Lujo Bauer

Orcid: 0000-0002-8209-6792

According to our database1, Lujo Bauer authored at least 120 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Speculative Privacy Concerns about AR Glasses Data Collection.
Proc. Priv. Enhancing Technol., October, 2023

The Impact of Exposed Passwords on Honeyword Efficacy.
CoRR, 2023

Group-based Robustness: A General Framework for Customized Robustness in the Real World.
CoRR, 2023

Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators.
CoRR, 2023

Certified Robustness of Learning-based Static Malware Detectors.
CoRR, 2023

Adversarial Training for Raw-Binary Malware Classifiers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Towards Usable Security Analysis Tools for Trigger-Action Programming.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized Deletion.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Proc. Priv. Enhancing Technol., 2022

"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media.
Proc. ACM Hum. Comput. Interact., 2022

Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022

Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics.
Proc. Priv. Enhancing Technol., 2021

"I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users.
Proc. Priv. Enhancing Technol., 2021

What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention.
Pervasive Mob. Comput., 2021

Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning.
Proceedings of the WWW '21: The Web Conference 2021, 2021

What breach? Measuring online awareness of security incidents by studying real-world browsing behavior.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021

Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
(How) Do people change their passwords after a breach?
CoRR, 2020

How Risky Are Real Users' IFTTT Applets?
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Metering Graphical Data Leakage with Snowman.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A General Framework for Adversarial Examples with Objectives.
ACM Trans. Priv. Secur., 2019

Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.
CoRR, 2019

n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.
CoRR, 2019

Why people (don't) use password managers effectively.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios.
Proc. ACM Hum. Comput. Interact., 2018

On the Suitability of L<sub>p</sub>-norms for Creating and Preventing Adversarial Examples.
CoRR, 2018

Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition.
CoRR, 2018

Comparing Hypothetical and Realistic Privacy Valuations.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

User Behaviors and Attitudes Under Password Expiration Policies.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Better Passwords through Science (and Neural Networks).
login Usenix Mag., 2017

Special issue on verified information flow security.
J. Comput. Secur., 2017

Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Privacy Expectations and Preferences in an IoT World.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Timing-Sensitive Noninterference through Composition.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Design and Evaluation of a Data-Driven Password Meter.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Can Unicorns Help Users Compare Crypto Key Fingerprints?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
Proc. Priv. Enhancing Technol., 2016

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 25th USENIX Security Symposium, 2016

Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers.
Proceedings of the Financial Cryptography and Data Security, 2016

Do Users' Perceptions of Password Security Match Reality?
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Usability and Security of Text Passwords on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Probabilistic cost enforcement of security policies.
J. Comput. Secur., 2015

The Effectiveness of Security Images in Internet Banking.
IEEE Internet Comput., 2015

Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Editorial.
Comput. Secur., 2014

Human Factors, Defaults, and Automation: Challenges and Opporunities.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Android taint flow analysis for app sets.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

General Requirements of a Hybrid-Modeling Framework for Cyber Security.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Toward strong, usable access control for shared distributed data.
Proceedings of the 12th USENIX conference on File and Storage Technologies, 2014

Analyzing the dangers posed by Chrome extensions.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
The post anachronism: the temporal dimension of facebook privacy.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality.
Proceedings of the DIM'13, 2013

What you want is not what you get: predicting sharing policies for text-based content on facebook.
Proceedings of the AISec'13, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Modeling and Enhancing Android's Permission System.
Proceedings of the Computer Security - ESORICS 2012, 2012

Discovering access-control misconfigurations: new approaches and evaluation methodologies.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Tag, you can see it!: using tags for access control in photo sharing.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Detecting and resolving policy misconfigurations in access-control systems.
ACM Trans. Inf. Syst. Secur., 2011

Access right assignment mechanisms for secure home networks.
J. Commun. Networks, 2011

Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reason., 2011

More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Exploring reactive access control.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Challenges in Access Right Assignment for Secure Home Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Solving the access-control puzzle: finding the pieces and putting them together.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Constraining Credential Usage in Logic-Based Access Control.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Access control for home data sharing: evaluating social acceptability.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Composing expressive runtime security policies.
ACM Trans. Softw. Eng. Methodol., 2009

Run-Time Enforcement of Nonsafety Policies.
ACM Trans. Inf. Syst. Secur., 2009

xDomain: cross-border proofs of access.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Real life challenges in access-control management.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Expandable grids for visualizing and authoring computer security policies.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

A user study of policy creation in a flexible access-control system.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
User-Controllable Security and Privacy for Pervasive Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Lessons learned from the deployment of a smartphone-based access-control system.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Consumable Credentials in Linear-Logic-Based Access-Control Systems.
Proceedings of the Network and Distributed System Security Symposium, 2007

Efficient Proving for Practical Distributed Access-Control Systems.
Proceedings of the Computer Security, 2007

2006
A Linear Logic of Authorization and Knowledge.
Proceedings of the Computer Security, 2006

2005
Edit automata: enforcement mechanisms for run-time security policies.
Int. J. Inf. Sec., 2005

Distributed Proving in Access-Control Systems.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Composing security policies with polymer.
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005

Device-Enabled Authorization in the Grey-System.
Proceedings of the Information Security, 8th International Conference, 2005

Enforcing Non-safety Security Policies with Program Monitors.
Proceedings of the Computer Security, 2005

2003
Mechanisms for secure modular programming in Java.
Softw. Pract. Exp., 2003

Access Control on the Web Using Proof-carrying Authorization.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
A General and Flexible Access-Control System for the Web.
Proceedings of the 11th USENIX Security Symposium, 2002

Types and Effects for Non-interfering Program Monitors.
Proceedings of the Software Security -- Theories and Systems, 2002


  Loading...