Blase Ur

Orcid: 0000-0001-9365-3155

According to our database1, Blase Ur authored at least 77 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Analysis of Google Ads Settings Over Time: Updated, Individualized, Accurate, and Filtered.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords.
Proceedings of the 32nd USENIX Security Symposium, 2023

Defining "Broken": User Experiences and Remediation Tactics When Ad-Blocking or Tracking-Protection Tools Break a Website's User Experience.
Proceedings of the 32nd USENIX Security Symposium, 2023

Comprehension from Chaos: Towards Informed Consent for Private Computation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Helping Users Debug Trigger-Action Programs.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Comprehension from Chaos: What Users Understand and Expect from Private Computation.
CoRR, 2022

"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits.
Proceedings of the 31st USENIX Security Symposium, 2022

Summarizing Sets of Related ML-Driven Recommendations for Improving File Management in Cloud Storage.
Proceedings of the 35th Annual ACM Symposium on User Interface Software and Technology, 2022

Explaining Why: How Instructions and User Interfaces Impact Annotator Rationales When Labeling Text Data.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

2021
Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

From Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure Messaging.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

"It's Stored, Hopefully, on an Encrypted Server": Mitigating Users' Misconceptions About FIDO2 Biometric WebAuthn.
Proceedings of the 30th USENIX Security Symposium, 2021

Helping Users Automatically Find and Manage Sensitive, Expendable Files in Cloud Storage.
Proceedings of the 30th USENIX Security Symposium, 2021

Do Users Have Contextual Preferencesfor Smartphone Power Management?
Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, 2021

KondoCloud: Improving Information Management in Cloud Storage via Recommendations Based on File Similarity.
Proceedings of the UIST '21: The 34th Annual ACM Symposium on User Interface Software and Technology, 2021

Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Files of a Feather Flock Together? Measuring and Modeling How Users Perceive File Similarity in Cloud Storage.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Perceptions of Retrospective Edits, Changes, and Deletion on Social Media.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

SoK: Context Sensing for Access Control in the Adversarial Home IoT.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Understanding Trigger-Action Programs Through Novel Visualizations of Program Differences.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Trace2TAP: Synthesizing Trigger-Action Programs from Traces of Behavior.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Proceedings of the 29th USENIX Security Symposium, 2020

An empirical study on the perceived fairness of realistic, imperfect machine learning models.
Proceedings of the FAT* '20: Conference on Fairness, 2020

Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Taking Data Out of Context to Hyper-Personalize Ads: Crowdworkers' Privacy Perceptions and Decisions to Disclose Private Information.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Reasoning Analytically about Password-Cracking Software.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Evidence Humans Provide When Explaining Data-Labeling Decisions.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019

AutoTap: synthesizing and repairing trigger-action programs using LTL properties.
Proceedings of the 41st International Conference on Software Engineering, 2019

How Users Interpret Bugs in Trigger-Action Programming.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Your Secrets Are Safe: How Browsers' Explanations Impact Misconceptions About Private Browsing Mode.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Rethinking Access Control and Authentication for the Home Internet of Things (IoT).
Proceedings of the 27th USENIX Security Symposium, 2018

Exploring User Mental Models of End-to-End Encrypted Communication Tools.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Draining the Data Swamp: A Similarity-based Approach.
Proceedings of the Workshop on Human-In-the-Loop Data Analytics, 2018

SIGCHI Outstanding Dissertation Award - Supporting Password Decisions with Data.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Forgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Better Passwords through Science (and Neural Networks).
login Usenix Mag., 2017

SmartAuth: User-Centered Authorization for the Internet of Things.
Proceedings of the 26th USENIX Security Symposium, 2017

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Design and Evaluation of a Data-Driven Password Meter.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Can Unicorns Help Users Compare Crypto Key Fingerprints?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Supporting Password-Security Decisions with Data.
PhD thesis, 2016

Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 25th USENIX Security Symposium, 2016

Trigger-Action Programming in the Wild: An Analysis of 200, 000 IFTTT Recipes.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Do Users' Perceptions of Password Security Match Reality?
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Usability and Security of Text Passwords on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Supporting Privacy-Conscious App Update Decisions with User Reviews.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Practical trigger-action programming in the smart home.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
A cross-cultural framework for protecting user privacy in online social media.
Proceedings of the 22nd International World Wide Web Conference, 2013

The post anachronism: the temporal dimension of facebook privacy.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

What do online behavioral advertising privacy disclosures communicate to users?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Smart, useful, scary, creepy: perceptions of online behavioral advertising.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook.
Proceedings of the iConference 2012, Toronto, Ontario, Canada, February 7-10, 2012, 2012

Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Tag, you can see it!: using tags for access control in photo sharing.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Scratchable Devices: User-Friendly Programming for Household Appliances.
Proceedings of the Human-Computer Interaction. Towards Mobile and Intelligent Interaction Environments, 2011


  Loading...