Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition M Sharif, S Bhagavatula, L Bauer, MK Reiter Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 1817 | 2016 |
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ... 2012 IEEE Symposium on Security & Privacy, 523-537, 2012 | 605 | 2012 |
Of passwords and people: measuring the effect of password-composition policies S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011 | 575 | 2011 |
Encountering stronger password requirements: user attitudes and behaviors R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ... Proceedings of the sixth symposium on usable privacy and security, 1-20, 2010 | 482 | 2010 |
Edit automata: Enforcement mechanisms for run-time security policies J Ligatti, L Bauer, D Walker International Journal of Information Security 4, 2-16, 2005 | 446 | 2005 |
How does your password measure up? The effect of strength meters on password creation B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ... USENIX Security Symposium, 65-80, 2012 | 414 | 2012 |
Privacy expectations and preferences in an IoT world PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ... Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 399-412, 2017 | 359 | 2017 |
Fast, lean, and accurate: Modeling password guessability using neural networks W Melicher, B Ur, SM Segreti, S Komanduri, L Bauer, N Christin, ... 25th USENIX Security Symposium (USENIX Security '16), 175-191, 2016 | 340 | 2016 |
Measuring password guessability for an entire university ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 319 | 2013 |
I added ‘!’at the end to make it secure”: Observing password creation in the lab B Ur, F Noma, J Bees, SM Segreti, R Shay, L Bauer, N Christin, LF Cranor SOUPS, 2015 | 310 | 2015 |
Android taint flow analysis for app sets W Klieber, L Flynn, A Bhosale, L Jia, L Bauer Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of …, 2014 | 294 | 2014 |
Run-time enforcement of nonsafety policies J Ligatti, L Bauer, D Walker ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-41, 2009 | 257 | 2009 |
Composing security policies with Polymer L Bauer, J Ligatti, D Walker 2005 ACM SIGPLAN conference on Programming language design and …, 2005 | 242 | 2005 |
Do users' perceptions of password security match reality? B Ur, J Bees, SM Segreti, L Bauer, N Christin, LF Cranor Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016 | 231 | 2016 |
Measuring real-world accuracies and biases in modeling password guessability B Ur, SM Segreti, L Bauer, N Christin, LF Cranor, S Komanduri, D Kurilova, ... USENIX Security, 463-481, 2015 | 218 | 2015 |
Expandable grids for visualizing and authoring computer security policies RW Reeder, L Bauer, LF Cranor, MK Reiter, K Bacon, K How, H Strong Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008 | 203 | 2008 |
A general framework for adversarial examples with objectives M Sharif, S Bhagavatula, L Bauer, MK Reiter ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-30, 2019 | 199 | 2019 |
What matters to users? Factors that affect users' willingness to share information with online advertisers PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ... Proceedings of the Ninth Symposium on Usable Privacy and Security, 7, 2013 | 192 | 2013 |
Tag, you can see it! Using tags for access control in photo sharing P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012 | 188 | 2012 |
Access control for home data sharing: Attitudes, needs and practices ML Mazurek, JP Arsenault, J Bresee, N Gupta, I Ion, C Johns, D Lee, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010 | 186 | 2010 |