Rethinking Access Control and Authentication for the Home Internet of Things (IoT) W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur USENIX Security Symposium (SSYM), 255-272, 2018 | 271 | 2018 |
On the Accuracy of Password Strength Meters M Golla, M Dürmuth Conference on Computer and Communications Security (CCS), 1567-1582, 2018 | 113 | 2018 |
"What was that site doing with my Facebook password?" Designing Password-Reuse Notifications M Golla, M Wei, J Hainline, L Filipe, M Dürmuth, E Redmiles, B Ur Conference on Computer and Communications Security (CCS) & 🏆 Best Poster …, 2018 | 72 | 2018 |
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv Symposium on Security and Privacy (SP), 286-303, 2020 | 68 | 2020 |
Exploring Accidental Triggers of Smart Speakers L Schönherr, M Golla, T Eisenhofer, J Wiele, D Kolossa, T Holz Computer Speech & Language, 101328, 2021 | 66* | 2021 |
On the Security of Cracking-Resistant Password Vaults M Golla, B Beuscher, M Dürmuth Conference on Computer and Communications Security (CCS), 1230-1241, 2016 | 51 | 2016 |
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google’s My Activity FM Farke, DG Balash, M Golla, M Dürmuth, AJ Aviv USENIX Security Symposium (SSYM), 483-500, 2021 | 40 | 2021 |
Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns M Golla, G Ho, M Lohmus, M Pulluri, EM Redmiles USENIX Security Symposium (SSYM), 109-126, 2021 | 39 | 2021 |
“It’s Stored, Hopefully, on an Encrypted Server”: Mitigating Users’ Misconceptions About FIDO2 Biometric WebAuthn L Lassak, A Hildebrandt, M Golla, B Ur USENIX Security Symposium (SSYM), 91-108, 2021 | 36 | 2021 |
Reasoning Analytically About Password-Cracking Software E Liu, A Nakanishi, M Golla, D Cash, B Ur Symposium on Security and Privacy (SP), 1272-1289, 2019 | 35 | 2019 |
Towards Implicit Visual Memory-Based Authentication C Castelluccia, M Dürmuth, M Golla, F Deniz Network and Distributed System Security Symposium (NDSS), 2017 | 31 | 2017 |
On the Security of Smartphone Unlock PINs P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-36, 2021 | 18 | 2021 |
Work in Progress: A Comparative Long-Term Study of Fallback Authentication P Markert, M Golla, E Stobert, M Dürmuth Workshop on Usable Security and Privacy (USEC), 2019 | 18* | 2019 |
"Will Any Password Do?" Exploring Rate-Limiting on the Web M Golla, T Schnitzler, M Dürmuth Who Are You?! Adventures in Authentication (WAY), 2018 | 14* | 2018 |
EmojiAuth: Quantifying the Security of Emoji-based Authentication M Golla, D Detering, M Dürmuth Workshop on Usable Security (USEC), 2017 | 13 | 2017 |
Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters M Golla, J Rimkus, AJ Aviv, M Dürmuth Workshop on Usable Security and Privacy (USEC), 2019 | 11* | 2019 |
"We may share the number of diaper changes": A Privacy and Security Analysis of Mobile Child Care Applications M Gruber, C Höfig, M Golla, T Urban, M Große-Kampmann Privacy Enhancing Technologies Symposium (PETS), 394-414, 2022 | 10 | 2022 |
Analyzing 4 Million Real-World Personal Knowledge Questions (Short Paper) M Golla, M Dürmuth International Conference on Passwords (PASSWORDS), 39-44, 2015 | 10 | 2015 |
"As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based Authentication P Markert, T Schnitzler, M Golla, M Dürmuth Symposium on Usable Privacy and Security (SOUPS), 483-501, 2022 | 8 | 2022 |
"I want my money back!" Limiting Online Password-Guessing Financially M Golla, DV Bailey, M Dürmuth Who Are You?! Adventures in Authentication (WAY), 2017 | 8* | 2017 |