Symposium on Usable Security and Privacy (USEC) 2024 Accepted Papers

View the detailed program page to learn when each paper will be presented during the upcoming event.

“I used to live in Florida”: Exploring the...

Imani N. S. Munyaka (University of California, San Diego), Daniel A Delgado, Juan Gilbert,...

More Details

A Comparison of Three Approaches to Assist Users...

Michael Clark (Brigham Young University), Scott Ruoti (The University of Tennessee), Michael Mendoza (Imperial...

More Details

AdvCAPTCHA: Creating Usable and Secure Audio CAPTCHA with...

Hao-Ping (Hank) Lee (Carnegie Mellon University), Wei-Lun Kao (National Taiwan University), Hung-Jui Wang (National...

More Details

Exploring Phishing Threats through QR Codes in Naturalistic...

Filipo Sharevski (DePaul University), Mattia Mossano, Maxime Fabian Veit, Gunther Schiefer, Melanie Volkamer (Karlsruhe...

More Details

EyeSeeIdentity: Exploring Natural Gaze Behaviour for Implicit User...

L Yasmeen Abdrabou (Lancaster University), Mariam Hassib (Fortiss Research Institute of the Free State...

More Details

MacOS versus Microsoft Windows: A Study on the...

Cem Topcuoglu (Northeastern University), Andrea Martinez (Florida International University), Abbas Acar (Florida International University),...

More Details

Measuring the Prevalence of Password Manager Issues Using...

Adryana Hutchinson (The George Washington University), Jinwei Tang (Clark University), Adam Aviv (The George...

More Details

Programmer's Perception of Sensitive Information in Code

Xinyao Ma, Ambarish Aniruddha Gurjar, Anesu Christopher Chaora, Tatiana R Ringenberg, L. Jean Camp...

More Details

The Impact of Workload on Phishing Susceptibility: An...

Sijie Zhuo (University of Auckland), Robert Biddle (University of Auckland and Carleton University, Ottawa),...

More Details

Towards Integrating Human-Centered Cybersecurity Research Into Practice: A...

Julie Haney, Clyburn Cunningham, Susanne Furman (National Institute of Standards and Technology)

More Details

Towards Real-time Voice Interaction Data Collection Monitoring and...

Tu Le (University of California, Irvine), Zixin Wang (Zhejiang University), Danny Yuxing Huang (New...

More Details

Under Pressure: Effectiveness and Usability of the Apple...

Elina van Kempen, Zane Karl, Richard Deamicis, Qi Alfred Chen (UC Irivine)

More Details

Vision: “AccessFormer”: Feedback-Driven Access Control Policy

Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello (University of Auckland)

More Details

Vision: An Exploration of Online Toxic Content Against...

Arjun Arunasalam (Purdue University), Habiba Farrukh (University of California, Irvine), Eliz Tekcan (Purdue University),...

More Details

Vision: Towards Fully Shoulder-Surfing Resistant and Usable Authentication...

Tobias Länge (Karlsruhe Institute of Technology), Philipp Matheis (Karlsruhe Institute of Technology), Reyhan Düzgün...

More Details

VPN Awareness and Misconceptions: A Comparative Study in...

Lachlan Moore, Tatsuya Mori (Waseda University, NICT)

More Details

Why People Still Fall for Phishing Emails: An...

Asangi Jayatilaka (Centre for Research on Engineering Software Technologies (CREST), The University of Adelaide,...

More Details