Franziska Roesner

Orcid: 0000-0001-8735-4810

Affiliations:
  • University of Washington, Paul G. Allen School of Computer Science & Engineering, Seattle, WA, USA
  • University of Texas at Austin, Department of Computer Sciences, TX, USA


According to our database1, Franziska Roesner authored at least 91 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security and Privacy in the Metaverse.
IEEE Secur. Priv., 2024

TikTok and the Art of Personalization: Investigating Exploration and Exploitation on Social Media Feeds.
CoRR, 2024

SecGPT: An Execution Isolation Architecture for LLM-Based Systems.
CoRR, 2024

2023
"It doesn't tell me anything about how my data is used": User Perceptions of Data Collection Purposes.
CoRR, 2023

LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins.
CoRR, 2023

Leveraging Rights of Data Subjects for Social Media Analysis: Studying TikTok via Data Donations.
CoRR, 2023

Online Advertising in Ukraine and Russia During the 2022 Russian Invasion.
Proceedings of the ACM Web Conference 2023, 2023

Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality.
Proceedings of the 32nd USENIX Security Symposium, 2023

Reframe: An Augmented Reality Storyboarding Tool for Character-Driven Analysis of Security & Privacy Concerns.
Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, 2023

Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design.
Proceedings of the 2023 New Security Paradigms Workshop, 2023

Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable.
Proceedings of the 3rd ACM Conference on Equity and Access in Algorithms, 2023

"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Eliciting Security & Privacy-Informed Sharing Techniques for Multi-User Augmented Reality.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Understanding People's Concerns and Attitudes Toward Smart Cities.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Investigating Deceptive Design in GDPR's Legitimate Interest.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Your Echos are Heard: Tracking, Profiling, and Ad Targeting in the Amazon Smart Speaker Ecosystem.
CoRR, 2022

Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives.
Proceedings of the 31st USENIX Security Symposium, 2022

"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice.
Proceedings of the 31st USENIX Security Symposium, 2022

Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Principles Matter: Integrating an Ethics Intervention into a Computer Security Course.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

What factors affect targeting and bids in online advertising?: a field measurement study.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Exploring Deceptive Design Patterns in Voice Interfaces.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Misinfo Reaction Frames: Reasoning about Readers' Reactions to News Headlines.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
Digital Disinformation: Taxonomy, Impact, Mitigation, and Regulation (Dagstuhl Seminar 21402).
Dagstuhl Reports, 2021

Misinfo Belief Frames: A Case Study on Covid & Climate News.
CoRR, 2021

Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Interactions with Potential Mis/Disinformation URLs Among U.S. Users on Facebook, 2017-2019.
Proceedings of the FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet, 2021

Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts.
Proc. Priv. Enhancing Technol., 2020

Social Media COVID-19 Misinformation Interventions Viewed Positively, But Have Limited Impact.
CoRR, 2020

COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion.
CoRR, 2020

Making Distributed Mobile Applications SAFE: Enforcing User Privacy Policies on Untrusted Applications with Secure Application Flow Enforcement.
CoRR, 2020

COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences.
CoRR, 2020

Usable Sexurity: Studying People's Concerns and Strategies When Sexting.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Fake News on Facebook and Twitter: Investigating How People (Don't) Investigate.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Consumer Smart Homes: Where We Are and Where We Need to Go.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study.
Proceedings of the 28th USENIX Security Symposium, 2019

Secure Multi-User Content Sharing for Augmented Reality Applications.
Proceedings of the 28th USENIX Security Symposium, 2019

Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors.
Proceedings of the 28th USENIX Security Symposium, 2019

Analysis of the Susceptibility of Smart Home Programming Interfaces to End User Error.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Defending Against Neural Fake News.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Who's In Control?: Interactions In Multi-User Smart Homes.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Arya: Operating System Support for Securely Augmenting Reality.
IEEE Secur. Priv., 2018

Technology-Enabled Disinformation: Summary, Lessons, and Recommendations.
CoRR, 2018

Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception.
CoRR, 2018

Computer Security and Privacy for Refugees in the United States.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Designing Application Permission Models that Meet User Expectations.
IEEE Secur. Priv., 2017

Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

When the Weakest Link is Strong: Secure Collaboration in the Case of the Panama Papers.
Proceedings of the 26th USENIX Security Symposium, 2017

Securing Augmented Reality Output.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

End User Security and Privacy Concerns with Smart Homes.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Securing vulnerable home IoT devices with an in-hub security manager.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Rewriting History: Changing the Archived Web from the Present.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Excavating Web Trackers Using Web Archaeology.
login Usenix Mag., 2016

Individual versus Organizational Computer Security and Privacy Concerns in Journalism.
Proc. Priv. Enhancing Technol., 2016

How to Safely Augment Reality: Challenges and Directions.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
Proceedings of the 25th USENIX Security Symposium, 2016

Computer Security for Data Collection Technologies.
Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, 2016

Let's Talk Money: Evaluating the Security Challenges of Mobile Money in the Developing World.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

Radiatus: a Shared-Nothing Server-Side Web Architecture.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Investigating the Computer Security Practices and Needs of Journalists.
Proceedings of the 24th USENIX Security Symposium, 2015

Analyzing the Use of Quick Response Codes in the Wild.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

The Privacy-Utility Tradeoff for Remotely Teleoperated Robots.
Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction, 2015

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Security and Privacy for Untrusted Applications in Modern and Emerging Client Platforms.
PhD thesis, 2014

Security and privacy for augmented reality systems.
Commun. ACM, 2014

Augmented reality: hard problems of law and policy.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages.
Proceedings of the Financial Cryptography and Data Security, 2014

World-Driven Access Control for Continuous Sensing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Collaborative Verification of Information Flow for a High-Assurance App Store.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Securing Embedded User Interfaces: Android and Beyond.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Operating System Support for Augmented Reality Applications.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

2012
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets.
login Usenix Mag., 2012

User interface toolkit mechanisms for securing interface elements.
Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology, 2012

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Detecting and Defending Against Third-Party Tracking on the Web.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

2011
Comprehensive Experimental Analyses of Automotive Attack Surfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Experimental Security Analysis of a Modern Automobile.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2008
Counting Dependence Predictors.
Proceedings of the 35th International Symposium on Computer Architecture (ISCA 2008), 2008

2007
Late-binding: enabling unordered load-store queues.
Proceedings of the 34th International Symposium on Computer Architecture (ISCA 2007), 2007


  Loading...