University of Florida
Dr. Kevin Butler
Professor, Director of the Florida Institute for Cybersecurity (FICS) Research, Computer & Information Science & Engineering (CISE)
2021
Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. A Privacy-Preserving Approach to Streaming Eye-Tracking Data. IEEE Transactions on Visualization and Computer Graphics, March 2021 (early access). 11 pages. Best paper nominee at IEEE VR 2021.
2019
Farhaan Fowze, Dave Tian, Grant Hernandez, Kevin Butler, and Tuba Yavuz. ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Transactions on Software Engineering, August 2019. Accepted for publication. Selected for Journal-First presentation at ICSE’20.
Grant Hernandez, Dave (Jing) Tian, Farhaan Fowze, Tuba Yavuz, Patrick Traynor, and Kevin Butler. Toward Automated Firmware Analysis in the IoT Era. IEEE Security and Privacy, 17(5), pages 38-46, Sept/Oct 2019.
Joseph Choi and Kevin Butler. Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Security and Communication Networks, 2019, Article ID 1368905, 28 pages, April 2019.
2018
Benjamin Mood and Kevin Butler. PAL: A Pseudo Assembly Language for Optimizing Secure Function Evaluation in Mobile Devices. Journal of Information Security and Applications, 40, pg. 78-91, Jun. 2018.
2017
Patrick Traynor, Kevin Butler, Jasmine Bowers, and Bradley Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Security and Privacy, 15(5), pg. 85-89, Sept./Oct. 2017.
Dave (Jing) Tian, Kevin R. B. Butler, Joseph Choi, Patrick D. McDaniel, and Padma Krishnaswamy. Securing ARP/NDP From the Ground Up. IEEE Transactions on Information Forensics and Security, 12(0), pg. 2131-2143, September 2017.
Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, and Trent Jaeger. Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Transactions on Internet Technology, 17(4), Article 34, September 2017.
Dr. Ekta Jain
Associate Professor, CISE
Is the Avatar Scared? Pupil as a Perceptual Cue, Dong, Yuzhu and Joerg, Sophie and Jain, Eakta, Computer Animation and Virtual Worlds. 2022;e2040
Online Hazard Recognition Training: A Comparative Case Study of Static Images, Cinemagraphs, and Videos, Eiris, Ricardo and Jain, Eakta and Gheisari, Masoud and Wehle, Andrew, ASCE Journal of Construction Engineering and Management, 147(8): 04021082
Fast Foveating Cameras for Dense Adaptive Resolution, Tilmon, B., Jain, E., Ferrari, S., & Koppal, S. J. (2021). IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PP.
A Privacy-Preserving Approach to Streaming Eye-Tracking Data, David-John, Brendan and Hosfelt, Diane and Butler, Kevin and Jain, Eakta, IEEE Transactions on Visualization and Computer Graphics (TVCG 2021) Special Issue on IEEE VR. (p1-p12) Best Paper Nominee.
Benchmark of Four Methods for Generating 360° Saliency Maps from Eye Tracking Data, John, Brendan and Le Meur, Olivier and Jain, Eakta, International Journal of Semantic Computing 13.03
Creating Segments and Effects on Comics by Clustering Gaze Data, Thirunarayanan, Ishwarya and Khetarpal, Khimya and Koppal, Sanjeev and Le Meur, Olivier and Shea, John and Jain, Eakta, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM).
Dr. Patrick Traynor
Professor, John H. and Mary Lou Dasburg Preeminent Chair in Engineering, Associate Chair for Research, CISE
2017
P. Traynor, K. Butler, J. Bowers, B. Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services, IEEE S&P Magazine, 15:5, p. 85-89, 2017.
B. Reaves, J. Bowers, N. Scaife, A. Bates, A. Bharatiya, P. Traynor, and K. Butler. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World, ACM Transactions on Privacy and Seurity (TOPS), 2017.
H. Carter and P. Traynor. OPFE: Outsourcing Computation for Private Function Evaluation, International Journal of Information and Computer Security (IJICS), 2017.
S. Heuser, B. Reaves, P. Kumar Pendyala, H. Carter, A. Dmitrienko, W. Enck, N. Kiyavash, A. Sadeghi, and P. Traynor. Phonion: Practical Protection of Metadata in Telephony Networks, Proceedings on Privacy Enhancing Technologies (PoPETs), 2017.
2016
B. Reaves, J. Bowers, S. A. Gorski III, O. Anise, R. Bobhate, R. Cho, H. Das, S. Hussain, H. Karachiwala, N. Scaife, B. Wright, K. Butler, W. Enck, and P. Traynor. *droid: Assessment and Evaluation of Android Application Analysis Tools, ACM Computing Surveys (CSUR), 2016.
C. Amrutkar, Y. Kim and P. Traynor, Detecting Mobile Malicious Webpages in Real Time, IEEE Transactions on Mobile Computing (TMC), To appear 2016.
H. Carter, B. Mood, P. Traynor and K. Butler, Outsourcing Secure Two-Party Computation as a Black Box, Journal of Security and Communication Networks (SCN), To Appear 2016.
H. Carter, B. Mood, P. Traynor, and K. Butler. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. Journal of Computer Security (JCS), 24(2):137-180, 2016.
Indiana University, Bloomington
Dr. Kurt Hugenberg
Professor, (UI), Department of Psychological & Brain Sciences
2018
- Almaraz, S. M., Hugenberg, K. & Young, S. G. (2018). Perceiving sophisticated minds influences perceptual individuation. Personality and Social Psychology Bulletin, 44, 143-157.
2017
- Cassidy, B. S., Krendl, A. C., Stanko, K. A., Rydell, R. J., Hugenberg, K., & Young, S. G. (2017). Configural face processing impacts race disparities in humanization and trust. Journal of Experimental Social Psychology, 73, 111-124.
- Deska, J. D., & Hugenberg, K. . (2017). The face-mind link: Why we see minds behind faces, and how others’ minds change how we see their faces. Social & Personality Psychology Compass, 11, e12361.
- Kawakami, K., Amodio, D. M., & Hugenberg, K. (2017). Intergroup perception and cognition: An integrative framework for understanding the causes and consequences of social categorization. In J. M. Olson (Ed.), Advances in Experimental Social Psychology, Vol. 55, pp. 1-80.
- Lloyd, E. P., Hugenberg, K., McConnell, A. R., Kunstman, J. W., & Deska, J. C. (2017). Black and White lies: Race-based biases in deception judgments. Psychological Science, 28, 1125-1136.
- Wilson, J. P., Hugenberg, K., & Rule, N. (2017). Racial bias in judgments of Physical size and formidability: From size to threat. Journal of Personality and Social Psychology, 113, 59-80.
Dr. Apu Kapadia
Professor, Director & Chair, Cybersecurity Risk Program, Indiana University Bloomington (UI), Luddy School of Informatics, Computing & Engineering
2023
- Mary Jean Amon, Aaron Necaise, Nika Kartvelishvili, Aneka Williams, Yan Solihin, and Apu Kapadia,
“Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media,”
ACM Transactions on Computer-Human Interaction (ACM TOCHI),
Accepted (January 2023).2022
- Sruti Bhagavatula, Lujo Bauer, and Apu Kapadia,
“Adulthood is trying each of the same six passwords that you use for everything”: The Scarcity and Ambiguity of Security Advice on Social Media,
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22).(bibtex) - Sabid Bin Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, and Adam J. Lee,
“Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and ‘Trusted’ Platforms,”
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22).(bibtex) - Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, and Adam J. Lee,
“Tangible Privacy for Smart Voice Assistants: Bystanders’ Perceptions of Physical Device Controls,”
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22). (bibtex) - Mary Jean Amon, Nika Kartvelishvili, Bennett I. Bertenthal, Kurt Hugenberg, and Apu Kapadia,
“Sharenting and children’s privacy: Parenting style, practices, and perspectives on sharing young children’s photos on social media,”
In Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22),
Vol. 6, Issue CSCW1, Article 116, 30 pages (April 2022).
Max Planck Institute
Dr. Elissa Redmiles
Consultant, Faculty Member & Research Group Leader, Max Planck Institute for Software Systems
University of Washington
Dr. Yoshi Kohno
Professor, University of Washington (UW), Paul G. Allen School of Computer Science & Engineering
2023
- Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
K. Cheng, J.F. Tian, T. Kohno, and F. Roesner.
USENIX Security Symposium, August 2023. - The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate.
R. McAmis and T. Kohno.
USENIX Security Symposium, August 2023. - Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy.
M. Wei, P. Emami-Naeini, F. Roesner, and T. Kohno.
IEEE Symposium on Security and Privacy, May 2023. - “There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment.
M. Wei, S. Consolvo, P.G. Kelley, T. Kohno, F. Roesner, and K. Thomas.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023. - Understanding People’s Concerns and Attitudes Toward Smart Cities.
P. Emami-Naeini, J. Breda, W. Dai, T. Kohno, K. Laine, S. Patel, and F. Roesner.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023. - How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance.
J. Stokes, T. August, R. Marver, A. Czeskis, F. Roesner, T. Kohno, and K. Reinecke.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023. - Power in Computer Security and Privacy: A Critical Lens.
E.M. Redmiles, M. Bennett, T. Kohno.
IEEE Security & Privacy Magazine, March/April 2023. - Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
C. Landwehr, M.K. Reiter, L. Williams, G. Tsudik, T. Jaeger, T. Kohno, A. Kapadia.
IEEE Security & Privacy Magazine, March/April 2023. - Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.
T. Kohno, Y. Acar, and W. Loh.
Available at https://securityethics.cs.washington.edu, February 2023.
Dr. Franzi Roesner
Associate Professor, UW, Paul G. Allen School of Computer Science & Engineering, Co-director of the Security & Research Privacy Lab
2023
- Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, and Franziska Roesner.
32nd USENIX Security Symposium, August 2023. - Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy.
Miranda Wei, Pardis Emami-Naeini, Franziska Roesner, and Tadayoshi Kohno.
43rd IEEE Symposium on Security and Privacy (Oakland), May 2023. - Online Advertising in Ukraine and Russia During the 2022 Russian Invasion.
Christina Yeung, Umar Iqbal, Yekaterina Tsipenyuk O’Neil, Tadayoshi Kohno and Franziska Roesner.
The Web Conference (WebConf), May 2023.
Spotlight Paper. - “There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment.
Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, and Kurt Thomas.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023. - Eliciting Security & Privacy-Informed Sharing Techniques for Multi-User Augmented Reality.
Shwetha Rajaram, Chen Chen, Franziska Roesner, and Michael Nebeling.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.
2022
- Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships.
Miranda Wei, Eric Zeng, Tadayoshi Kohno, and Franziska Roesner.
18th Symposium on Usable Privacy and Security (SOUPS), August 2022.
2021
- Security and Privacy for Augmented Reality: Our 10-Year Retrospective.
Franziska Roesner and Tadayoshi Kohno.
VR4Sec: 1st International Workshop on Security for XR and XR for Security, August 2021.