Skip to main content

2025


  • Analyzing the AI Nudification Application Ecosystem
    Authors: Cassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna Crowder, Kevin Butler, Patrick Traynor, Elissa M. Redmiles, and Tadayoshi Kohno.
    Published: Proceedings of the 34th USENIX Security Symposium (Security’25), Seattle, WA, USA, August 2025. (bibtex)
  • To Reveal or Conceal: Privacy and Marginalization in Avatars
    Authors: Mattea Sim, Basia Radka, Emi Yoshikawa, Franziska Roesner, Kurt Hugenberg, and Tadayoshi Kohno.
    Published: Proceedings of the 25th Privacy Enhancing Security Technologies Symposium (PETS 2025), Washington, DC, USA, July 2025.
  • Data to Infinity and Beyond: Examining Data Sharing and Usage Practices in the Computer Security Community
    Authors:
    Anna Crowder, Allison Lu, Kevin Childs, Carson Stillman, Patrick Traynor, and Kevin Butler.
    Published: Proceedings of the 46th IEEE Symposium on Security and Privacy (S&P 2025), San Francisco, CA, USA, May 2025.
  • You Have to Ignore the Dangers”: User Perceptions of the Security and Privacy Benefits of WhatsApp Mods
    Authors: Collins W. Munyendo, Kentrell Owens, Faith Strong, Shaoqi Wang, Adam J. Aviv, Tadayoshi Kohno, and Franziska Roesner.
    Published: Proceedings of the 46th IEEE Symposium on Security and Privacy (S&P 2025), San Francisco, CA, USA, May 2025.
  • Coach, Data Analyst, and Protector: Exploring Data Practices of Collegiate Sports Coaching Staff
    Authors: Mollie Brewer, Kevin Childs, Spencer Thomas, Celeste Wilkins, Kristy Elizabeth Boyer, Jennifer A. Nichols, Kevin Butler, Garrett F. Beatty, and Daniel P. Ferris.
    Published: Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (CHI’25), Yokohama, Japan, April 2025. (bibtex)
  • Teachers’ Perspectives on Student Generation of Synthetic Nonconsensual Explicit Imagery
    Authors: Miranda Wei, Christina Yeung, Tadayoshi Kohno, and Franziska Roesner.
    Published: Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (CHI’25), Yokohama, Japan, April 2025. (bibtex)
  • Characterizing the Impact of Audio Deepfakes in the Presence of Cochlear Implant Simulated Audio
    Authors: Magdalena Pasternak, Kevin Warren, Daniel Olszewski, Susan Nittrouer, Patrick Traynor, and Kevin Butler.
    Published: Proceedings of the ISOC Symposium on Network and Distributed System Security (NDSS), San Diego, CA, USA, February 2025. (bibtex)

2024



2023