Publications

Publications

2024

Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience.
Wilson, Ethan and Ibragimov, Azim and Proulx, Michael and Tetali, Sai Deep and Butler, Kevin and Jain, Eakta.
IEEE Transactions on Visualizations and Computer Graphics, 2024.

Sharenting on TikTok: Exploring Parental Sharing Behaviors and the Discourse Around Children’s Online Privacy.
Sophie Stephenson, Christopher Nathaniel Page, Miranda Wei, Apu Kapadia, and Franziska Roesner.
Conditionally accepted to the ACM Conference on Human Factors in Computing Systems (CHI), May 2024.

2023

Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable Device.
Christina Yeung, Umar Iqbal, Tadayoshi Kohno, and Franziska Roesner.
Equity and Access in Algorithms, Mechanisms, and Optimizations (EAAMO), October 2023.

A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design.
Mattea Sims, Kurt Hugenberg, Tadayoshi Kohno, and Franziska Roesner.
New Security Paradigms Workshop (NSPW) September 2023.

Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
K. Cheng, J.F. Tian, T. Kohno, and F. Roesner.
USENIX Security Symposium, August 2023.

The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate.
R. McAmis and T. Kohno.
USENIX Security Symposium, August 2023.

Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy.
Miranda Wei, Pardis Emami-Naeini, Franziska Roesner, and Tadayoshi Kohno.
43rd IEEE Symposium on Security and Privacy (Oakland), May 2023.

Online Advertising in Ukraine and Russia During the 2022 Russian Invasion.
Christina Yeung, Umar Iqbal, Yekaterina Tsipenyuk O’Neil, Tadayoshi Kohno and Franziska Roesner.
The Web Conference (WebConf), May 2023.

“There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment.
M. Wei, S. Consolvo, P.G. Kelley, T. Kohno, F. Roesner, and K. Thomas.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.

Understanding People’s Concerns and Attitudes Toward Smart Cities.
P. Emami-Naeini, J. Breda, W. Dai, T. Kohno, K. Laine, S. Patel, and F. Roesner.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.

How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance.
J. Stokes, T. August, R. Marver, A. Czeskis, F. Roesner, T. Kohno, and K. Reinecke.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.

Eliciting Security & Privacy-Informed Sharing Techniques for Multi-User Augmented Reality.
Shwetha Rajaram, Chen Chen, Franziska Roesner, and Michael Nebeling.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.

Power in Computer Security and Privacy: A Critical Lens.
E.M. Redmiles, M. Bennett, T. Kohno.
IEEE Security & Privacy Magazine, March/April 2023.

Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
C. Landwehr, M.K. Reiter, L. Williams, G. Tsudik, T. Jaeger, T. Kohno, A. Kapadia.
IEEE Security & Privacy Magazine, March/April 2023.

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.
T. Kohno, Y. Acar, and W. Loh.
USENIX Security Symposium, August 2023. Distinguished Paper Award.
Available at https://securityethics.cs.washington.edu.

Mary Jean Amon, Aaron Necaise, Nika Kartvelishvili, Aneka Williams, Yan Solihin, and Apu Kapadia,
Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media,
ACM Transactions on Computer-Human Interaction (ACM TOCHI),
Accepted (January 2023). (bibtex)(acm)

Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. A Privacy-Preserving Approach to Streaming Eye-Tracking Data. IEEE Transactions on Visualization and Computer Graphics, March 2023 (early access). 11 pages. Best paper nominee at IEEE VR 2023.

2022

Sabid Bin Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, and Adam J. Lee,
Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and ‘Trusted’ Platforms,”
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22) (November 2022). (bibtex)

Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, and Adam J. Lee,
Tangible Privacy for Smart Voice Assistants: Bystanders’ Perceptions of Physical Device Controls,
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22) (November 2022). (bibtex)

Sruti Bhagavatula, Lujo Bauer, and Apu Kapadia,
“Adulthood is trying each of the same six passwords that you use for everything”: The Scarcity and Ambiguity of Security Advice on Social Media,
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22) (November 2022). (bibtex)

Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships.
Miranda Wei, Eric Zeng, Tadayoshi Kohno, and Franziska Roesner.
18th Symposium on Usable Privacy and Security (SOUPS), (August 2022).

Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, and Kevin Butler. Analyzing the Monetization Ecosystem of Stalkerware. 22nd Privacy Enhancing Technologies Symposium (PETS 2022), Sydney, Australia, (July 2022).

Brendan David-John, Kevin Butler, and Eakta Jain. For Your Eyes Only: Privacy-Preserving Eye-Tracking Datasets. 14th ACM Symposium on Eye Tracking Research and Applications (ETRA 2022), Seattle, WA, USA, (June 2022).

Mary Jean Amon, Nika Kartvelishvili, Bennett I. Bertenthal, Kurt Hugenberg, and Apu Kapadia,
Sharenting and children’s privacy: Parenting style, practices, and perspectives on sharing young children’s photos on social media,
In Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22),
Vol. 6, Issue CSCW1, Article 116, 30 pages (April 2022).

Is the Avatar Scared? Pupil as a Perceptual Cue, Dong, Yuzhu and Joerg, Sophie and Jain, Eakta, Computer Animation and Virtual Worlds. 2022;e2040 (February 2022)

2021

Online Hazard Recognition Training: A Comparative Case Study of Static Images, Cinemagraphs, and Videos, Eiris, Ricardo and Jain, Eakta and Gheisari, Masoud and Wehle, Andrew, ASCE Journal of Construction Engineering and Management, 147(8): 04021082 (August 2021).

Security and Privacy for Augmented Reality: Our 10-Year Retrospective.
Franziska Roesner and Tadayoshi Kohno.
VR4Sec: 1st International Workshop on Security for XR and XR for Security (August 2021).

Fast Foveating Cameras for Dense Adaptive Resolution, Tilmon, B., Jain, E., Ferrari, S., & Koppal, S. J. (2021). IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PP (April 2021).

A Privacy-Preserving Approach to Streaming Eye-Tracking Data, David-John, Brendan and Hosfelt, Diane and Butler, Kevin and Jain, Eakta, IEEE Transactions on Visualization and Computer Graphics (TVCG 2021) Special Issue on IEEE VR. (p1-p12) Best Paper Nominee (March 2021).

Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. A Privacy-Preserving Approach to Streaming Eye-Tracking Data. IEEE Transactions on Visualization and Computer Graphics, March 2021 (early access). 11 pages. Best paper nominee at IEEE VR 2021.

2019

Grant Hernandez, Dave (Jing) Tian, Farhaan Fowze, Tuba Yavuz, Patrick Traynor, and Kevin Butler. Toward Automated Firmware Analysis in the IoT Era. IEEE Security and Privacy, 17(5), pages 38-46, Sept/Oct 2019.

Farhaan Fowze, Dave Tian, Grant Hernandez, Kevin Butler, and Tuba Yavuz. ProXray: Protocol Model Learning and Guided Firmware AnalysisIEEE Transactions on Software Engineering, August 2019. Accepted for publication. Selected for Journal-First presentation at ICSE’20.

Benchmark of Four Methods for Generating 360° Saliency Maps from Eye Tracking Data, John, Brendan and Le Meur, Olivier and Jain, Eakta, International Journal of Semantic Computing 13.03, September 2019.

Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Patrick Traynor, and Kevin Butler. Examining DES-based Cipher Suite Support within the TLS Ecosystem. 14th ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Auckland, New Zealand, July 2019.

Jasmine Bowers, Imani Sherman, Kevin Butler, and Patrick Traynor. Characterizing Security and Privacy Practices in Emerging Digital Credit Applications. 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’19), Miami, FL, USA, May 2019.

Joseph Choi and Kevin Butler. Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Security and Communication Networks, 2019, Article ID 1368905, 28 pages, April 2019.

2018

Benjamin Mood and Kevin Butler. PAL: A Pseudo Assembly Language for Optimizing Secure Function Evaluation in Mobile Devices. Journal of Information Security and Applications, 40, pg. 78-91, (June 2018).

Almaraz, S. M., Hugenberg, K. & Young, S. G. (2018). Perceiving sophisticated minds influences perceptual individuation. Personality and Social Psychology Bulletin, 44, 143-157. February 2018.

2017

Deska, J. D., & Hugenberg, K. . (2017). The face-mind link: Why we see minds behind faces, and how others’ minds change how we see their faces. Social & Personality Psychology Compass, 11, e12361. December 2017.

Cassidy, B. S., Krendl, A. C., Stanko, K. A., Rydell, R. J., Hugenberg, K., & Young, S. G. (2017). Configural face processing impacts race disparities in humanization and trust. Journal of Experimental Social Psychology, 73, 111-124. (November 2017).

P. Traynor, K. Butler, J. Bowers, B. Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services, IEEE S&P Magazine, 15:5, p. 85-89, October 2017.

Patrick Traynor, Kevin Butler, Jasmine Bowers, and Bradley Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Security and Privacy, 15(5), pg. 85-89, Sept./Oct. 2017.

Dave (Jing) Tian, Kevin R. B. Butler, Joseph Choi, Patrick D. McDaniel, and Padma Krishnaswamy. Securing ARP/NDP From the Ground Up. IEEE Transactions on Information Forensics and Security, 12(0), pg. 2131-2143, September 2017.

Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, and Trent Jaeger. Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Transactions on Internet Technology, 17(4), Article 34, September 2017.

Lloyd, E. P., Hugenberg, K., McConnell, A. R., Kunstman, J. W., & Deska, J. C. (2017). Black and White lies: Race-based biases in deception judgments. Psychological Science, 28, 1125-1136. August 2017.

B. Reaves, J. Bowers, N. Scaife, A. Bates, A. Bharatiya, P. Traynor, and K. Butler. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World, ACM Transactions on Privacy and Security (TOPS), August 2017.

Wilson, J. P., Hugenberg, K., & Rule, N. (2017). Racial bias in judgments of Physical size and formidability: From size to threat. Journal of Personality and Social Psychology, 113, 59-80. July 2017.

S. Heuser, B. Reaves, P. Kumar Pendyala, H. Carter, A. Dmitrienko, W. Enck, N. Kiyavash, A. Sadeghi, and P. Traynor. Phonion: Practical Protection of Metadata in Telephony Networks, Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017.

Creating Segments and Effects on Comics by Clustering Gaze Data, Thirunarayanan, Ishwarya and Khetarpal, Khimya and Koppal, Sanjeev and Le Meur, Olivier and Shea, John and Jain, Eakta, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) May 2017.

H. Carter and P. Traynor. OPFE: Outsourcing Computation for Private Function Evaluation, International Journal of Information and Computer Security (IJICS), January 2017.

Kawakami, K., Amodio, D. M., & Hugenberg, K. (2017). Intergroup perception and cognition: An integrative framework for understanding the causes and consequences of social categorization. In J. M. Olson (Ed.), Advances in Experimental Social Psychology, Vol. 55, pp. 1-80. January 2017.

2016

B. Reaves, J. Bowers, S. A. Gorski III, O. Anise, R. Bobhate, R. Cho, H. Das, S. Hussain, H. Karachiwala, N. Scaife, B. Wright, K. Butler, W. Enck, and P. Traynor. *droid: Assessment and Evaluation of Android Application Analysis Tools, ACM Computing Surveys (CSUR), October 2016. 

H. Carter, B. Mood, P. Traynor and K. Butler, Outsourcing Secure Two-Party Computation as a Black Box, Journal of Security and Communication Networks (SCN), September 2016.

C. Amrutkar, Y. Kim and P. Traynor, Detecting Mobile Malicious Webpages in Real Time, IEEE Transactions on Mobile Computing (TMC), June 2016.

H. Carter, B. Mood, P. Traynor, and K. Butler. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. Journal of Computer Security (JCS), 24(2):137-180, January 2016.