A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Hidden voice commands

N Carlini, P Mishra, T Vaidya, Y Zhang… - 25th USENIX security …, 2016 - usenix.org
Voice interfaces are becoming more ubiquitous and are now the primary input method for
many devices. We explore in this paper how they can be attacked with hidden voice …

A survey of research on captcha designing and breaking techniques

Y Zhang, H Gao, G Pei, S Luo… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
The Internet plays an increasingly important role in people's lives, but it also brings security
problems. CAPTCHA, which stands for Completely Automated Public Turing Test to Tell …

Recruiting participants with programming skills: A comparison of four crowdsourcing platforms and a CS student mailing list

M Tahaei, K Vaniea - Proceedings of the 2022 CHI Conference on …, 2022 - dl.acm.org
Reliably recruiting participants with programming skills is an ongoing challenge for empirical
studies involving software development technologies, often leading to the use of …

Blind and human: Exploring more usable audio {CAPTCHA} designs

V Fanelle, S Karimi, A Shah, B Subramanian… - Sixteenth Symposium on …, 2020 - usenix.org
For people with visual impairments (PVIs), audio CAPTCHAs are accessible alternatives to
standard visual CAPTCHAs. However, current audio CAPTCHA designs are slower to …

A survey of CAPTCHA technologies to distinguish between human and computer

X Xu, L Liu, B Li - Neurocomputing, 2020 - Elsevier
Abstract CAPTCHA, Completely Automated Public Turing test to tell Computers and Humans
Apart, is widely used as a security mechanism to classify human and computer. This security …

Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

Robust text captchas using adversarial examples

R Shao, Z Shi, J Yi, PY Chen… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart)
is a widely used technology to distinguish real users and automated users such as bots …

Improving the security of audio captchas with adversarial examples

P Wang, H Gao, X Guo, Z Yuan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
CAPTCHAs (completely automated public Turing tests to tell computers and humans apart)
have been the main protection against malicious attacks on public systems for many years …

Nonsense attacks on google assistant and missense attacks on amazon alexa

M Bispham, I Agrafiotis, M Goldsmith - 5th International Conference on …, 2019 - ora.ox.ac.uk
This paper presents novel attacks on voice-controlled digital assistants using nonsensical
word sequences. We present the results of a small-scale experiment which demonstrates …