sponsors
usenix conference policies
Poster Session
The following posters will be presented during the SOUPS 2016 Poster Session and Happy Hour on Wednesday, June 22, from 5:15 pm–7:00 pm in Colorado Ballroom A–E.
A Privacy Case Study: Google+ and Profiles
Shiqian Xu, Qian Liu, Feifei Wang, Neng Jiang, and Jessica Staddon, North Carolina State University
Poster description PDF
A Body of Knowledge for Usable Security and Privacy Education
Heather Lipford and Yousra Javed, University of North Carolina at Charlotte
Poster description PDF
Psychological Need Fulfillment for Mobile Security and Privacy Actions: A Preliminary Investigation
Lydia Kraus, Ina Wechsung, and Sebastian Möller, Technische Universität Berlin
Poster description PDF
Refining Graphical Password Strength Meters for Android Phones
Susanna Heidt and Adam J.Aviv, United States Naval Academy
Poster description PDF
Crowdsourcing Annotations of Websites' Privacy Policies: Can It Really Work?
Shomir Wilson, Florian Schaub, Rohan Ramanath, and Norman Sadeh, Carnegie Mellon University; Fei Liu, University of Central Floria; Noah Smith, University of Washington; Frederick Liu, Carnegie Mellon University
Poster description PDF
Evaluating Smartphone Authentication Schemes with Older Adults
Hassan Khan, Kelly Grindrod, Urs Hengartner, and Daniel Vogel, University of Waterloo
Poster description PDF
Towards Non-Observable Authentication for Mobile Devices
Flynn Wolf and Ravi Kuber, University of Maryland, Baltimore County; Adam J. Aviv, United States Naval Academy
Poster description PDF
The Sounds of Cyber Threats
Akbar Siami Namin, Rattikorn Hewett, Keith S. Jones, and Rona Pogrund, Texas Tech University
Distinguished Poster Award!
Poster description PDF
"I’m Stuck, Too!" Revisiting Difficulties of Using Web Authentication Mechanisms for Visually Impaired Person
Yuya Ota, Waseda University; Akira Kanaoka, Toho University; Tatsuya Mori, Waseda University
Poster description PDF
The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps
Hamza Harkous, Rameez Rahman, Bojan Karlas, and Karl Aberer, École Polytechnique Fédérale de Lausanne (EPFL)
Distinguished Poster Award!
Poster description
Rotate to Protect
Harshal Tupsamudre, Akhil Dixit, Vijayanand Banahatti, Sachin Lodha, and Manish Shukla, TCS Research
Poster description PDF
Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US
Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang, Syracuse University
Poster description
Towards an Interactive Privacy Pattern Catalog
Olha Drozd, Sabrian Kirrane, and Sarah Spiekermann, Vienna University of Economics and Business
Poster description PDF
More Skilled Internet Users Behave (A Little) More Securely
Elissa M. Redmiles, Shelby Silverstein, Wei Bai, and Michelle L. Mazurek, University of Maryland
Poster description PDF
You Get Where You're Looking For: The Impact of Information Sources on Code Security
Yasemin Acar, Michael Backes, and Sascha Fahl, Saarland University; Doowon Kim and Michelle L. Mazurek, University of Maryland; Christian Stransky, Saarland University
Poster description PDF
Developers Are Users Too: Helping Developers Write Privacy Preserving and Secure (Android) Code
Duc Cuong Nguyen, Saarland University; Yasemin Acar, Sascha Fahl, and Michael Backes, Saarland University
Poster description PDF
Risk Compensation in Home-User Computer Security Behavior: A Mixed-Methods Exploratory Study
Sarah Pearman, Arnab Kumar, Nicholas Munson, Charu Sharma, Leeyat Slyper, Lujo Bauer, and Nicolas Christin, Carnegie Mellon University; Serge Egelman, International Computer Science Institute and University of California, Berkeley
Distinguished Poster Award!
Poster description PDF
Visualization and Interactive Exploration of Data Practices in Privacy Policies
Sushain K. Cherivirala, Florian Schaub, Mads Schaarup, Shomir Wilson, and Norman Sadeh, Carnegie Mellon University; Joel R. Reidenberg, Fordham University
Poster description PDF
Improving Password Memorability and Strength Using Mangling Rules
Sanam Ghorbani Lyastani, Saarland University; Yasemin Acar, Michael Backes, and Sascha Fahl, Saarland University
Poster description PDF
Toward a Security Behavior Intentions Scale Robust to Linguistic Differences
Yukiko Sawaya, KDDI R&D Laboratories, Inc.; Mahmood Sharif and Nicolas Christin, Carnegie Mellon University; Ayumu Kubota, Akihiro Nakarai, and Akira Yamada, KDDI R&D Laboratories, Inc.
Poster description PDF
Secure Contexts: Context-Dependent, Dynamic, and Adaptive Security and Privacy
Raghav V. Sampangi and Kirstie Hawkey, Dalhousie University
Poster description PDF
"We're On the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users
Scott Ruoti, Jeff Andersen, Scott Heidbrink, Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala, and Kent Seamons, Brigham Young University
Poster description PDF
A Comparison of PGP, IBE, and Password-based Secure Email
Scott Ruoti, Jeff Andersen, Tyler Manson, Daniel Zappala, and Kent Seamons, Brigham Young University
Poster description PDF
Exploring Hyper-Personal Analytics' Impact on Social Network Usage
Sadia Ahmed, Shafiul Azam Chowdhury, and Matthew Wright, The University of Texas at Arlington
Poster description PDF
connect with us