[HTML][HTML] Phishing attacks survey: Types, vectors, and technical approaches

R Alabdan - Future internet, 2020 - mdpi.com
Phishing attacks, which have existed for several decades and continue to be a major
problem today, constitute a severe threat in the cyber world. Attackers are adopting multiple …

A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

Trauma-informed computing: Towards safer technology experiences for all

JX Chen, A McDonald, Y Zou, E Tseng… - Proceedings of the …, 2022 - dl.acm.org
Trauma is the physical, emotional, or psychological harm caused by deeply distressing
experiences. Research with communities that may experience high rates of trauma has …

Hidden voice commands

N Carlini, P Mishra, T Vaidya, Y Zhang… - 25th USENIX security …, 2016 - usenix.org
Voice interfaces are becoming more ubiquitous and are now the primary input method for
many devices. We explore in this paper how they can be attacked with hidden voice …

A comprehensive quality evaluation of security and privacy advice on the web

EM Redmiles, N Warford, A Jayanti, A Koneru… - 29th USENIX Security …, 2020 - usenix.org
End users learn defensive security behaviors from a variety of channels, including a plethora
of security advice given in online articles. A great deal of effort is devoted to getting users to …

Android permissions: User attention, comprehension, and behavior

AP Felt, E Ha, S Egelman, A Haney, E Chin… - Proceedings of the …, 2012 - dl.acm.org
Android's permission system is intended to inform users about the risks of installing
applications. When a user installs an application, he or she has the opportunity to review the …

{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices

I Ion, R Reeder, S Consolvo - … On Usable Privacy and Security (SOUPS …, 2015 - usenix.org
The state of advice given to people today on how to stay safe online has plenty of room for
improvement. Too many things are asked of them, which may be unrealistic, time …

Control versus effort in privacy warnings for webforms

K Krol, S Preibusch - Proceedings of the 2016 ACM on Workshop on …, 2016 - dl.acm.org
Webforms are the primary way of collecting information online. However, some users may
wish to limit the amount of personal information they provide and only fill out the minimum …

Why Eve and Mallory love Android: An analysis of Android SSL (in) security

S Fahl, M Harbach, T Muders, L Baumgärtner… - Proceedings of the …, 2012 - dl.acm.org
Many Android apps have a legitimate need to communicate over the Internet and are then
responsible for protecting potentially sensitive data during transit. This paper seeks to better …

Alice in warningland: a {Large-Scale} field study of browser security warning effectiveness

D Akhawe, AP Felt - … USENIX Security Symposium (USENIX Security 13), 2013 - usenix.org
We empirically assess whether browser security warnings are as ineffective as suggested by
popular opinion and previous literature. We used Mozilla Firefox and Google Chrome's in …