Lujo Bauer

According to our database1, Lujo Bauer authored at least 88 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios.
PACMHCI, 2018

Comparing Hypothetical and Realistic Privacy Valuations.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

User Behaviors and Attitudes Under Password Expiration Policies.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Better Passwords through Science (and Neural Networks).
;login:, 2017

Special issue on verified information flow security.
Journal of Computer Security, 2017

Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Privacy Expectations and Preferences in an IoT World.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Timing-Sensitive Noninterference through Composition.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Design and Evaluation of a Data-Driven Password Meter.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Can Unicorns Help Users Compare Crypto Key Fingerprints?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Designing Password Policies for Strength and Usability.
ACM Trans. Inf. Syst. Secur., 2016

(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
PoPETs, 2016

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
Proceedings of the 25th USENIX Security Symposium, 2016

Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers.
Proceedings of the Financial Cryptography and Data Security, 2016

Do Users' Perceptions of Password Security Match Reality?
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Usability and Security of Text Passwords on Mobile Devices.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
The Effectiveness of Security Images in Internet Banking.
IEEE Internet Computing, 2015

Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Proceedings of the 24th USENIX Security Symposium, 2015

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Editorial.
Computers & Security, 2014

Human Factors, Defaults, and Automation: Challenges and Opporunities.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Android taint flow analysis for app sets.
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014

Toward strong, usable access control for shared distributed data.
Proceedings of the 12th USENIX conference on File and Storage Technologies, 2014

Analyzing the dangers posed by Chrome extensions.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Can long passwords be secure and usable?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
The post anachronism: the temporal dimension of facebook privacy.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Probabilistic Cost Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013

Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality.
Proceedings of the DIM'13, 2013

What you want is not what you get: predicting sharing policies for text-based content on facebook.
Proceedings of the AISec'13, 2013

Measuring password guessability for an entire university.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Helping Users Create Better Passwords.
;login:, 2012

How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Modeling and Enhancing Android's Permission System.
Proceedings of the Computer Security - ESORICS 2012, 2012

Discovering access-control misconfigurations: new approaches and evaluation methodologies.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Tag, you can see it!: using tags for access control in photo sharing.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Access right assignment mechanisms for secure home networks.
Journal of Communications and Networks, 2011

Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reasoning, 2011

More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Exploring reactive access control.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Challenges in Access Right Assignment for Secure Home Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Encountering stronger password requirements: user attitudes and behaviors.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Solving the access-control puzzle: finding the pieces and putting them together.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Constraining Credential Usage in Logic-Based Access Control.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Access control for home data sharing: evaluating social acceptability.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Composing expressive runtime security policies.
ACM Trans. Softw. Eng. Methodol., 2009

Run-Time Enforcement of Nonsafety Policies.
ACM Trans. Inf. Syst. Secur., 2009

xDomain: cross-border proofs of access.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Real life challenges in access-control management.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
Detecting and resolving policy misconfigurations in access-control systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Expandable grids for visualizing and authoring computer security policies.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

A user study of policy creation in a flexible access-control system.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
User-Controllable Security and Privacy for Pervasive Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Lessons learned from the deployment of a smartphone-based access-control system.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Consumable Credentials in Linear-Logic-Based Access-Control Systems.
Proceedings of the Network and Distributed System Security Symposium, 2007

Efficient Proving for Practical Distributed Access-Control Systems.
Proceedings of the Computer Security, 2007

2006
A Linear Logic of Authorization and Knowledge.
Proceedings of the Computer Security, 2006

2005
Edit automata: enforcement mechanisms for run-time security policies.
Int. J. Inf. Sec., 2005

Distributed Proving in Access-Control Systems.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Composing security policies with polymer.
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005

Device-Enabled Authorization in the Grey-System.
Proceedings of the Information Security, 8th International Conference, 2005

Enforcing Non-safety Security Policies with Program Monitors.
Proceedings of the Computer Security, 2005

2003
Mechanisms for secure modular programming in Java.
Softw., Pract. Exper., 2003

Access Control on the Web Using Proof-carrying Authorization.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
A General and Flexible Access-Control System for the Web.
Proceedings of the 11th USENIX Security Symposium, 2002

Types and Effects for Non-interfering Program Monitors.
Proceedings of the Software Security -- Theories and Systems, 2002


  Loading...