Welcome to the Ninth Symposium On Usable Privacy and Security! This year's program features 15 technical papers, three workshops, 25 posters, 5 posters/papers published in the past year at other conferences, a panel, two lightning talks and demo sessions, and an invited talk. On Thursday evening SOUPS 2013 attendees will enjoy a dinner at Alnwick Garden.
This year we received 51 technical paper submissions. The program committee provided two rounds of reviews. In the first round papers received at least three reviews. In the second round, papers that had received one or more reviews better than "weak reject" in the first round received additional reviews. The goal of the second round was to ensure that a consistent standard of acceptance could be applied across all papers and, to this end, papers received as many as six reviews. We held an in-person program committee meeting. Fifteen papers were selected for presentation and publication.
Proceeding Downloads
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources
Smartphone applications pose interesting security problems because the same resources they use to enhance the user experience may also be used in ways that users might find objectionable. We performed a set of experiments to study whether attribution ...
Formal definitions for usable access control rule sets from goals to metrics
Access control policies describe high level requirements for access control systems. Access control rule sets ideally translate these policies into a coherent and manageable collection of Allow/Deny rules. Designing rule sets that reflect desired ...
CASA: context-aware scalable authentication
We introduce context-aware scalable authentication (CASA) as a way of balancing security and usability for authentication. Our core idea is to choose an appropriate form of active authentication (e.g., typing a PIN) based on the combination of multiple ...
Retrospective privacy: managing longitudinal privacy in online social networks
Online social networks provide access to the user's information for long periods of time after the information's initial publication. In this paper, we investigate the relation between information aging and its sharing preferences on Facebook. Our ...
Confused Johnny: when automatic encryption leads to confusion and mistakes
A common approach to designing usable security is to hide as many security details as possible from the user to reduce the amount of information and actions a user must encounter. This paper gives an overview of Pwm (Private Webmail), our secure webmail ...
Your attention please: designing security-decision UIs to make genuine risks harder to ignore
- Cristian Bravo-Lillo,
- Saranga Komanduri,
- Lorrie Faith Cranor,
- Robert W. Reeder,
- Manya Sleeper,
- Julie Downs,
- Stuart Schechter
We designed and tested attractors for computer security dialogs: user-interface modifications used to draw users' attention to the most important information for making decisions. Some of these modifications were purely visual, while others temporarily ...
What matters to users?: factors that affect users' willingness to share information with online advertisers
- Pedro Giovanni Leon,
- Blase Ur,
- Yang Wang,
- Manya Sleeper,
- Rebecca Balebako,
- Richard Shay,
- Lujo Bauer,
- Mihai Christodorescu,
- Lorrie Faith Cranor
Much of the debate surrounding online behavioral advertising (OBA) has centered on how to provide users with notice and choice. An important element left unexplored is how advertising companies' privacy practices affect users' attitudes toward data ...
Do not embarrass: re-examining user concerns for online tracking and advertising
Recent studies have highlighted user concerns with respect to third-party tracking and online behavioral advertising (OBA) and the need for better consumer choice mechanisms to address these phenomena. We re-investigate the question of perceptions of ...
Sleights of privacy: framing, disclosures, and the limits of transparency
In an effort to address persistent consumer privacy concerns, policy makers and the data industry seem to have found common grounds in proposals that aim at making online privacy more "transparent." Such self-regulatory approaches rely on, among other ...
Modifying smartphone user locking behavior
With an increasing number of organizations allowing personal smart phones onto their networks, considerable security risk is introduced. The security risk is exacerbated by the tremendous heterogeneity of the personal mobile devices and their respective ...
Exploring the design space of graphical passwords on smartphones
Smartphones have emerged as a likely application area for graphical passwords, because they are easier to input on touchscreens than text passwords. Extensive research on graphical passwords and the capabilities of modern smartphones result in a complex ...
"Little brothers watching you": raising awareness of data leaks on smartphones
Today's smartphone applications expect users to make decisions about what information they are willing to share, but fail to provide sufficient feedback about which privacy-sensitive information is leaving the phone, as well as how frequently and with ...
On the ecological validity of a password study
The ecological validity of password studies is a complex topic and difficult to quantify. Most researchers who conduct password user studies try to address the issue in their study design. However, the methods researchers use to try to improve ...
Usability and security evaluation of GeoPass: a geographic location-password scheme
We design, implement, and evaluate GeoPass: an interface for digital map-based authentication where a user chooses a place as his or her password (i.e., a "location-password"). We conducted a multi-session in-lab/at-home user study to evaluate the ...
Memory retrieval and graphical passwords
Graphical passwords are an alternative form of authentication that use images for login, and leverage the picture superiority effect for good usability and memorability. Categories of graphical passwords have been distinguished on the basis of different ...
Cited By
- Shang S, Wang X and Liu A (2024). ABAC policy mining method based on hierarchical clustering and relationship extraction, Computers and Security, 139:C, Online publication date: 1-Apr-2024.
- Franzen D, Nuñez von Voigt S, Sörries P, Tschorsch F and Müller-Birn C Am I Private and If So, how Many? Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (1125-1139)
Index Terms
- Proceedings of the Ninth Symposium on Usable Privacy and Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SOUPS '09 | 49 | 15 | 31% |
Overall | 49 | 15 | 31% |