Check out the new USENIX Web site.

References

[1]   Adams, A., and Sasse, M. A. Users are not the enemy. Commun. ACM 42, 12 (1999), 40–46.

[2]   APWG. Anti-phishing working group. https://www.antiphishing.org.

[3]   Arshad, F., and Reeder, R. When user studies attack: Evaluating security by intentionally attacking users. SOUPS Conference Report https://www.ieee-security.org/Cipher/ConfReports/2005/CR2005-SOUPS.html#%'_Toc110303259.

[4]   Atreya, C., Aviv, A., Johnson, M., Raykova, M., Bellovin, S. M., and Kaiser, G. Rust: The reusable security toolkit. In submission to SOUPS ’08: Proceedings of the symposium on Usable privacy and security (2008).

[5]   Brown, K. Step by step guide to infocard. https://msdn.microsoft.com/msdnmag/issues/06/05/securitybriefs/default.a%'spx.

[6]   Dhamija, R., Tygar, J. D., and Hearst, M. Why phishing works. In CHI ’06: Proceedings of the SIGCHI conference on Human Factors in computing systems (NY, NY, USA, 2006).

[7]   FFIEC. Authentication in an internet banking environment. https://www.ffiec.gov/pdf/authentication_guidance.pdf, 2005.

[8]   Forum, C. A. Extended validation SSL certificates. https://cabforum.org/.

[9]   Hallam-Baker, P. Secure internet letterhead. In W3C Workshop on Transparency and Usability of Web Authentication (2006).

[10]   ISO/IEC. ISO 9241-11 guidance on usability.

[11]   Jackson, C., Simon, D. R., Tan, D. S., and Barth, A. An evaluation of extended validation and picture-in-picture attacks. In Proceedings of Usable Security (USEC ’07) Workshop (2007).

[12]   Jakobsson, M., and Ratkiewicz, J. Designing ethical phishing experiments: A study of (ROT13) rOnl query features. In WWW ’06: Proceedings of the 15th international conference on World Wide Web (NY, NY, USA, 2006), ACM.

[13]   Schechter, S. E., Dhamija, R., Ozment, A., and Fischer, I. The emperor’s new security indicators. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2007), IEEE Computer Society.

[14]   SOUPS 2006. Security user study toolkits. https://cups.cs.cmu.edu/soups/2006/workshop-kits/kits.html.

[15]   Whalen, T., and Inkpen, K. M. Gathering evidence: Use of visual security cues in web browsers. In GI ’05: Proceedings of the 2005 conference on Graphics interface (Waterloo, Ontario, Canada, 2005), Canadian Human-Computer Communications Society.

[16]   Wu, M., Miller, R. C., and Garfinkel, S. L. Do security toolbars actually prevent phishing attacks? In CHI ’06: Proceedings of the SIGCHI conference on Human Factors in computing systems (NY, NY, USA, 2006), ACM Press.

[17]   Wu, M., Miller, R. C., and Little, G. Web wallet: Preventing phishing attacks by revealing user intentions. In SOUPS ’06: Proceedings of the second symposium on Usable privacy and security (New York, NY, USA), ACM Press.