2024
- “I Had Sort of a Sense That I Was Always Being Watched…Since I Was”: Examining Interpersonal Discomfort From Continuous Location-Sharing Applications.
Kevin Childs, Cassidy Gibson, Anna Crowder, Kevin Warren, Carson Stillman, Elissa M. Redmiles, Eakta Jain, Patrick Traynor, and Kevin Butler. In Proceedings of the 31th ACM Conference on Computer and Communications Security (CCS’24), Salt Lake City, UT, USA. October 2024.
- SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors.
Miranda Wei, Jaron Mink, Yael Eiger and Tadayoshi Kohno, Elissa M. Redmiles, and Franziska Roesner.
August 2024.
- “Did They F***ing Consent to That?”: Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse.
Lucy Qin, Vaughn Hamilton, Sharon Wang, Yigit Aydinalp, Marin Scarlett, and Elissa M. Redmiles. In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA, 55-72. August 2024.
- “Violation of my body:” Perceptions of AI-generated non-consensual (intimate) imagery.
Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, and Elissa M. Redmiles.In the Proceedings of the 20th Symposium on Usable Privacy and Security, 372-392 August 2024.
- “I feel physically safe but not politically safe”: Understanding the Digital Threats and Safety Practices of {OnlyFans} Creators.
Ananta Soneji, Vaughn Hamilton, Adam Doupé, Allison McDonald, and Elissa M. Redmiles. In Proceedings of the 32nd USENIX Security Symposium, Philadelphia, PA, USA, 1-18. August 2024.
- It’s Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias.
Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang. In Proceedings of the CHI Conference on Human Factors in Computing Systems, 1-20. May 2024.
- Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience..
Ethan Wilson, Azim Ibragimov, Michael J. Proulx, Sai Deep Tetali, Kevin Butler, Eakta Jain IEEE Transactions on Visualization and Computer Graphics. March 2024.
2023
- Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable.
Christina Yeung, Umar Iqbal, Tadayoshi Kohno, Franziska Roesner. Proceedings of the 3rd ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization, 1-12. October 2023.
- A scalable inclusive security intervention to center marginalized & vulnerable populations in Security & Privacy design.
M. Sims, K. Hugenberg, T. Kohno, and F. Roesner. Proceedings of the 2023 New Security Paradigms Workshop, 102-115. September 2023.
- Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
K. Cheng, J.F. Tian, T. Kohno, and F. Roesner.
USENIX Security Symposium, August 2023.
- The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate.
R. McAmis and T. Kohno.
USENIX Security Symposium, August 2023.
- Skilled or Gullible? Gender Stereotypes Related to Computer Security and Privacy.
Miranda Wei, Pardis Emami-Naeini, Franziska Roesner, and Tadayoshi Kohno.
43rd IEEE Symposium on Security and Privacy (Oakland), May 2023.
- Online Advertising in Ukraine and Russia During the 2022 Russian Invasion.
Christina Yeung, Umar Iqbal, Yekaterina Tsipenyuk O’Neil, Tadayoshi Kohno and Franziska Roesner.
The Web Conference (WebConf), May 2023.
- “There’s so much responsibility on users right now:” Expert Advice for Staying Safer From Hate and Harassment.
M. Wei, S. Consolvo, P.G. Kelley, T. Kohno, F. Roesner, and K. Thomas.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.
- Understanding People’s Concerns and Attitudes Toward Smart Cities.
P. Emami-Naeini, J. Breda, W. Dai, T. Kohno, K. Laine, S. Patel, and F. Roesner.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.
- How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance.
J. Stokes, T. August, R. Marver, A. Czeskis, F. Roesner, T. Kohno, and K. Reinecke.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.
- Eliciting Security & Privacy-Informed Sharing Techniques for Multi-User Augmented Reality.
Shwetha Rajaram, Chen Chen, Franziska Roesner, and Michael Nebeling.
ACM Conference on Human Factors in Computing Systems (CHI), April 2023.
- Power in Computer Security and Privacy: A Critical Lens.
E.M. Redmiles, M. Bennett, T. Kohno.
IEEE Security & Privacy Magazine, March/April 2023.
- Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
C. Landwehr, M.K. Reiter, L. Williams, G. Tsudik, T. Jaeger, T. Kohno, A. Kapadia.
IEEE Security & Privacy Magazine, March/April 2023.
- Give me some room please! Personal space bubbles for safety and performance.
K. LaRubbio, E. Wilson, S. Koppal, S. Jörg, & E. Jain. IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), 897-898. March 2023.
- Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations.
T. Kohno, Y. Acar, and W. Loh.
USENIX Security Symposium, August 2023. Distinguished Paper Award.
Available at https://securityethics.cs.washington.edu.
- Mary Jean Amon, Aaron Necaise, Nika Kartvelishvili, Aneka Williams, Yan Solihin, and Apu Kapadia,
“Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media,“
ACM Transactions on Computer-Human Interaction (ACM TOCHI),
Accepted (January 2023). (bibtex)(acm)
- Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. A Privacy-Preserving Approach to Streaming Eye-Tracking Data. IEEE Transactions on Visualization and Computer Graphics, March 2023 (early access). 11 pages. Best paper nominee at IEEE VR 2023.
2022
- Sabid Bin Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, and Adam J. Lee,
“Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and ‘Trusted’ Platforms,”
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22) (November 2022). (bibtex)
- Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, and Adam J. Lee,
“Tangible Privacy for Smart Voice Assistants: Bystanders’ Perceptions of Physical Device Controls,“
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22) (November 2022). (bibtex)
- Sruti Bhagavatula, Lujo Bauer, and Apu Kapadia,
“Adulthood is trying each of the same six passwords that you use for everything”: The Scarcity and Ambiguity of Security Advice on Social Media,
To appear in Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22) (November 2022). (bibtex)
- Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships.
Miranda Wei, Eric Zeng, Tadayoshi Kohno, and Franziska Roesner.
18th Symposium on Usable Privacy and Security (SOUPS), (August 2022).
- Cassidy Gibson, Vanessa Frost, Katie Platt, Washington Garcia, Luis Vargas, Sara Rampazzi, Vincent Bindschaedler, Patrick Traynor, and Kevin Butler. Analyzing the Monetization Ecosystem of Stalkerware. 22nd Privacy Enhancing Technologies Symposium (PETS 2022), Sydney, Australia, (July 2022).
- Brendan David-John, Kevin Butler, and Eakta Jain. For Your Eyes Only: Privacy-Preserving Eye-Tracking Datasets. 14th ACM Symposium on Eye Tracking Research and Applications (ETRA 2022), Seattle, WA, USA, (June 2022).
- Mary Jean Amon, Nika Kartvelishvili, Bennett I. Bertenthal, Kurt Hugenberg, and Apu Kapadia,
“Sharenting and children’s privacy: Parenting style, practices, and perspectives on sharing young children’s photos on social media,“
In Proceedings of the ACM Journal: Human-Computer Interaction: Computer Supported Cooperative Work and Social Computing (PACM ’22/CSCW ’22),
Vol. 6, Issue CSCW1, Article 116, 30 pages (April 2022).
- Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems H. Abdullah, A. Karlekar, S. Prasad, M. Rahman, L. Blue, L. A. Bauer, V. Bindschaedler, and P. Traynor arXiv preprint arXiv:2203.05408 2022;e2040 (March 2022)
- Is the Avatar Scared? Pupil as a Perceptual Cue, Dong, Yuzhu and Joerg, Sophie and Jain, Eakta, Computer Animation and Virtual Worlds. 2022;e2040 (February 2022)
2021
- Online Hazard Recognition Training: A Comparative Case Study of Static Images, Cinemagraphs, and Videos, Eiris, Ricardo and Jain, Eakta and Gheisari, Masoud and Wehle, Andrew, ASCE Journal of Construction Engineering and Management, 147(8): 04021082 (August 2021).
- Security and Privacy for Augmented Reality: Our 10-Year Retrospective.
Franziska Roesner and Tadayoshi Kohno.
VR4Sec: 1st International Workshop on Security for XR and XR for Security (August 2021).
- Fast Foveating Cameras for Dense Adaptive Resolution, Tilmon, B., Jain, E., Ferrari, S., & Koppal, S. J. (2021). IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PP (April 2021).
- A Privacy-Preserving Approach to Streaming Eye-Tracking Data, David-John, Brendan and Hosfelt, Diane and Butler, Kevin and Jain, Eakta, IEEE Transactions on Visualization and Computer Graphics (TVCG 2021) Special Issue on IEEE VR. (p1-p12) Best Paper Nominee (March 2021).
- Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. A Privacy-Preserving Approach to Streaming Eye-Tracking Data. IEEE Transactions on Visualization and Computer Graphics, March 2021 (early access). 11 pages. Best paper nominee at IEEE VR 2021.
2019
- Grant Hernandez, Dave (Jing) Tian, Farhaan Fowze, Tuba Yavuz, Patrick Traynor, and Kevin Butler. Toward Automated Firmware Analysis in the IoT Era. IEEE Security and Privacy, 17(5), pages 38-46, Sept/Oct 2019.
- Farhaan Fowze, Dave Tian, Grant Hernandez, Kevin Butler, and Tuba Yavuz. ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Transactions on Software Engineering, August 2019. Accepted for publication. Selected for Journal-First presentation at ICSE’20.
- Benchmark of Four Methods for Generating 360° Saliency Maps from Eye Tracking Data, John, Brendan and Le Meur, Olivier and Jain, Eakta, International Journal of Semantic Computing 13.03, September 2019.
- Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Patrick Traynor, and Kevin Butler. Examining DES-based Cipher Suite Support within the TLS Ecosystem. 14th ACM ASIA Conference on Computer and Communications Security (ASIACCS’19), Auckland, New Zealand, July 2019.
- Jasmine Bowers, Imani Sherman, Kevin Butler, and Patrick Traynor. Characterizing Security and Privacy Practices in Emerging Digital Credit Applications. 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’19), Miami, FL, USA, May 2019.
- Joseph Choi and Kevin Butler. Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities. Security and Communication Networks, 2019, Article ID 1368905, 28 pages, April 2019.
2018
- Benjamin Mood and Kevin Butler. PAL: A Pseudo Assembly Language for Optimizing Secure Function Evaluation in Mobile Devices. Journal of Information Security and Applications, 40, pg. 78-91, (June 2018).
- Almaraz, S. M., Hugenberg, K. & Young, S. G. (2018). Perceiving sophisticated minds influences perceptual individuation. Personality and Social Psychology Bulletin, 44, 143-157. February 2018.
2017
- Deska, J. D., & Hugenberg, K. . (2017). The face-mind link: Why we see minds behind faces, and how others’ minds change how we see their faces. Social & Personality Psychology Compass, 11, e12361. December 2017.
- Cassidy, B. S., Krendl, A. C., Stanko, K. A., Rydell, R. J., Hugenberg, K., & Young, S. G. (2017). Configural face processing impacts race disparities in humanization and trust. Journal of Experimental Social Psychology, 73, 111-124. (November 2017).
- P. Traynor, K. Butler, J. Bowers, B. Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services, IEEE S&P Magazine, 15:5, p. 85-89, October 2017.
- Patrick Traynor, Kevin Butler, Jasmine Bowers, and Bradley Reaves. FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Security and Privacy, 15(5), pg. 85-89, Sept./Oct. 2017.
- Dave (Jing) Tian, Kevin R. B. Butler, Joseph Choi, Patrick D. McDaniel, and Padma Krishnaswamy. Securing ARP/NDP From the Ground Up. IEEE Transactions on Information Forensics and Security, 12(0), pg. 2131-2143, September 2017.
- Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, and Trent Jaeger. Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Transactions on Internet Technology, 17(4), Article 34, September 2017.
- Lloyd, E. P., Hugenberg, K., McConnell, A. R., Kunstman, J. W., & Deska, J. C. (2017). Black and White lies: Race-based biases in deception judgments. Psychological Science, 28, 1125-1136. August 2017.
- B. Reaves, J. Bowers, N. Scaife, A. Bates, A. Bharatiya, P. Traynor, and K. Butler. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World, ACM Transactions on Privacy and Security (TOPS), August 2017.
- Wilson, J. P., Hugenberg, K., & Rule, N. (2017). Racial bias in judgments of Physical size and formidability: From size to threat. Journal of Personality and Social Psychology, 113, 59-80. July 2017.
- S. Heuser, B. Reaves, P. Kumar Pendyala, H. Carter, A. Dmitrienko, W. Enck, N. Kiyavash, A. Sadeghi, and P. Traynor. Phonion: Practical Protection of Metadata in Telephony Networks, Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017.
- Creating Segments and Effects on Comics by Clustering Gaze Data, Thirunarayanan, Ishwarya and Khetarpal, Khimya and Koppal, Sanjeev and Le Meur, Olivier and Shea, John and Jain, Eakta, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) May 2017.
- H. Carter and P. Traynor. OPFE: Outsourcing Computation for Private Function Evaluation, International Journal of Information and Computer Security (IJICS), January 2017.
- Kawakami, K., Amodio, D. M., & Hugenberg, K. (2017). Intergroup perception and cognition: An integrative framework for understanding the causes and consequences of social categorization. In J. M. Olson (Ed.), Advances in Experimental Social Psychology, Vol. 55, pp. 1-80. January 2017.
2016
- B. Reaves, J. Bowers, S. A. Gorski III, O. Anise, R. Bobhate, R. Cho, H. Das, S. Hussain, H. Karachiwala, N. Scaife, B. Wright, K. Butler, W. Enck, and P. Traynor. *droid: Assessment and Evaluation of Android Application Analysis Tools, ACM Computing Surveys (CSUR), October 2016.
- H. Carter, B. Mood, P. Traynor and K. Butler, Outsourcing Secure Two-Party Computation as a Black Box, Journal of Security and Communication Networks (SCN), September 2016.
- C. Amrutkar, Y. Kim and P. Traynor, Detecting Mobile Malicious Webpages in Real Time, IEEE Transactions on Mobile Computing (TMC), June 2016.
- H. Carter, B. Mood, P. Traynor, and K. Butler. Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. Journal of Computer Security (JCS), 24(2):137-180, January 2016.