Lachlan Moore, Tatsuya Mori (Waseda University, NICT)

This study delves into the utilization patterns, perceptions, and misconceptions surrounding Virtual Private Networks (VPNs) among users in Canada and Japan. We administered a comprehensive survey to 234 VPN users in these two countries, aiming to elucidate the motivations behind VPN usage, users’ comprehension of VPN functionality, and prevalent misconceptions. A distinctive feature of our research lies in its cross-cultural comparison, a departure from previous studies predominantly centered on users within a Western context. Our findings underscore noteworthy distinctions among participant groups. Specifically, Japanese users predominantly employ VPNs for security purposes, whereas Canadian users leverage VPNs for a more diverse array of services, encompassing privacy and access to region-specific content. Furthermore, disparities in VPN understanding emerged, with Canadians demonstrating a superior grasp of VPN applications despite limited technical knowledge, while Japanese participants exhibited a more profound understanding of VPNs, particularly in relation to encrypting transmitted traffic. Notably, both groups exhibited a constrained awareness regarding the data logging practices associated with VPNs. This research significantly contributes to the broader comprehension of VPN usage and sheds light on the cultural intricacies that shape VPN adoption and perceptions, offering valuable insights into the diverse motivations and behaviors of users in Canada and Japan.

View More Papers

WIP: Modeling and Detecting Falsified Vehicle Trajectories Under Data...

Jun Ying, Yiheng Feng (Purdue University), Qi Alfred Chen (University of California, Irvine), Z. Morley Mao (University of Michigan and Google)

Read More

Kids, Cats, and Control: Designing Privacy and Security Dashboard...

Jacob Abbott (Indiana University), Jayati Dev (Indiana University), DongInn Kim (Indiana University), Shakthidhar Reddy Gopavaram (Indiana University), Meera Iyer (Indiana University), Shivani Sadam (Indiana University) , Shirang Mare (Western Washington University), Tatiana Ringenberg (Purdue University), Vafa Andalibi (Indiana University), and L. Jean Camp(Indiana University)

Read More

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Rui Zhu (Indiana University Bloominton), Di Tang (Indiana University Bloomington), Siyuan Tang (Indiana University Bloomington), Zihao Wang (Indiana University Bloomington), Guanhong Tao (Purdue University), Shiqing Ma (University of Massachusetts Amherst), XiaoFeng Wang (Indiana University Bloomington), Haixu Tang (Indiana University, Bloomington)

Read More

Large Language Model guided Protocol Fuzzing

Ruijie Meng (National University of Singapore, Singapore), Martin Mirchev (National University of Singapore), Marcel Böhme (MPI-SP, Germany and Monash University, Australia), Abhik Roychoudhury (National University of Singapore)

Read More