View the Full Schedule
The full SOUPS 2018 schedule, including the workshops, is available on the Program at a Glance page.
All sessions will be held in Grand Ballroom V unless otherwise noted.
Papers and Proceedings
The full Proceedings published by USENIX for the conference are available for download below. Individual papers can also be downloaded from the presentation page. Copyright to the individual works is retained by the author[s].
Proceedings Front Matter
Proceedings Cover |
Title Page and List of Organizers |
Table of Contents |
Message from the Program Co-Chairs
Full Proceedings PDFs
SOUPS 2018 Full Proceedings (PDF)
SOUPS 2018 Proceedings Interior (PDF, best for mobile devices)
Full Proceedings ePub (for iPad and most eReaders)
SOUPS 2018 Full Proceedings (ePub)
Full Proceedings Mobi (for Kindle)
SOUPS 2018 Full Proceedings (Mobi)
Downloads for Registered Attendees
(Sign in to your USENIX account to download these files.)



Sunday, August 12, 2018
6:00 pm–7:00 pm
SOUPS 2018 Poster Session
Check out the cool new ideas and the latest preliminary research on display at the SOUPS 2018 Poster Session. View the list of accepted posters.
Monday, August 13, 2018
8:00 am-9:00 am
Continental Breakfast
Grand Ballroom Foyer
9:00 am–9:30 am
Welcome and Awards Presentations
General Chair: Mary Ellen Zurko, MIT Lincoln Laboratory, and Vice General Chair, Heather Richter Lipford, University of North Carolina at Charlotte
9:30 am–10:30 am
Keynote Address
Session Chair: Adam Aviv, U.S. Naval Academy
Beyond the Individual: Usability, Utility and Community
Susan McGregor, Assistant Director of the Tow Center for Digital Journalism and Assistant Professor at Columbia Journalism School
10:30 am–11:00 am
Break with Refreshments
Grand Ballroom Foyer
11:00 am–12:30 pm
User Authentication
Session Chair: Janne Lindqvist, Rutgers University
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios
Melanie Volkamer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt; Andreas Gutmann, OneSpan Innovation Centre and University College London; Karen Renaud, Abertay University, University of South Africa, and University of Glasgow; Paul Gerber, Technische Universität Darmstadt; Peter Mayer, Karlsruhe Institute of Technology (KIT) and Technische Universität Darmstadt
User Behaviors and Attitudes Under Password Expiration Policies
Hana Habib and Pardis Emami Naeini, Carnegie Mellon University; Summer Devlin, University of California, Berkeley; Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians
Elham Al Qahtani and Mohamed Shehab, University of North Carolina Charlotte; Abrar Aljohani
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal
Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent Seamons, and Daniel Zappala, Brigham Young University
12:30 pm–1:45 pm
Luncheon for SOUPS attendees
Grand Ballroom VI
1:45 pm–3:15 pm
Behaviors and Practices
Session Chair: James Nicholson, PaCT Lab, Northumbria University
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships
Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong, Carnegie Mellon University
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking
Arunesh Mathur, Princeton University; Jessica Vitak, University of Maryland, College Park; Arvind Narayanan and Marshini Chetty, Princeton University
Can Digital Face-Morphs Influence Attitudes and Online Behaviors?
Eyal Peer, Bar-Ilan University; Sonam Samat and Alessandro Acquisti, Carnegie Mellon University
3:15 pm–3:45 pm
Lightning Talks
- The 3rd Wave? Inclusive Privacy and Security
Yang Wang, Syracuse University - Accessible Authentication for All: An Evaluation Framework for Assessing Usability and Accessibility of Authentication
Ronna ten Brink, MITRE Corporation - Just Say No to 'Just Say No': Youth and Privacy Advocacy in Latin America
Mariel García-Montes, Massachusetts Institute of Technology - Reframing Usable Privacy and Security to Design for “Cyber Health”
Cori Faklaris, Carnegie Mellon University
3:45 pm–4:15 pm
Break with Refreshments
Grand Ballroom Foyer
4:15 pm–5:45 pm
Online Privacy
Session Chair: Heather Crawford, Florida Institute of Technology
"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia
Nithya Sambasivan and Garen Checkley, Google; Amna Batool, Information Technology University; Nova Ahmed, North South University; David Nemer, University of Kentucky; Laura Sanely Gaytán-Lugo, Universidad de Colima; Tara Matthews, Independent Researcher; Sunny Consolvo and Elizabeth Churchill, Google
Awarded the IAPP SOUPS Privacy Award!
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su, Indiana University Bloomington
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing
Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University
9:00 am–10:30 am
Data Exposure, Compromises, and Access
Session Chair: Manya Sleeper, Google
"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach
Yixin Zou, Abraham H. Mhaidli, Austin McCall, and Florian Schaub, School of Information, University of Michigan
Awarded Distinguished Paper!
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, and Oxana Comanescu, Google
User Comfort with Android Background Resource Accesses in Different Contexts
Daniel Votipka and Seth M. Rabin, University of Maryland; Kristopher Micinski, Haverford College; Thomas Gilray, Michelle L. Mazurek, and Jeffrey S. Foster, University of Maryland
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
Orçun Çetin, Lisette Altena, Carlos Gañán, and Michel van Eeten, Delft University of Technology
10:30 am–11:00 am
Break with Refreshments
Grand Ballroom Foyer
11:00 am–12:30 pm
Developers
Session Chair: Joe Calandrino, Federal Trade Commission
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse
Peter Leo Gorski and Luigi Lo Iacono, Cologne University of Applied Sciences; Dominik Wermke and Christian Stransky, Leibniz University Hannover; Sebastian Möller, Technical University Berlin; Yasemin Acar, Leibniz University Hannover; Sascha Fahl, Ruhr-University Bochum
Deception Task Design in Developer Password Studies: Exploring a Student Sample
Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith, University of Bonn, Germany
API Blindspots: Why Experienced Developers Write Vulnerable Code
Daniela Seabra Oliveira, Tian Lin, and Muhammad Sajidur Rahman, University of Florida; Rad Akefirad, Auto1 Inc.; Donovan Ellis, Eliany Perez, and Rahul Bobhate, University of Florida; Lois A. DeLong and Justin Cappos, New York University; Yuriy Brun, University of Massachusetts Amherst; Natalie C. Ebner, University of Florida
12:30 pm–1:45 pm
Luncheon for SOUPS attendees
Grand Ballroom VI
1:45 pm–3:15 pm
Understanding and Mindsets
Session Chair: Marshini Chetty, Princeton University
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration
Ambar Murillo, Andreas Kramm, Sebastian Schnorf, and Alexander De Luca, Google
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently
Norman Hänsch, Friedrich-Alexander-Universität Erlangen-Nürnberg; Andrea Schankin, Karlsruhe Institute of Technology; Mykolai Protsenko, Fraunhofer Institute for Applied and Integrated Security; Felix Freiling and Zinaida Benenson, Friedrich-Alexander-Universität Erlangen-Nürnberg
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products
Julie M. Haney and Mary F. Theofanos, National Institute of Standards and Technology; Yasemin Acar, Leibniz University Hannover; Sandra Spickard Prettyman, Culture Catalyst
A Comparative Usability Study of Key Management in Secure Email
Scott Ruoti, University of Tennessee; Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons, Brigham Young University
3:15 pm–3:45 pm
Lightning Talks
- http://sillystatistics.org
Janne Lindqvist, Rutgers University - Privacy Goals and Misconceptions Surrounding Privacy Tools
Francis Djabri, Mozilla - Getting Involved in Standards—Seeing Your Work Adopted in the Real World
Samuel Weiler, Massachusetts Institute of Technology, World Wide Web Consortium - User Perceptions of Security and Confidentiality when Performing Tertiary Authentication
Hervé Saint-Louis, University of Toronto
3:45 pm–4:15 pm
Break with Refreshments
Grand Ballroom Foyer
4:15 pm–5:45 pm
Models, Beliefs, and Perceptions
Session Chair: Adam Aviv, U.S. Naval Academy
When is a Tree Really a Truck? Exploring Mental Models of Encryption
Justin Wu and Daniel Zappala, Brigham Young University
Distinguished Paper Award Honorable Mention
"It's Scary…It's Confusing…It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security
Julie M. Haney and Wayne G. Lutters, University of Maryland, Baltimore County
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection
James Nicholson, Lynne Coventry, and Pam Briggs, PaCT Lab, Northumbria University
Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality
Devon Adams, Alseny Bah, and Catherine Barwulor, University of Maryland Baltimore County; Nureli Musaby, James Madison University; Kadeem Pitkin, College of Westchester; Elissa M. Redmiles, University of Maryland
6:00 pm–7:00 pm
Happy Hour
Grand Ballroom Foyer
7:00 pm–8:00 pm
SOUPS Town Hall Meeting
Grand Ballroom I–IV
The SOUPS Town Hall Meeting is a time for the organizing and steering committees to interact with attendees, listen to concerns, and gather feedback regarding the future of the SOUPS conference and community. Everyone is welcome to attend and participate.