Safety Perceptions of Generative AI Conversational Agents: Uncovering Perceptual Differences in Trust, Risk, and Fairness
Jan Tolsdorf, The George Washington University; Alan F. Luo, University of Maryland; Monica Kodwani and Junho Eum, The George Washington University; Mahmood Sharif, Tel Aviv University; Michelle L. Mazurek, University of Maryland; Adam J. Aviv, The George Washington University
Shiny Shells, Rusty Cores: A Crowdsourced Security Evaluation of Integrated Web Browsers
Gertjan Franken, Pieter Claeys, Tom Van Goethem, and Lieven Desmet, DistriNet, KU Leuven
Playing in the Sandbox: A Study on the Usability of Seccomp
Maysara Alhindi and Joseph Hallett, University of Bristol
"Hello, is this Anna?": A First Look at Pig-Butchering Scams
Rajvardhan Oak and Zubair Shafiq, University of California, Davis
Unpacking the Social and Emotional Dimensions of Security and Privacy User Engagement
Nina Gerber, Technical University of Darmstadt; Verena Zimmermann, ETH Zurich; Alexandra von Preuschen, Justus-Liebig-University Gießen; Karen Renaud, University of Stathclyde
Can You Walk Me Through It? Explainable SMS Phishing Detection using LLM-based Agents
Yizhu Wang, Haoyu Zhai, Chenkai Wang, and Qingying Hao, University of Illinois Urbana-Champaign; Nick A. Cohen, Roopa Foulger, and Jonathan A. Handler, OSF Healthcare; Gang Wang, University of Illinois Urbana-Champaign
Compliance Illusion: Exploring Interactions Between Law Enforcement and Social Media Platforms in Addressing Non-Consensual Image Disclosure Abuse
Amna Batool and Kentaro Toyama, University of Michigan
Measuring NIST Authentication Standards Compliance by Higher Education Institutions
Noah Apthorpe and Boen Beavers, Colgate University; Yan Shvartzshnaider, York University; Brett Frischmann, Villanova University
Spy-oT: Understanding How Users Learn to Use Internet of Things Devices For Abusive Purposes
Kieron Ivy Turk and Alice Hutchings, University of Cambridge
Integrating Large Language Models into Security Incident Response
Kurt Thomas, Allison Woodruff, Patrick Kelley, Lambert Rosique, Diana Kramer, Ajay Narotam, and Elie Bursztein, Google
Smart Spaces, Private Lives: A Cross-Cultural Examination of Privacy Tension in Smart Homes
Yara Alsiyat, University of Oxford; Yuanhaur Chang and Ning Zhang, Washington University in St. Louis; Ivan Flechais, University of Oxford
Minoritised Ethnic People’s Security and Privacy Concerns and Responses towards Essential Online Services
Aunam Quyoum and Mark Wong, University of Glasgow; Sebati Ghosh and Siamak F. Shahandashti, University of York
Adopting AI to Protect Industrial Control Systems: Assessing Challenges and Opportunities from the Operators’ Perspective
Clement Fung, Eric Zeng, and Lujo Bauer, Carnegie Mellon University
"You go now! No trouble!" Understanding the Offboarding Process in Companies from an IT Security Perspective
Christina Winiker, Fraunhofer FKIE; Timo Jagusch, Larissa Weir, Nora Weidner, Florin Martius, and Christian Tiefenau, University of Bonn
Language as Lure: A Naturalistic Study on Pasifika Phishing Susceptibility
Eric Spero, Lucas Betts, Isa Seow, Eddie Fuatimau, Robert Biddle, Danielle Lottridge, and Giovanni Russello, University of Auckland
Design and Evaluation of Privacy-Preserving Protocols for Agent-Facilitated Mobile Money Services in Kenya
Karen Sowon, Indiana University; Collins W. Munyendo, The George Washington University; Lily Klucinec, Carnegie Mellon University; Eunice Maingi and Gerald Suleh, Strathmore University; Lorrie Faith Cranor and Giulia Fanti, Carnegie Mellon University; Conrad Tucker and Assane Gueye, Carnegie Mellon University-Africa
Trust-Enabled Privacy: Social Media Designs to Support Adolescent User Boundary Regulation
JaeWon Kim and Robert Wolfe, University of Washington; Ramya Bhagirathi Subramanian, Smarten Spaces; Mei-Hsuan Lee, National Renewable Energy Laboratory; Jessica Colnago, Federal Trade Commission; Alexis Hiniker, University of Washington
Youth-Centered GAI Risks (YAIR): A Taxonomy of Generative AI Risks from Empirical Data
Yaman Yu, Yiren Liu, Yuqi Zhang, Yun Huang, and Yang Wang, University of Illinois at Urbana–Champaign
User Understandings of Technical Terms in App Privacy Labels
Ryan Aubrey, Adrian Clement, Ishika Keswani, Eusila Kitur, Vivien Song, Kerick Walker, Nannapas Wonghirundacha, and Eleanor Birrell, Pomona College
Misuse, Misreporting, Misinterpretation of Statistical Methods in Usable Privacy and Security Papers
Jenny Tang, Lujo Bauer, and Nicolas Christin, Carnegie Mellon University
"We are not Future-ready": Understanding AI Privacy Risks and Existing Mitigation Strategies from the Perspective of AI Developers in Europe
Alexandra Klymenko and Stephen Meisenbacher, Technical University of Munich; Patrick Kelley, Sai Teja Peddinti, and Kurt Thomas, Google; Florian Matthes, Technical University of Munich
Replication: "No one can hack my mind" - 10 years later: An update and outlook on experts' and non-experts' security practices and advice
Anna-Marie Ortloff, University of Bonn; Jenny Tang, Carnegie Mellon University; Arthi Arumugam, Daniel Huschina, Lisa Geierhaas, and Florin Martius, University of Bonn; Luisa Jansen, University of Bern; Kolja von der Twer and Lilly Jungbluth, University of Bonn; Matthew Smith, University of Bonn, Fraunhofer FKIE, Code Intelligence
More than Usability: Differential Access to Digital Security and Privacy
Annalina Buckmann and Jan Magnus Nold, Ruhr University Bochum; Yasemin Acar, Paderborn University and The George Washington University; Yixin Zou, Max Planck Institute for Security and Privacy
“TikTok, Do Your Thing”: User Reactions to Social Surveillance in the Public Sphere
Meira Gilbert, Miranda Wei, and Lindah Kotut, University of Washington
Do You See If I See? Investigating Reciprocity in Interpersonal Access-Control Settings
Nathan Malkin, New Jersey Institute of Technology; Alan F. Luo, Evan J. Zhao, and Michelle L. Mazurek, University of Maryland
I never reuse passwords! Development and Validation of a Security and Privacy Social Desirability Scale (SP-SDS) for end users without a background in computer science
Laura Marie Abels, University of Bonn; Matthew Smith, University of Bonn, Fraunhofer FKIE, Code Intelligence; Anna-Marie Ortloff, University of Bonn
Victims, Vigilantes, and Advice Givers: An Analysis of Scam-Related Discourse on Reddit
Rajvardhan Oak and Zubair Shafiq, University of California, Davis
How Predatory Monetization Designs Manifest in Child-Friendly Video Games
Qiurong Song, Zinan Zhang, Rie Helene (Lindy) Hernandez, Xinning Gui, and Yubo Kou, The Pennsylvania State University
The more accounts I use, the less I have to think': A Longitudinal Study on the Usability of Password Managers for Novice Users
Patricia Arias Cabarcos, Paderborn University and KASTEL Security Research Labs; Peter Mayer, University of Southern Denmark and KIT, Germany
From TOTPs to Security Keys: Studying the Reality of Passwordless FIDO2 Authentication with PIN and Biometrics in a Corporate Environment
Leona Lassak, Nicklas Lindemann, and Marvin Kowalewski, Ruhr University Bochum