forked from m33x/MaxBib
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmax.bib
8970 lines (8238 loc) · 309 KB
/
max.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
% This file is in alphabetical order of lastname-year-keyword, e.g., ur-17-data-driven-psm
% This way it is easy to avoid and detect duplicate entries.
%
% To add a new entry, copy an existing one to the correct position in the file, and edit/update ALL fields.
%
% Common issues
% USENIX Association -> USENIX
% ACM SIGSAC Conference -> ACM Conference
% The Who Are You -> Who Are You?!
% missing month
% SOUPS '18 -> SOUPS~'18
% van Oorschot, Paul C. -> Van Oorschot, Paul C.
% Cranor, Lorrie -> Cranor, Lorrie Faith
% Approved all correct
@inproceedings{abbott-20-mandatory-2fa,
author = {Abbott, Jacob and Patil, Sameer},
title = {{How Mandatory Second Factor Affects the Authentication User Experience}},
booktitle = {ACM Conference on Human Factors in Computing Systems},
year = {2020},
series = {CHI~'20},
pages = {1--13},
address = {Honolulu, Hawaii, USA},
month = apr,
publisher = {ACM}
}
% Approved all correct
@inproceedings{abdou-15-ssh,
author = {Abdou, AbdelRahman and Barrera, David and Van Oorschot, Paul C.},
title = {{What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks}},
booktitle = {International Conference on Passwords},
year = {2015},
series = {PASSWORDS~'15},
pages = {72--91},
address = {Cambridge, United Kingdom},
month = dec,
publisher = {Springer}
}
% Approved all correct
@inproceedings{abu-salma-17-communication,
author = {Abu-Salma, Ruba and Sasse, M. Angela and Bonneau, Joseph and Danilova, Anastasia and Naiakshina, Alena and Smith, Matthew},
title = {{Obstacles to the Adoption of Secure Communication Tools}},
booktitle = {IEEE Symposium on Security and Privacy},
year = {2017},
series = {SP~'17},
pages = {137--153},
address = {San Jose, California, USA},
month = may,
publisher = {IEEE}
}
% Approved all correct
@techreport{ackerman-17-2fa-adoption,
author = {Ackerman, Preston},
title = {{Impediments to Adoption of Two-factor Authentication by Home End-Users}},
institution = {SANS Institute},
year = {2017},
type = {Technical Report},
number = {37607},
month = feb
}
% Approved all correct
@article{acquisti-17-nudges,
author = {Acquisti, Alessandro and Adjerid, Idris and Balebako, Rebecca and Brandimarte, Laura and Cranor, Lorrie Faith and Komanduri, Saranga and Leon, Pedro Giovanni and Sadeh, Norman and Schaub, Florian and Sleeper, Manya and Wang, Yang and Wilson, Shomir},
title = {{Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online}},
journal = {ACM Computing Surveys},
year = {2017},
volume = {50},
number = {3},
pages = {44:1--44:41},
month = aug,
publisher = {ACM}
}
% Approved all correct
@article{adams-99-users-not-enemy,
author = {Adams, Anne and Sasse, Martina Angela},
title = {{Users Are Not the Enemy}},
journal = {Communications of the ACM},
year = {1999},
volume = {42},
number = {12},
pages = {40--46},
month = dec,
publisher = {ACM}
}
% Approved all correct
@inproceedings{agarwal-13-embarrass,
author = {Agarwal, Lalit and Shrivastava, Nisheeth and Jaiswal, Sharad and Panjwani, Saurabh},
title = {{Do Not Embarrass: Re-Examining User Concerns for Online Tracking and Advertising}},
booktitle = {Symposium on Usable Privacy and Security},
year = {2013},
series = {SOUPS~'13},
pages = {8:1--8:13},
address = {Newcastle, United Kingdom},
month = jul,
publisher = {ACM}
}
% Approved all correct
@misc{akamai-20-credential-stuffing,
author = {{Akamai Technologies, Inc.}},
title = {{The State of the Internet: Loyalty for Sale -- Credential Abuse}},
note = {\url{https://www.akamai.com/our-thinking/the-state-of-the-internet}, as of \today},
month = oct,
year = {2020}
}
% Approved all correct
@inproceedings{akhawe-13-alice,
author = {Akhawe, Devdatta and Felt, Adrienne Porter},
title = {{Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness}},
booktitle = {USENIX Security Symposium},
year = {2013},
series = {SSYM~'13},
pages = {257--272},
address = {Washington, District of Columbia, USA},
month = jul,
publisher = {USENIX}
}
% Approved all correct
@inproceedings{al-abdulwahid-15-spu-perception,
author = {Al Abdulwahid, Abdulwahid and Clarke, Nathan and Stengel, Ingo and Furnell, Steven and Reich, Christoph},
title = {{Security, Privacy and Usability -- A Survey of Users' Perceptions and Attitudes}},
booktitle = {Trust, Privacy and Security in Digital Business},
year = {2015},
series = {TrustBus~'15},
pages = {153--168},
address = {Valencia, Spain},
month = sep,
publisher = {Springer}
}
% Approved all correct
@inproceedings{alaca-16-fingerprint-auth,
author = {Alaca, Furkan and Van Oorschot, Paul C.},
title = {{Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods}},
booktitle = {Annual Conference on Computer Security Applications},
year = {2016},
series = {ACSAC~'16},
pages = {289--301},
address = {Los Angeles, California, USA},
month = dec,
publisher = {ACM}
}
% Approved all correct
@inproceedings{alam-19-webauthn-developer,
author = {Alam, Aftab and Krombholz, Katharina and Bugiel, Sven},
title = {{Poster: Let History Not Repeat Itself (This Time) -- Tackling WebAuthn Developer Issues Early On}},
booktitle = {ACM Conference on Computer and Communications Security},
year = {2019},
series = {CCS~'19},
pages = {2669--2671},
address = {London, United Kingdom},
month = nov,
publisher = {ACM}
}
% Approved all correct
@article{albayram-17-2fa-videos,
author = {Albayram, Yusuf and Khan, Mohammad Maifi Hasan and Fagan, Michael},
title = {{A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA)}},
journal = {International Journal of Human–Computer Interaction},
year = {2017},
volume = {33},
number = {11},
pages = {927--942},
month = mar,
publisher = {Taylor \& Francis}
}
% Approved all correct
@inproceedings{ali-20-guardian,
author = {Ali, Suzan and Elgharabawy, Mounir and Duchaussoy, Quentin and Mannan, Mohammad and Youssef, Amr},
title = {{Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions}},
booktitle = {Annual Conference on Computer Security Applications},
year = {2020},
series = {ACSAC~'20},
pages = {69--83},
address = {Austin, Texas, USA},
month = dec,
publisher = {ACM}
}
% Approved all correct
@inproceedings{aljaffan-17-psv,
author = {Aljaffan, Nouf and Yuan, Haiyue and Li, Shujun},
title = {{PSV (Password Security Visualizer): From Password Checking to User Education}},
booktitle = {Conference on Human Aspects of Information Security, Privacy and Trust},
year = {2017},
series = {HAS~'17},
pages = {191--211},
address = {Vancouver, British Columbia, Canada},
month = jul,
publisher = {Springer}
}
% Approved all correct
@inproceedings{alkaldi-16-adoption-phone-managers,
author = {Alkaldi, Nora and Renaud, Karen},
title = {{Why Do People Adopt, or Reject, Smartphone Password Managers?}},
booktitle = {European Workshop on Usable Security},
year = {2016},
series = {EuroUSEC~'16},
pages = {},
address = {Darmstadt, Germany},
month = jul,
publisher = {ISOC}
} % EuroUSEC/NDSS does not have page numbers
% Approved all correct
@inproceedings{almuhimedi-14-malware-warning,
author = {Almuhimedi, Hazim and Felt, Adrienne Porter and Reeder, Robert W. and Consolvo, Sunny},
title = {{Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning}},
booktitle = {Symposium on Usable Privacy and Security},
year = {2014},
series = {SOUPS~'14},
pages = {113--128},
address = {Menlo Park, California, USA},
month = jul,
publisher = {USENIX}
}
% Approved all correct
@article{alsaleh-12-online-guessing,
author = {Alsaleh, Mansour and Mannan, Mohammad and Van Oorschot, Paul C.},
title = {{Revisiting Defenses against Large-Scale Online Password Guessing Attacks}},
journal = {IEEE Transactions on Dependable and Secure Computing},
year = {2012},
volume = {9},
number = {1},
pages = {128--141},
month = jan,
publisher = {IEEE}
}
% Approved all correct
@misc{amitay-11-iphone-pins,
author = {Amitay, Daniel},
title = {{Most Common iPhone Passcodes}},
note = {\url{http://danielamitay.com/blog/2011/6/13/most-common-iphone-passcodes}, as of \today},
month = jun,
year = {2011}
}
% Approved all correct
@inproceedings{ammari-15-children-identity,
author = {Ammari, Tawfiq and Kumar, Priya and Lampe, Cliff and Schoenebeck, Sarita},
title = {{Managing Children's Online Identities: How Parents Decide What to Disclose about Their Children Online}},
booktitle = {ACM Conference on Human Factors in Computing Systems},
year = {2015},
series = {CHI~'15},
pages = {1895--1904},
address = {Seoul, Republic of Korea},
month = apr,
publisher = {ACM}
}
% Approved all correct
@techreport{anderson-17-older-tech-climb,
author = {Anderson, Monica and Perrin, Andrew},
title = {{Tech Adoption Climbs Among Older Adults}},
institution = {Pew Research Center},
year = {2017},
type = {Technical Report},
number = {PRC-2017-05-17},
month = may
}
% Approved all correct
@inproceedings{andow-19-policylint,
author = {Andow, Benjamin and Mahmud, Samin Yaseer and Wang, Wenyu and Whitaker, Justin and Enck, William and Reaves, Bradley and Singh, Kapil and Xie, Tao},
title = {{PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play}},
booktitle = {USENIX Security Symposium},
year = {2019},
series = {SSYM~'19},
pages = {585--602},
address = {Santa Clara, California, USA},
month = aug,
publisher = {USENIX}
}
% Approved all correct
@inproceedings{andow-20-policheck,
author = {Andow, Benjamin and Mahmud, Samin Yaseer and Whitaker, Justin and Enck, William and Reaves, Bradley and Singh, Kapil and Egelman, Serge},
title = {{Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck}},
booktitle = {USENIX Security Symposium},
year = {2020},
series = {SSYM~'20},
pages = {985--1002},
address = {Virtual Conference},
month = aug,
publisher = {USENIX}
}
% Approved all correct
@inproceedings{andriotis-13-pilot-study,
author = {Andriotis, Panagiotis and Tryfonas, Theo and Oikonomou, George and Yildiz, Can},
title = {{A Pilot Study on the Security of Pattern Screen-Lock Methods and Soft Side Channel Attacks}},
booktitle = {ACM Conference on Security and Privacy in Wireless and Mobile Networks},
year = {2013},
series = {WiSec~'13},
pages = {1--6},
address = {Budapest, Hungary},
month = apr,
publisher = {ACM}
}
% Approved all correct
@inproceedings{andriotis-14-pattern-psm,
author = {Andriotis, Panagiotis and Tryfonas, Theo and Oikonomou, George},
title = {{Complexity Metrics and User Strength Perceptions of the Pattern-Lock Graphical Authentication Method}},
booktitle = {Conference on Human Aspects of Information Security, Privacy and Trust},
year = {2014},
series = {HAS~'14},
pages = {115--126},
address = {Heraklion, Crete, Greece},
month = jun,
publisher = {Springer}
}
% Approved all correct
@misc{android-18-gatekeeper,
author = {{Android Open Source Project}},
title = {{Android 9 -- ``Pie'': GateKeeper -- ComputeRetryTimeout Function}},
note = {\url{https://android.googlesource.com/platform/system/gatekeeper/+/pie-release/gatekeeper.cpp\#253}, as of \today},
month = feb,
year = {2018}
}
% Approved all correct
@misc{android-18-masterkey,
author = {{Android Open Source Project}},
title = {{Full-Disk Encryption -- Storing the Encrypted Key}},
note = {\url{https://source.android.com/security/encryption/full-disk\#storing_the_encrypted_key}, as of \today},
month = aug,
year = {2018}
}
% Approved all correct
@inproceedings{anell-20-threats,
author = {Anell, Simon and Gr\"{o}ber, Lea and Krombholz, Katharina},
title = {{End User and Expert Perceptions of Threats and Potential Countermeasures}},
booktitle = {IEEE European Symposium on Security and Privacy Workshops},
year = {2020},
series = {EuroS\&PW~'20},
pages = {230--239},
address = {Genoa, Italy},
month = sep,
publisher = {IEEE}
}
% Approved all correct
@inproceedings{angulo-15-data-track,
author = {Angulo, Julio and Fischer-H\"{u}bner, Simone and Pulls, Tobias and W\"{a}stlund, Erik},
title = {{Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures}},
booktitle = {ACM Conference Extended Abstracts on Human Factors in Computing Systems},
year = {2015},
series = {CHI~EA~'15},
pages = {1803--1808},
address = {Seoul, Republic of Korea},
month = apr,
publisher = {ACM}
}
% Approved all correct
@inproceedings{aonzo-18-phishing-pw-android,
author = {Aonzo, Simone and Merlo, Alessio and Tavella, Giulio and Fratantonio, Yanick},
title = {{Phishing Attacks on Modern Android}},
booktitle = {ACM Conference on Computer and Communications Security},
year = {2018},
series = {CCS~'18},
pages = {1788--1801},
address = {Toronto, Ontario, Canada},
month = oct,
publisher = {ACM}
}
% Approved all correct
@misc{apple-18-ios-security,
author = {{Apple, Inc.}},
title = {{iOS Security: iOS 12.1}},
note = {\url{https://www.apple.com/business/site/docs/iOS_Security_Guide.pdf}, as of \today},
month = nov,
year = {2018}
}
% Approved all correct
@misc{apple-20-manager-quirks,
author = {{Apple, Inc.}},
title = {{Password Manager Resources}},
note = {\url{https://opensource.apple.com/projects/password-manager-resources/}, as of \today},
month = may,
year = {2020}
}
% Approved all correct
@misc{apple-21-hide-my-email,
author = {{Apple, Inc.}},
title = {{What is Hide My Email?}},
note = {\url{https://support.apple.com/en-us/HT210425}, as of \today},
month = sep,
year = {2021}
}
% Approved all correct
@article{arora-22-fido-recovery,
author = {Arora, Sunpreet S. and Badrinarayanan, Saikrishna and Raghuraman, Srinivasan and Shirvanian, Maliheh and Wagner, Kim and Watson, Gaven},
title = {{Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures}},
journal = {Cryptology ePrint Archive},
year = {2022},
volume = {2022/1555},
number = {},
pages = {1--46},
month = nov
} % UPDATE REQUIERED
% Approved all correct
@inproceedings{aviv-10-smudge,
author = {Aviv, Adam J. and Gibson, Katherine and Mossop, Evan and Blaze, Matt and Smith, Jonathan M.},
title = {{Smudge Attacks on Smartphone Touch Screens}},
booktitle = {USENIX Workshop on Offensive Technologies},
year = {2010},
series = {WOOT~'10},
pages = {1--7},
address = {Washington, District of Columbia, USA},
month = aug,
publisher = {USENIX}
}
% Approved all correct
@inproceedings{aviv-14-pattern-perception,
author = {Aviv, Adam J. and Fichter, Dane},
title = {{Understanding Visual Perceptions of Usability and Security of Android's Graphical Password Pattern}},
booktitle = {Annual Computer Security Applications Conference},
year = {2014},
series = {ACSAC~'14},
pages = {286--295},
address = {New Orleans, Louisiana, USA},
month = dec,
publisher = {ACM}
}
% Approved all correct
@inproceedings{aviv-15-pattern-bigger,
author = {Aviv, Adam J. and Budzitowski, Devon and Kuber, Ravi},
title = {{Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock}},
booktitle = {Annual Computer Security Applications Conference},
year = {2015},
series = {ACSAC~'15},
pages = {301--310},
address = {Los Angeles, California, USA},
month = dec,
publisher = {ACM}
}
% Approved all correct
@inproceedings{aviv-16-culture,
author = {Aviv, Adam J. and D\"urmuth, Markus and Gupta, Payas},
title = {{Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords}},
booktitle = {Who Are You?! Adventures in Authentication Workshop},
year = {2016},
series = {WAY~'16},
pages = {},
address = {Denver, Colorado, USA},
month = jun,
publisher = {USENIX}
} % No page numbers for this workshop
% Approved all correct
@inproceedings{aviv-17-shoulder-surfing-baseline,
author = {Aviv, Adam J. and Davin, John T. and Wolf, Flynn and Kuber, Ravi},
title = {{Towards Baselines for Shoulder Surfing on Mobile Authentication}},
booktitle = {Annual Conference on Computer Security Applications},
year = {2017},
series = {ACSAC~'17},
pages = {486--498},
address = {Orlando, Florida, USA},
month = dec,
publisher = {ACM}
}
% Approved all correct
@article{aviv-18-pattern-sok,
author = {Aviv, Adam J. and D\"urmuth, Markus},
title = {{A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns}},
journal = {CoRR},
year = {2018},
volume = {abs/1811.10548},
number = {},
pages = {1--20},
month = nov
}
% Approved all correct
@inproceedings{bailey-14-glass,
author = {Bailey, Daniel and D\"{u}rmuth, Markus and Paar, Christof},
title = {{``Typing'' Passwords With Voice Recognition: How to Authenticate to Google Glass}},
booktitle = {Who Are You?! Adventures in Authentication Workshop},
year = {2014},
series = {WAY~'14},
pages = {1--2},
address = {Menlo Park, California, USA},
month = jul,
publisher = {}
} % No publisher
% Approved all correct
@inproceedings{bailey-14-financial,
author = {Bailey, Daniel V. and D{\"u}rmuth, Markus and Paar, Christof},
title = {{Statistics on Password Re-use and Adaptive Strength for Financial Accounts}},
booktitle = {Security and Cryptography for Networks},
year = {2014},
series = {SCN~'14},
pages = {218--235},
address = {Amalfi, Italy},
month = sep,
publisher = {Springer}
}
% Approved all correct
@misc{baines-21-princeton-radboud-study,
author = {Baines, Jon},
title = {{Data Ethics Concerns Halt Academic Study into Subject Access Requests}},
note = {\url{https://www.mishcon.com/news/data-ethics-concerns-halt-academic-study-into-subject-access-requests}, as of \today},
month = dec,
year = {2021}
}
% Approved all correct
@misc{baraniuk-15-ashley-suicides,
author = {Baraniuk, Chris},
title = {{Ashley Madison: 'Suicides' over Website Hack}},
note = {\url{https://www.bbc.com/news/technology-34044506}, as of \today},
month = aug,
year = {2015}
}
% Approved all correct
@techreport{bauer-13-warning-guidelines,
author = {Bauer, Lujo and Bravo-Lillo, Cristian and Cranor, Lorrie and Fragkaki, Elli},
title = {{Warning Design Guidelines}},
institution = {Carnegie Mellon University},
year = {2013},
type = {Technical Report},
number = {CMU-CyLab-13-002},
month = feb
}
% Approved all correct
@inproceedings{bauer-13-single-sign-on,
author = {Bauer, Lujo and Bravo-Lillo, Cristian and Fragkaki, Elli and Melicher, William},
title = {{A Comparison of Users' Perceptions of and Willingness to Use Google, Facebook, and Google+ Single-sign-on Functionality}},
booktitle = {Workshop on Digital Identity Management},
year = {2013},
series = {DIM~'13},
pages = {25--36},
address = {Berlin, Germany},
month = nov,
publisher = {ACM}
}
% Approved all correct
@inproceedings{beautement-08-budget,
author = {Beautement, Adam and Sasse, M. Angela and Wonham, Mike},
title = {{The Compliance Budget: Managing Security Behaviour in Organisations}},
booktitle = {New Security Paradigms Workshop},
year = {2008},
series = {NSPW~'08},
pages = {47--58},
address = {Lake Tahoe, California, USA},
month = sep,
publisher = {ACM}
}
% Approved all correct
@inproceedings{becerra-18-honeypakes,
author = {Becerra, Jos\'e and R{\o}nne, Peter B. and Ryan, Peter Y. A. and Sala, Petra},
title = {{HoneyPAKEs}},
booktitle = {International Workshop on Security Protocols},
year = {2018},
series = {Security~Protocols~'18},
pages = {63--77},
address = {Cambridge, United Kingdom},
month = mar,
publisher = {Springer}
}
% Approved all correct
@misc{belfiore-15-microsoft-windows-hello,
author = {Belfiore, Joe},
title = {{Making Windows 10 More Personal and More Secure with Windows Hello}},
note = {\url{https://blogs.windows.com/windowsexperience/2015/03/17/making-windows-10-more-personal-and-more-secure-with-windows-hello/}, as of \today},
month = mar,
year = {2015}
}
% Approved all correct
@inproceedings{bellare-93-entity-auth,
author = {Bellare, Mihir and Rogaway, Phillip},
title = {{Entity Authentication and Key Distribution}},
booktitle = {Advances in Cryptology -- {CRYPTO}~1993},
year = {1993},
series = {CRYPTO~'93},
pages = {232--249},
address = {Santa Barbara, California, USA},
month = aug,
publisher = {Springer}
}
% Approved all correct
@inproceedings{bellovin-92-eke,
author = {Bellovin, Steven M. and Merritt, Michael},
title = {{Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks}},
booktitle = {IEEE Symposium on Security and Privacy},
year = {1992},
series = {SP~'92},
pages = {72--84},
address = {Oakland, California, USA},
month = may,
publisher = {IEEE}
}
% Approved all correct
@inproceedings{bhagavatula-15-biometric-iphone,
author = {Bhagavatula, Chandrasekhar and Ur, Blase and Iacovino, Kevin and Kywey, Su Mon and Cranor, Lorrie Faith and Savvides, Marios},
title = {{Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption}},
booktitle = {Workshop on Usable Security},
year = {2015},
series = {USEC~'15},
pages = {},
address = {San Diego, California, USA},
month = feb,
publisher = {ISOC}
} % USEC does not have page numbers
% Approved all correct
@inproceedings{bhagavatula-20-change-after-breach,
author = {Bhagavatula, Sruti and Bauer, Lujo and Kapadia, Apu},
title = {{(How) Do People Change Their Passwords After a Breach?}},
booktitle = {Workshop on Technology and Consumer Protection},
year = {2020},
series = {ConPro~'20},
pages = {},
address = {Virtual Conference},
month = may,
publisher = {IEEE}
} % ConPro does not have page numbers
% Approved all correct
@inproceedings{bhagavatula-21-what-breach,
author = {Bhagavatula, Sruti and Bauer, Lujo and Kapadia, Apu},
title = {{What Breach? Measuring Online Awareness of Security Incidents by Studying Real-World Browsing Behavior}},
booktitle = {European Workshop on Usable Security},
year = {2021},
series = {EuroUSEC~'21},
pages = {180--199},
address = {Virtual Conference},
month = oct,
publisher = {ACM}
}
% Approved all correct
@article{biddle-12-graphical-survey,
author = {Biddle, Robert and Chiasson, Sonia and Van Oorschot, Paul C.},
title = {{Graphical Passwords: Learning from the First Twelve Years}},
journal = {ACM Computing Surveys},
year = {2012},
volume = {44},
number = {4},
pages = {19:1--19:41},
month = aug,
publisher = {ACM}
}
% Approved all correct
@inproceedings{bielova-17-web-tracking,
author = {Bielova, Nataliia},
title = {{Web Tracking Technologies and Protection Mechanisms}},
booktitle = {ACM Conference on Computer and Communications Security},
year = {2017},
series = {CCS~'17},
pages = {2607--2609},
address = {Dallas, Texas, USA},
month = oct,
publisher = {ACM}
}
% Approved all correct
@misc{biggs-17-river-city-media,
author = {Biggs, John},
title = {{Spammers Expose Over a Billion Email Addresses After Failed Backup}},
note = {\url{https://techcrunch.com/2017/03/06/spammers-expose-billions-of-emails-after-failed-backup/}, as of \today},
month = mar,
year = {2017}
}
% Approved all correct
@misc{biryukov-15-argon2,
author = {Biryukov, Alex and Dinu, Daniel and Khovratovich, Dmitry},
title = {{Argon2: The Memory-Hard Function for Password Hashing and Other Applications}},
note = {\url{https://github.com/P-H-C/phc-winner-argon2}, as of \today},
month = jul,
year = {2015}
}
% Approved all correct
@article{bishop-95-proactive-checking,
author = {Bishop, Matt and Klein, Daniel V.},
title = {{Improving System Security via Proactive Password Checking}},
journal = {Computers \& Security},
year = {1995},
volume = {14},
number = {3},
pages = {233--249},
month = {},
publisher = {Elsevier}
} % Elsevier does not report the month when the issue was published
% Approved all correct
@article{bland-97-cronbach,
author = {Bland, J. Martin and Altman, Douglas G.},
title = {{Statistics Notes: Cronbach's Alpha}},
journal = {The BMJ},
year = {1997},
volume = {314},
number = {7080},
pages = {572--572},
month = feb,
publisher = {BMA}
}
% Approved all correct
@inproceedings{blocki-13-rehearsing-pw,
author = {Blocki, Jeremiah and Blum, Manuel and Datta, Anupam},
title = {{Naturally Rehearsing Passwords}},
booktitle = {Advances in Cryptology -- {ASIACRYPT}~2013, Part II},
year = {2013},
series = {ASIACRYPT~'13},
pages = {361--380},
address = {Bangalore, India},
month = dec,
publisher = {Springer}
}
% Approved all correct
@inproceedings{blocki-15-pao,
author = {Blocki, Jeremiah and Komanduri, Saranga and Cranor, Lorrie Faith and Datta, Anupam},
title = {{Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords}},
booktitle = {Symposium on Network and Distributed System Security},
year = {2015},
series = {NDSS~'15},
pages = {},
address = {San Diego, California, USA},
month = feb,
publisher = {ISOC}
} % NDSS does not have page numbers
% Approved all correct
@inproceedings{blocki-16-differential-private,
author = {Blocki, Jeremiah and Datta, Anupam and Bonneau, Joseph},
title = {{Differentially Private Password Frequency Lists}},
booktitle = {Symposium on Network and Distributed System Security},
year = {2016},
series = {NDSS~'16},
pages = {},
address = {San Diego, California, USA},
month = feb,
publisher = {ISOC}
} % NDSS does not have page numbers
% Approved all correct
@inproceedings{blocki-18-economics-cracking,
author = {Blocki, Jeremiah and Harsha, Ben and Zhou, Samson},
title = {{On the Economics of Offline Password Cracking}},
booktitle = {IEEE Symposium on Security and Privacy},
year = {2018},
series = {SP~'18},
pages = {35--53},
address = {San Francisco, California, USA},
month = may,
publisher = {IEEE}
}
% Approved all correct
@inproceedings{blocki-19-dalock,
author = {Blocki, Jeremiah and Zhang, Wuwei},
title = {{DALock: Password Distribution Aware Throttling}},
booktitle = {Who Are You?! Adventures in Authentication Workshop},
year = {2019},
series = {WAY~'19},
pages = {1--6},
address = {Santa Clara, California, USA},
month = aug,
publisher = {}
} % No publisher
% Approved all correct
@inproceedings{bock-17-uncaptcha,
author = {Bock, Kevin and Patel, Daven and Hughey, George and Levin, Dave},
title = {{unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge}},
booktitle = {USENIX Workshop on Offensive Technologies},
year = {2017},
series = {WOOT~'17},
pages = {},
address = {Vancouver, British Columbia, Canada},
month = aug,
publisher = {USENIX}
} % WOOT does not have page numbers
% Approved all correct
@misc{bohn-20-google-voice-opt-out,
author = {Bohn, Dieter},
title = {{Google Is Sending a Complicated Privacy Email to Everyone}},
note = {\url{https://www.theverge.com/2020/8/5/21354805/}, as of \today},
month = aug,
year = {2020}
}
% Approved all correct
@inproceedings{bojinov-10-kamouflage,
author = {Bojinov, Hristo and Bursztein, Elie and Boyen, Xavier and Boneh, Dan},
title = {{Kamouflage: Loss-Resistant Password Management}},
booktitle = {European Symposium on Research in Computer Security},
year = {2010},
series = {ESORICS~'10},
pages = {286--302},
address = {Athens, Greece},
month = sep,
publisher = {Springer}
}
% Approved all correct
@inproceedings{bojinov-12-rubber-hose,
author = {Bojinov, Hristo and Sanchez, Daniel and Reber, Paul and Boneh, Dan and Lincoln, Patrick},
title = {{Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks}},
booktitle = {USENIX Security Symposium},
year = {2012},
series = {SSYM~'12},
pages = {129--141},
address = {Bellevue, Washington, USA},
month = aug,
publisher = {USENIX}
}
% Approved all correct
@inproceedings{boneh-16-balloon-hashing,
author = {Boneh, Dan and Corrigan{-}Gibbs, Henry and Schechter, Stuart E.},
title = {{Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks}},
booktitle = {Advances in Cryptology -- {ASIACRYPT}~2016, Part I},
year = {2016},
series = {ASIACRYPT~'16},
pages = {220--248},
address = {Hanoi, Vietnam},
month = dec,
publisher = {Springer}
}
% Approved all correct
@inproceedings{bonneau-10-in-a-name,
author = {Bonneau, Joseph and Just, Mike and Matthews, Greg},
title = {{What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions}},
booktitle = {Financial Cryptography and Data Security},
year = {2010},
series = {FC~'10},
pages = {98--113},
address = {Tenerife, Canary Islands, Spain},
month = jan,
publisher = {Springer}
}
% Approved all correct
@inproceedings{bonneau-10-thicket,
author = {Bonneau, Joseph and Preibusch, S\"oren},
title = {{The Password Thicket: Technical and Market Failures in Human Authentication on the Web}},
booktitle = {Workshop on the Economics of Information Security},
year = {2010},
series = {WEIS~'10},
pages = {},
address = {Cambridge, Massachusetts, USA},
month = jun,
publisher = {ACM}
} % Co-located with ACM Electronic Commerce, no page numbers
% Approved all correct
@inproceedings{bonneau-12-linguistic-passphrases,
author = {Bonneau, Joseph and Shutova, Ekaterina},
title = {{Linguistic Properties of Multi-word Passphrases}},
booktitle = {Workshop on Usable Security},
year = {2012},
series = {USEC~'12},
pages = {1--12},
address = {Kralendijk, Bonaire},
month = mar,
publisher = {Springer}
}
% Approved all correct
@inproceedings{bonneau-12-pin,
author = {Bonneau, Joseph and Preibusch, S{\"o}ren and Anderson, Ross},
title = {{A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs}},
booktitle = {Financial Cryptography and Data Security},
year = {2012},
series = {FC~'12},
pages = {25--40},
address = {Kralendijk, Bonaire},
month = feb,
publisher = {Springer}
}
% Approved all correct
@inproceedings{bonneau-12-entropy,
author = {Bonneau, Joseph},
title = {{The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords}},
booktitle = {IEEE Symposium on Security and Privacy},
year = {2012},
series = {SP~'12},
pages = {538--552},
address = {San Jose, California, USA},
month = may,
publisher = {IEEE}
}
% Approved all correct
@inproceedings{bonneau-12-the-quest,
author = {Bonneau, Joseph and Herley, Cormac and Van Oorschot, Paul C. and Stajano, Frank},
title = {{The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes}},
booktitle = {IEEE Symposium on Security and Privacy},
year = {2012},
series = {SP~'12},
pages = {553--567},
address = {San Jose, California, USA},
month = may,
publisher = {IEEE}
}
% Approved all correct
@phdthesis{bonneau-12-phd-thesis,
author = {Bonneau, Joseph},
title = {{Guessing Human-Chosen Secrets}},
year = {2012},
school = {University of Cambridge}
}
% Approved all correct
@inproceedings{bonneau-14-rba-privacy,
author = {Bonneau, Joseph and Felten, Edward W. and Mittal, Prateek and Narayanan, Arvind},
title = {{Privacy Concerns of Implicit Secondary Factors for Web Authentication}},
booktitle = {Who Are You?! Adventures in Authentication Workshop},
year = {2014},
series = {WAY~'14},
pages = {1--2},
address = {Menlo Park, California, USA},
month = jul,
publisher = {}
} % No publisher
% Approved all correct
@inproceedings{bonneau-14-56bit,
author = {Bonneau, Joseph and Schechter, Stuart},
title = {{Towards Reliable Storage of 56-bit Secrets in Human Memory}},
booktitle = {USENIX Security Symposium},
year = {2014},
series = {SSYM~'14},
pages = {607--623},
address = {San Diego, California, USA},
month = aug,
publisher = {USENIX}
}
% Approved all correct
@inproceedings{bonneau-15-lies-and-account-recovery,
author = {Bonneau, Joseph and Bursztein, Elie and Caron, Ilan and Jackson, Rob and Williamson, Mike},
title = {{Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google}},
booktitle = {The World Wide Web Conference},
year = {2015},
series = {WWW~'15},
pages = {141--150},
address = {Florence, Italy},
month = may,
publisher = {ACM}
}
% Approved all correct
@article{bonneau-15-imperfect,
author = {Bonneau, Joseph and Herley, Cormac and Van Oorschot, Paul C. and Stajano, Frank},
title = {{Passwords and the Evolution of Imperfect Authentication}},
journal = {Communications of the ACM},
year = {2015},
volume = {58},
number = {7},
pages = {78--87},
month = jun,
publisher = {ACM}