We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Users of online social networking communities are disclosing large amounts of personal information, putting themselves at a variety of risks. Our ongoing research investigates mec...
Heather Richter Lipford, Andrew Besmer, Jason Wats...
Discretization is used in click-based graphical passwords so that approximately correct entries can be accepted by the system. We show that the existing discretization scheme of B...
Sonia Chiasson, Jayakumar Srinivasan, Robert Biddl...
People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnogr...
Brinda Dalal, Les Nelson, Diana K. Smetters, Natha...
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Having decided to focus attention on the "weak link" of human fallibility, a growing number of security researchers are discovering the US Government's regulations ...
Instant messaging (IM) systems have gained a lot of popularity in recent years. The increasing number of IM users has lured malware authors to develop more worms and viruses that ...
Understanding the spammer behavior is a critical step in the long-lasting battle against email spams. Previous studies have focused on setting up honeypots or email sinkholes cont...
Abhinav Pathak, Y. Charlie Hu, Zhuoqing Morley Mao