized Controlled Trial of the Bronze Garbage Collector. ICSE 2022: 1021-1032 - [c74]Rock Stevens, Faris Bugra Kokulu, Adam Doupé, Michelle L. Mazurek:
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates. NDSS 2022 - [c73]Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, Michelle L. Mazurek:
Investigating Influencer VPN Ads on YouTube. SP 2022: 876-892 - [c72]Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas:
SoK: A Framework for Unifying At-Risk User Research. SP 2022: 2344-2360 - [c71]Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, Adam J. Aviv:
Why Users (Don't) Use Password Managers at a Large Educational Institution. USENIX Security Symposium 2022: 1849-1866 - 2021
- [j13]Nathan Reitinger, Michelle L. Mazurek:
ML-CB: Machine Learning Canvas Block. Proc. Priv. Enhancing Technol. 2021(3): 453-473 (2021) - [c70]Daniel Votipka, Mary Nicole Dugay Punzalan, Seth M. Rabin, Yla R. Tausczik, Michelle L. Mazurek:
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra. EuroS&P 2021: 1-20 - [c69]Desiree Abrokwa, Shruti Das, Omer Akgul, Michelle L. Mazurek:
Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and Smart-Speaker Platforms. SOUPS @ USENIX Security Symposium 2021: 139-158 - [c68]Sophie Veys, Daniel Serrano, Madison Stamos, Margot Herman, Nathan Reitinger, Michelle L. Mazurek, Blase Ur:
Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design. SOUPS @ USENIX Security Symposium 2021: 217-242 - [c67]Kelsey R. Fulton, Anna Chan, Daniel Votipka, Michael Hicks, Michelle L. Mazurek:
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study. SOUPS @ USENIX Security Symposium 2021: 597-616 - [c66]Daniel Votipka, Eric Zhang, Michelle L. Mazurek:
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises. SP 2021: 1268-1285 - [c65]Allison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, Elissa M. Redmiles:
"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online. USENIX Security Symposium 2021: 375-392 - [c64]Omer Akgul, Wei Bai, Shruti Das, Michelle L. Mazurek:
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption. USENIX Security Symposium 2021: 447-464 - [c63]Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv, Michelle L. Mazurek:
Strategies and Perceived Risks of Sending Sensitive Documents. USENIX Security Symposium 2021: 1217-1234 - [c62]Omer Akgul, Ruba Abu-Salma, Wei Bai, Elissa M. Redmiles, Michelle L. Mazurek, Blase Ur:
From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging. WPES@CCS 2021: 119-135 - [i8]Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv, Michelle L. Mazurek:
Strategies and Perceived Risks of Sending Sensitive Documents. CoRR abs/2105.14619 (2021) - [i7]Michael Coblenz, Michelle L. Mazurek, Michael Hicks:
Does the Bronze Garbage Collector Make Rust Easier to Use? A Controlled Experiment. CoRR abs/2110.01098 (2021) - [i6]Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas:
SoK: A Framework for Unifying At-Risk User Research. CoRR abs/2112.07047 (2021) - 2020
- [j12]Rock Stevens, Josiah Dykstra, Wendy Knox Everette, Michelle L. Mazurek:
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs. IEEE Secur. Priv. 18(6): 51-58 (2020) - [j11]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. ACM Trans. Priv. Secur. 23(2): 10:1-10:36 (2020) - [j10]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Build It, Break It, Fix It Contests: Motivated Developers Still Make Security Mistakes. login Usenix Mag. 45(4) (2020) - [c61]Debjani Saha, Candice Schumann, Duncan C. McElfresh, John P. Dickerson, Michelle L. Mazurek, Michael Carl Tschantz:
Human Comprehension of Fairness in Machine Learning. AIES 2020: 152 - [c60]Daniel Votipka, Desiree Abrokwa, Michelle L. Mazurek:
Building and Validating a Scale for Secure Software Development Self-Efficacy. CHI 2020: 1-20 - [c59]Debjani Saha, Anna Chan, Brook Stacy, Kiran Javkar, Sushant Patkar, Michelle L. Mazurek:
User Attitudes On Direct-to-Consumer Genetic Testing. EuroS&P 2020: 120-138 - [c58]Wei Bai, Michael Pearson, Patrick Gage Kelley, Michelle L. Mazurek:
Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study. EuroS&P Workshops 2020: 210-219 - [c57]Debjani Saha, Candice Schumann, Duncan C. McElfresh, John P. Dickerson, Michelle L. Mazurek, Michael Carl Tschantz:
Measuring Non-Expert Comprehension of Machine Learning Fairness Metrics. ICML 2020: 8377-8387 - [c56]Rock Stevens, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, Michelle L. Mazurek:
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards. NDSS 2020 - [c55]Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, Michelle L. Mazurek:
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. USENIX Security Symposium 2020: 89-108 - [c54]Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, Michael Hicks:
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. USENIX Security Symposium 2020: 109-126 - [c53]Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L. Mazurek, Blase Ur:
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data. USENIX Security Symposium 2020: 145-162 - [c52]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Processes. USENIX Security Symposium 2020: 1875-1892 - [i5]Debjani Saha, Candice Schumann, Duncan C. McElfresh, John P. Dickerson, Michelle L. Mazurek, Michael Carl Tschantz:
Human Comprehension of Fairness in Machine Learning. CoRR abs/2001.00089 (2020)
2010 – 2019
- 2019
- [j9]Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Michelle L. Mazurek:
Applied Digital Threat Modeling: It Works. IEEE Secur. Priv. 17(4): 35-42 (2019) - [c51]Ben Weinshel, Miranda Wei, Mainack Mondal, Euirim Choi, Shawn Shan, Claire Dolin, Michelle L. Mazurek, Blase Ur:
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. CCS 2019: 149-166 - [c50]Tavish Vaidya, Daniel Votipka, Michelle L. Mazurek, Micah Sherr:
Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility. CHI 2019: 525 - [c49]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Process and Mental Models. CHI Extended Abstracts 2019 - [c48]Elissa M. Redmiles, Lisa N. Maszkiewicz, Emily Hwang, Dhruv Kuchhal, Everest Liu, Miraida Morales, Denis Peskov, Sudha Rao, Rock Stevens, Kristina Gligoric, Sean Kross, Michelle L. Mazurek, Hal Daumé III:
Comparing and Developing Tools to Measure the Readability of Domain-Specific Texts. EMNLP/IJCNLP (1) 2019: 4830-4841 - [c47]Wei Bai, Omer Akgul, Michelle L. Mazurek:
A Qualitative Investigation of Insecure Code Propagation from Online Forums. SecDev 2019: 34-48 - [c46]Kelsey R. Fulton, Rebecca Gelles, Alexandra McKay, Yasmin Abdi, Richard Roberts, Michelle L. Mazurek:
The Effect of Entertainment Media on Mental Models of Computer Security. SOUPS @ USENIX Security Symposium 2019 - [c45]Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek:
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples. IEEE Symposium on Security and Privacy 2019: 1326-1343 - [c44]Giridhari Venkatadri, Piotr Sapiezynski, Elissa M. Redmiles, Alan Mislove, Oana Goga, Michelle L. Mazurek, Krishna P. Gummadi:
Auditing Offline Data Brokers via Facebook's Advertising Platform. WWW 2019: 1920-1930 - [i4]James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1907.01679 (2019) - [i3]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Jeffrey S. Foster, Michelle L. Mazurek:
An Observational Investigation of Reverse Engineers' Processes. CoRR abs/1912.00317 (2019) - 2018
- [j8]Michael Freyberger, Warren He, Devdatta Akhawe, Michelle L. Mazurek, Prateek Mittal:
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers. Proc. Priv. Enhancing Technol. 2018(2): 47-63 (2018) - [c43]Elissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek:
Asking for a Friend: Evaluating Response Biases in Security User Studies. CCS 2018: 1238-1255 - [c42]Elissa M. Redmiles, John P. Dickerson, Krishna P. Gummadi, Michelle L. Mazurek:
Equitable Security: Optimizing Distribution of Nudges and Resources. CCS 2018: 2270-2272 - [c41]Claire Dolin, Ben Weinshel, Shawn Shan, Chang Min Hahn, Euirim Choi, Michelle L. Mazurek, Blase Ur:
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization. CHI 2018: 493 - [c40]Wei Bai, Ciara Lynton, Charalampos Papamanthou, Michelle L. Mazurek:
Understanding User Tradeoffs for Search in Encrypted Communication. EuroS&P 2018: 258-272 - [c39]Elissa M. Redmiles, Michelle L. Mazurek, John P. Dickerson:
Dancing Pigs or Externalities?: Measuring the Rationality of Security Decisions. EC 2018: 215-232 - [c38]Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster:
User Comfort with Android Background Resource Accesses in Different Contexts. SOUPS @ USENIX Security Symposium 2018: 235-250 - [c37]Daniel Votipka, Rock Stevens, Elissa M. Redmiles, Jeremy Hu, Michelle L. Mazurek:
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. IEEE Symposium on Security and Privacy 2018: 374-391 - [c36]Rock Stevens, Daniel Votipka, Elissa M. Redmiles, Colin Ahern, Patrick Sweeney, Michelle L. Mazurek:
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level. USENIX Security Symposium 2018: 621-637 - [c35]Joshua Tan, Mahmood Sharif, Sruti Bhagavatula, Matthias Beckerle, Michelle L. Mazurek, Lujo Bauer:
Comparing Hypothetical and Realistic Privacy Valuations. WPES@CCS 2018: 168-182 - [i2]Elissa M. Redmiles, Michelle L. Mazurek, John P. Dickerson:
Dancing Pigs or Externalities? Measuring the Rationality of Security Decisions. CoRR abs/1805.06542 (2018) - 2017
- [j7]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
How Internet Resources Might Be Helping You Develop Faster but Less Securely. IEEE Secur. Priv. 15(2): 50-60 (2017) - [j6]Wei Bai, Doowon Kim, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek:
Balancing Security and Usability in Encrypted Email. IEEE Internet Comput. 21(3): 30-38 (2017) - [c34]Kristopher K. Micinski, Daniel Votipka, Rock Stevens, Nikolaos Kofinas, Michelle L. Mazurek, Jeffrey S. Foster:
User Interactions and Permission Use on Android. CHI 2017: 362-373 - [c33]Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek:
Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics. CHI 2017: 931-936 - [c32]Yasemin Acar, Christian Stransky, Dominik Wermke, Charles Weir, Michelle L. Mazurek, Sascha Fahl:
Developers Need Support, Too: A Survey of Security Advice for Software Developers. SecDev 2017: 22-26 - [c31]Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Diversify to Survive: Making Passwords Stronger with Adaptive Policies. SOUPS 2017: 1-12 - [c30]Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, Sascha Fahl:
Security Developer Studies with GitHub Users: Exploring a Convenience Sample. SOUPS 2017: 81-95 - [c29]Elissa M. Redmiles, Everest Liu, Michelle L. Mazurek:
You Want Me To Do What? A Design Study of Two-Factor Authentication Messages. SOUPS 2017 - [c28]Yasemin Acar, Michael Backes, Sascha Fahl, Simson L. Garfinkel, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
Comparing the Usability of Cryptographic APIs. IEEE Symposium on Security and Privacy 2017: 154-171 - [c27]Angelisa C. Plane, Elissa M. Redmiles, Michelle L. Mazurek, Michael Carl Tschantz:
Exploring User Perceptions of Discrimination in Online Targeted Advertising. USENIX Security Symposium 2017: 935-951 - [c26]Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl:
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers. CSET @ USENIX Security Symposium 2017 - 2016
- [j5]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Designing Password Policies for Strength and Usability. ACM Trans. Inf. Syst. Secur. 18(4): 13:1-13:34 (2016) - [c25]Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek:
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior. CCS 2016: 666-677 - [c24]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CCS 2016: 690-703 - [c23]Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, Michelle L. Mazurek:
Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors. CHI 2016: 101-112 - [c22]William Melicher, Darya Kurilova, Sean M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Usability and Security of Text Passwords on Mobile Devices. CHI 2016: 527-539 - [c21]Yasemin Acar, Sascha Fahl, Michelle L. Mazurek:
You are Not Your Developer, Either: A Research Agenda for Usable Security and Privacy Research Beyond End Users. SecDev 2016: 3-8 - [c20]Wei Bai, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek, Doowon Kim:
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. SOUPS 2016: 113-130 - [c19]Elissa M. Redmiles, Amelia R. Malone, Michelle L. Mazurek:
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security. IEEE Symposium on Security and Privacy 2016: 272-288 - [c18]Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky:
You Get Where You're Looking for: The Impact of Information Sources on Code Security. IEEE Symposium on Security and Privacy 2016: 289-305 - [i1]Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. CoRR abs/1606.01881 (2016) - 2015
- [j4]Joel Lee, Lujo Bauer, Michelle L. Mazurek:
The Effectiveness of Security Images in Internet Banking. IEEE Internet Comput. 19(1): 54-62 (2015) - [c17]Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek, William Melicher, Sean M. Segreti, Blase Ur:
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior. CHI 2015: 2903-2912 - [c16]Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay:
Measuring Real-World Accuracies and Biases in Modeling Password Guessability. USENIX Security Symposium 2015: 463-481 - 2014
- [b1]Michelle L. Mazurek:
A Tag-Based, Logical Access-Control Framework for Personal File Sharing. Carnegie Mellon University, USA, 2014 - [c15]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Can long passwords be secure and usable? CHI 2014: 2927-2936 - [c14]Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, Michael K. Reiter:
Toward strong, usable access control for shared distributed data. FAST 2014: 89-103 - 2013
- [j3]Raja R. Sambasivan, Ilari Shafer, Michelle L. Mazurek, Gregory R. Ganger:
Visualizing Request-Flow Comparison to Aid Performance Diagnosis in Distributed Systems. IEEE Trans. Vis. Comput. Graph. 19(12): 2466-2475 (2013) - [c13]Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur:
Measuring password guessability for an entire university. CCS 2013: 173-186 - [c12]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs. Financial Cryptography Workshops 2013: 34-51 - [c11]Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. WPES 2013: 1-12 - 2012
- [j2]Dulcardo Arteaga, Rik Farrow, Daniel Fryer, Doowon Kim, Michelle L. Mazurek, Dutch T. Meyer, Swapnil Patil, Yiqi Xu:
USENIX Notes. login Usenix Mag. 37(3) (2012) - [j1]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Julio C. López:
Helping Users Create Better Passwords. login Usenix Mag. 37(6) (2012) - [c10]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, Michael K. Reiter:
Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386 - [c9]Michelle L. Mazurek, Eno Thereska, Dinan Gunawardena, Richard H. R. Harper, James Scott:
ZZFS: a hybrid device and cloud file system for spontaneous users. FAST 2012: 16 - [c8]Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Correct horse battery staple: exploring the usability of system-assigned passphrases. SOUPS 2012: 7 - [c7]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio C. López:
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. IEEE Symposium on Security and Privacy 2012: 523-537 - [c6]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. USENIX Security Symposium 2012: 65-80 - 2011
- [c5]Michelle L. Mazurek, Peter F. Klemperer, Richard Shay, Hassan Takabi, Lujo Bauer, Lorrie Faith Cranor:
Exploring reactive access control. CHI 2011: 2085-2094 - [c4]Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman:
Of passwords and people: measuring the effect of password-composition policies. CHI 2011: 2595-2604 - 2010
- [c3]Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, Michael K. Reiter:
Access control for home data sharing: evaluating social acceptability. CHI 2010: 645-654 - [c2]Richard Shay, Michelle L. Mazurek, Peter F. Klemperer, Hassan Takabi:
Exploring reactive access control. CHI Extended Abstracts 2010: 4417-4422 - [c1]Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Encountering stronger password requirements: user attitudes and behaviors. SOUPS 2010
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint