CSE 590 Y, Wednesdays, 3:30pm, CSE 503.

  1. Privacy Risks Emerging from the Adoption of Innocuous Wearable Sensors in the Mobile Environment, Raij, Ghosh, Kumar, and Srivastava. CHI 2011.
  2. On the Requirements for Successful GPS Spoofing Attacks. Tippenhauer, Popper, Rasmussen and Capkun, CCS 2011. Experiencing security in interaction design. Mathiasen and Bodker. CHI 2011.
  3. Experiencing security in interaction design. Mathiasen and Bødker. CHI 2011.
  4. [SoK] Prudent Practices for Designing Malware Experiments: Status Quo and Outlook -- IEEE Symposium on Security & Privacy 2012
  5. Programmatic Gold: Scalable and Targeted Quality Assurance in Crowdsourcing http://crowdflower.com/images/marketing/papers/HCOMP2011-philosopher-stone.pdf
  6. Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications http://www.internetsociety.org/weaponizing-femtocells-effect-rogue-devices-mobile-telecommunications
  7. [SoK] The Psychology of Security for the Home Computer User. Adele Howe, Indrajit Ray, Zinta Byrne, Mark Roberts, and Malgorzata Urbanska. IEEE Symposium on Security and Privacy 2012
  8. ObliviAd: Provably Secure and Practical Online Behavioral Advertising. Michael Backes (Saarland University, MPI-SWS), Aniket Kate (MPI-SWS), and Matteo Maffei and Kim Pecina (Saarland University). IEEE Symposium on Security and Privacy 2012
  9. [SoK] The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. Joseph Bonneau (University of Cambridge), Cormac Herley (Microsoft Research), Paul C. van Oorschot (Carleton U), and Frank Stajano (University of Cambridge)