Symposium on Usable Security and Privacy (USEC) 2026 Accepted Papers

VR ProfiLens: User Profiling Risks in Consumer Virtual Reality Apps
I. Jarin, O. Figueira, Y. Duan, T. Le, A. Markopoulou

From Awareness to Practice: A Survey of U.S. Users’ Privacy Perceptions in LLM Chatbots
E. Gumusel, Y. Yan, E. Otenen

From Scam to Safety: Participatory Design of Digital Privacy and Security Tools with International Students from Global South
S. Tabassum, N. Zare, C. Faklaris

UsersFirst in Practice: Evaluating a User-Centric Threat Modeling Taxonomy for Privacy Notice and Choice
A. Li, T. Wang, Y. Yang, M. Rivera-Lanas, D. Ghosh, H. Habib, L. Cranor, N. Sadeh

DuoLungo: Usability Study of Duo 2FA
R. Prapty, G. Tsudik

“I found the text to be encouraging” – Evaluating Different Password Strength Calculator Designs
R. Doneva, A. Hennig, P. Mayer

Analyzing Privacy Risks in Children’s Educational Apps in Australia
S. Jin, R. Masood, J. Lee, H. Paik

Adopt a PET! An Exploration of PETs, Policy, and Practicalities for Industry in Canada
M. Shafieinejad, X. He, B. Kacsmar

User Experiences with Suspicious Emails in Virtual Reality Headsets: A Study in Realistic Settings
F. Sharevski, J. Loop, S. Ferguson, V. Paneva

“These cameras are just like the Eye of Sauron”: A Socio-Technical Threat Model of AI-Driven Smart Home Devices for UK Domestic Workers
S. He, Y. Lei, X. Zhan, R. Abu-Salma, J. Such

Replication: A Study on How Users (Don’t) Use Password Managers
P. Charnsethikul, A. Fattepurkar, D. Desai, G. Lucas, J. Mirkovic

Usability Issues in Differential Privacy Libraries: A Study from a Developers’ Perspective
R. Mahankali, J. Hallett

U.S. Election Expert Perspectives on End-to-end Verifiable Voting Systems
J. Haney, S. Dawkins, S. Prettyman, M. Theofanos, K. Greene, K. Koskey, J. Jacobs

More than Meets the Eye: Understanding the Effect of Individual Objects on Perceived Visual Privacy
M. Akcay, S. Rao, A. Bakas, B. Atli

“Security issues should be addressed immediately regardless of who created it”: Sysadmins Security Vulnerability Ownership and Remediation Decisions
T. Bondar, H. Assal

From Paranoia to Compliance: The Bumpy Road of System Hardening Practices on Stack Exchange
N. Busch, P. Klostermeyer, J. Klemmer, Y. Acar, S. Fahl

“I wanted to buy Robux but got scammed for 10 dollars in Bitcoin”: Emerging adults’ experiences with crypto assets as teens
L. Klucinec, E. Young, E. Bouma-Sims, L. Cranor

What Are Brands Telling You About Smishing? A Cross-Industry Evaluation of Customer Guidance
D. Doshi, M. Tasnim, F. Landeros, C. Venkatesh, D. Timko, M. Rahman

The Rise of NSFW Generative AI Services on Mainstream Marketplaces: A Case Study of Fiverr
M. Dawoud, A. Cuevas, R. Raman

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges
K. Alasiri, R. Hasan

When Security Meets Usability: An Empirical Investigation of Post-Quantum Cryptography APIs
M. Toruan, D. Rathnaikage, S. Tseitkin, R. Zhao, N. Arachchilage

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice
A. Maloku, A. Klymenko, S. Meisenbacher, F. Matthes