Home automation in the wild: challenges and opportunities

AJB Brush, B Lee, R Mahajan, S Agarwal… - proceedings of the …, 2011 - dl.acm.org
Visions of smart homes have long caught the attention of researchers and considerable
effort has been put toward enabling home automation. However, these technologies have …

An operating system for the home

C Dixon, R Mahajan, S Agarwal, AJ Brush… - … USENIX Symposium on …, 2012 - usenix.org
Network devices for the home such as remotely controllable locks, lights, thermostats,
cameras, and motion sensors are now readily available and inexpensive. In theory, this …

Why Johnny doesn't use two factor a two-phase usability study of the FIDO U2F security key

S Das, A Dingman, LJ Camp - … Nieuwpoort, Curaçao, February 26–March 2 …, 2018 - Springer
Why do individuals choose to use (or not use) Two Factor Authentication (2FA)? We sought
to answer this by implementing a two-phase study of the Yubico Security Key. We analyzed …

[PDF][PDF] The current state of access control for smart devices in homes

B Ur, J Jung, S Schechter - … on home usable privacy and security …, 2013 - cups.cs.cmu.edu
Although connected devices and smart homes are now marketed to average consumers,
little is known about how access-control systems for these devices fare in the real world. In …

[PDF][PDF] Location privacy in location-based services: Beyond TTP-based schemes

A Solanas, J Domingo-Ferrer… - Proceedings of the 1st …, 2008 - air.unimi.it
Location-Based Services (LBS) are gaining importance due to the advances in mobile
networks and positioning technologies. Nevertheless, the wide deployment of LBS can …

Access control for home data sharing: Attitudes, needs and practices

ML Mazurek, JP Arsenault, J Bresee, N Gupta… - Proceedings of the …, 2010 - dl.acm.org
As digital content becomes more prevalent in the home, non-technical users are
increasingly interested in sharing that content with others and accessing it from multiple …

A summary of survey methodology best practices for security and privacy researchers

EM Redmiles, Y Acar, S Fahl, ML Mazurek - 2017 - drum.lib.umd.edu
Abstract" Given a choice between dancing pigs and security, users will pick dancing pigs
every time," warns an oft-cited quote from well-known security researcher Bruce Schneier …

Real life challenges in access-control management

L Bauer, LF Cranor, RW Reeder, MK Reiter… - Proceedings of the …, 2009 - dl.acm.org
In this work we ask the question: what are the challenges of managing a physical or file
system access-control policy for a large organization? To answer the question, we …

SoK: Social Cybersecurity

Y Wu, WK Edwards, S Das - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
We analyze prior work in social cybersecurity and present a structuring of this literature
based on its pertinence to four S&P-relevant social behaviors:(1) negotiating access to …

The home needs an operating system (and an app store)

C Dixon, R Mahajan, S Agarwal, AJ Brush… - Proceedings of the 9th …, 2010 - dl.acm.org
We argue that heterogeneity is hindering technological innovation in the home---homes
differ in terms of their devices and how those devices are connected and used. To abstract …