Stuart E. Schechter

Affiliations:
  • Microsoft Research


According to our database1, Stuart E. Schechter authored at least 40 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing.
IEEE Secur. Priv., 2020

2019
Distinguishing Attacks from Legitimate Authentication Traffic at Scale.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

StopGuessing: Using Guessed Passwords to Thwart Online Guessing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2016
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns.
IACR Cryptol. ePrint Arch., 2016

Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Learning Assigned Secrets for Unlocking Mobile Devices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

2014
Telepathwords: Preventing Weak Passwords by Reading Users' Minds.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Towards Reliable Storage of 56-bit Secrets in Human Memory.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
Your attention please: designing security-decision UIs to make genuine risks harder to ignore.
Proceedings of the Symposium On Usable Privacy and Security, 2013

The Importance of Being Earnest [In Security Warnings].
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Goldilocks and the <i>two</i> mobile devices: going beyond all-or-nothing access to a device's applications.
Proceedings of the Symposium On Usable Privacy and Security, 2012

It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012

Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
When the Password Doesn't Work: Secondary Authentication for Websites.
IEEE Secur. Priv., 2011

Privacy Revelations for Web and Mobile Apps.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

These aren't the droids you're looking for: retrofitting android to protect data from imperious applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Use ECP, not ECC, for hard failures in resistive memories.
Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), 2010

2009
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

It's no secret: measuring the security and reliability of authentication via 'secret' questions.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Laissez-faire file sharing: access control designed for individuals at the endpoints.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

It's not what you know, but who you know: a social approach to last-resort authentication.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Can I borrow your phone?: understanding concerns when sharing mobile phones.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2007
The Emperor's New Security Indicators.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
The Security of OpenBSD: Milk or Wine?
login Usenix Mag., 2006

Bootstrapping the Adoption of Internet Security Protocols.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Milk or Wine: Does Software Security Improve with Age?
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Inoculating SSH Against Address Harvesting.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
Toward Econometric Models of the Security Risk from Remote Attack.
IEEE Secur. Priv., 2005

2004
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment.
Proceedings of the Economics of Information Security, 2004

Fast Detection of Scanning Worm Infections.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

2003
Access for sale: a new class of worm.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks.
Proceedings of the Financial Cryptography, 2003

2002
How to Buy Better Testing.
Proceedings of the Infrastructure Security, International Conference, 2002

1999
Anonymous Authentication of Membership in Dynamic Groups.
Proceedings of the Financial Cryptography, 1999

1998
Using Path Profiles to Predict HTTP Requests.
Comput. Networks, 1998


  Loading...