A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

[HTML][HTML] A survey exploring open source Intelligence for smarter password cracking

A Kanta, I Coisel, M Scanlon - Forensic Science International: Digital …, 2020 - Elsevier
From the end of the last century to date, consumers are increasingly living their lives online.
In today's world, the average person spends a significant proportion of their time connecting …

Fast, lean, and accurate: Modeling password guessability using neural networks

W Melicher, B Ur, SM Segreti, S Komanduri… - 25th USENIX Security …, 2016 - usenix.org
Human-chosen text passwords, today's dominant form of authentication, are vulnerable to
guessing attacks. Unfortunately, existing approaches for evaluating password strength by …

Designing password policies for strength and usability

R Shay, S Komanduri, AL Durity, P Huh… - ACM Transactions on …, 2016 - dl.acm.org
Password-composition policies are the result of service providers becoming increasingly
concerned about the security of online accounts. These policies restrict the space of user …

Password policies of most top websites fail to follow best practices

K Lee, S Sjöberg, A Narayanan - Eighteenth Symposium on Usable …, 2022 - usenix.org
We examined the policies of 120 of the most popular websites for when a user creates a
new password for their account. Despite well-established advice that has emerged from the …

Practical recommendations for stronger, more usable passwords combining minimum-strength, minimum-length, and blocklist requirements

J Tan, L Bauer, N Christin, LF Cranor - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Multiple mechanisms exist to encourage users to create stronger passwords, including
minimum-length and character-class requirements, prohibiting blocklisted passwords, and …

Why older adults (Don't) use password managers

H Ray, F Wolf, R Kuber, AJ Aviv - 30th USENIX Security Symposium …, 2021 - usenix.org
Password managers (PMs) are considered highly effective tools for increasing security, and
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …

Gamification techniques for raising cyber security awareness

S Scholefield, LA Shepherd - HCI for Cybersecurity, Privacy and Trust: First …, 2019 - Springer
Due to the prevalence of online services in modern society, such as internet banking and
social media, it is important for users to have an understanding of basic security measures in …

This pin can be easily guessed: Analyzing the security of smartphone unlock pins

P Markert, DV Bailey, M Golla… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We provide the first comprehensive study of user-chosen 4-and 6-digit PINs (n= 1220)
collected on smartphones with participants being explicitly primed for device unlocking. We …

The security & privacy acceptance framework (spaf)

S Das, C Faklaris, JI Hong… - Foundations and Trends …, 2022 - nowpublishers.com
How can we encourage end-user acceptance of expert recommended cybersecurity and
privacy (S&P) behaviors? We review prior art in human-centered S&P and identified three …