[PDF][PDF] Privacy threats in intimate relationships

K Levy, B Schneier - Journal of Cybersecurity, 2020 - academic.oup.com
This article provides an overview of intimate threats: a class of privacy threats that can arise
within our families, romantic partnerships, close friendships, and caregiving relationships …

A deep dive into user's preferences and behavior around mobile phone sharing

R Paudel, P Dumaru, A Shrestha, H Kocabas… - Proceedings of the …, 2023 - dl.acm.org
Users share their personal devices with different entities in various circumstances. While
prior research shed light on the broad reasons behind the sharing of mobile phones, there is …

Replicueauth: Validating the use of a lab-based virtual reality setup for evaluating authentication systems

F Mathis, K Vaniea, M Khamis - Proceedings of the 2021 chi conference …, 2021 - dl.acm.org
Evaluating novel authentication systems is often costly and time-consuming. In this work, we
assess the suitability of using Virtual Reality (VR) to evaluate the usability and security of …

" So-called privacy breeds evil" Narrative Justifications for Intimate Partner Surveillance in Online Forums

R Bellini, E Tseng, N McDonald, R Greenstadt… - Proceedings of the …, 2021 - dl.acm.org
A growing body of research suggests that intimate partner abusers use digital technologies
to surveil their partners, including by installing spyware apps, compromising devices and …

PrivacyScout: Assessing vulnerability to shoulder surfing on mobile devices

M Bâce, A Saad, M Khamis… - … on Privacy Enhancing …, 2022 - petsymposium.org
One approach to mitigate shoulder surfing attacks on mobile devices is to detect the
presence of a bystander using the phone's front-facing camera. However, a person's face in …

SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems

J Chen, U Hengartner, H Khan - Computers & Security, 2024 - Elsevier
Smart devices are commonly used in multi-user scenarios, such as shared household
devices and shared corporate devices for front-line workers. A multi-user device requires …

No privacy in the electronics repair industry

J Ceci, J Stegman, H Khan - 2023 IEEE Symposium on Security …, 2023 - ieeexplore.ieee.org
Electronics repair and service providers offer a range of services to computing device
owners across North America—from software installation to hardware repair. Device owners …

Are thermal attacks a realistic threat? Investigating the preconditions of thermal attacks in users' daily lives

P Bekaert, N Alotaibi, F Mathis, N Gerber… - Nordic Human …, 2022 - dl.acm.org
Thermal attacks refer to the possibility of capturing heat traces that result from interacting
with user interfaces to reveal sensitive input, such as passwords. The technical feasibility …

Normal and easy: Account sharing practices in the workplace

Y Song, C Faklaris, Z Cai, JI Hong… - Proceedings of the ACM …, 2019 - dl.acm.org
Work is being digitized across all sectors, and digital account sharing has become common
in the workplace. In this paper, we conduct a qualitative and quantitative study of digital …

Understanding shoulder surfer behavior and attack patterns using virtual reality

Y Abdrabou, SR Rivu, T Ammar, J Liebers… - Proceedings of the …, 2022 - dl.acm.org
In this work, we explore attacker behavior during shoulder surfing. As such behavior is often
opportunistic and difficult to observe in real world settings, we leverage the capabilities of …