Adam J. Aviv

Orcid: 0000-0002-3792-2485

According to our database1, Adam J. Aviv authored at least 92 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions?
Proc. Priv. Enhancing Technol., 2024

Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
Proc. Priv. Enhancing Technol., 2024

Nudging Users to Change Breached Passwords Using the Protection Motivation Theory.
CoRR, 2024

"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

Position Paper: Exploring Security and Privacy Needs of d/Deaf Individuals.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

An Analysis of Password Managers' Password Checkup Tools.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches.
ACM Trans. Comput. Hum. Interact., October, 2023

Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
CoRR, 2023

Cadence: A Simulator for Human Movement-based Communication Protocols.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Educators' Perspectives of Using (or Not Using) Online Exam Proctoring.
Proceedings of the 32nd USENIX Security Symposium, 2023

"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

"Someone Definitely Used 0000": Strategies.
Proceedings of the 2023 European Symposium on Usable Security, 2023

"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Longitudinal Analysis of Privacy Labels in the Apple App Store.
CoRR, 2022

Investigating older adults' adoption and usage of online conferencing tools during COVID-19.
Proceedings of the W4A'22: 19th Web for All Conference, Lyon, France, April 25 - 26, 2022, 2022

"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits.
Proceedings of the 31st USENIX Security Symposium, 2022

Why Users (Don't) Use Password Managers at a Large Educational Institution.
Proceedings of the 31st USENIX Security Symposium, 2022

Security and Privacy Perceptions of Third-Party Application Access for Google Accounts.
Proceedings of the 31st USENIX Security Symposium, 2022

"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

User Perceptions of Five-Word Passwords.
Proceedings of the Annual Computer Security Applications Conference, 2022

User Perceptions of the Privacy and Usability of Smart DNS.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
On the Security of Smartphone Unlock PINs.
ACM Trans. Priv. Secur., 2021

"Warn Them" or "Just Block Them"?: Investigating Privacy Concerns Among Older and Working Age Adults.
Proc. Priv. Enhancing Technol., 2021

Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services.
Proc. Priv. Enhancing Technol., 2021

Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version).
CoRR, 2021

Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version).
CoRR, 2021

Security Obstacles and Motivations for Small Businesses from a CISO's Perspective.
Proceedings of the 30th USENIX Security Symposium, 2021

Strategies and Perceived Risks of Sending Sensitive Documents.
Proceedings of the 30th USENIX Security Symposium, 2021

Why Older Adults (Don't) Use Password Managers.
Proceedings of the 30th USENIX Security Symposium, 2021

"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them.
Proceedings of the 30th USENIX Security Symposium, 2021

Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity.
Proceedings of the 30th USENIX Security Symposium, 2021

Using a Blocklist to Improve the Security of User Selection of Android Patterns.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Improving Signal's Sealed Sender.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
This PIN Can Be Easily Guessed.
CoRR, 2020

This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Knock, Knock. Who's There? On the Security of LG's Knock Codes.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Twice as Nice? A Preliminary Evaluation of Double Android Unlock Patterns.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
rORAM: Efficient Range ORAM with O(log2 N) Locality.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

"Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

"Woe is me": Examining Older Adults' Perceptions of Privacy.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
A Video-based Attack for Android Pattern Lock.
ACM Trans. Priv. Secur., 2018

"It's all about the start" classifying eyes-free mobile authentication techniques.
J. Inf. Secur. Appl., 2018

Efficient Range ORAM with 핆(log<sup>2</sup>N) Locality.
IACR Cryptol. ePrint Arch., 2018

A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns.
CoRR, 2018

Classifying Eyes-Free Mobile Authentication Techniques.
CoRR, 2018

Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication.
CoRR, 2018

An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication.
Behav. Inf. Technol., 2018

Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Turboflow: information rich flow record generation on commodity switches.
Proceedings of the Thirteenth EuroSys Conference, 2018

How Do We Talk Ourselves Into These Things?
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Comparing Video Based Shoulder Surfing with Live Simulation.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Is Bigger Better When It Comes to Android Graphical Pattern Unlock?
IEEE Internet Comput., 2017

Deterministic, Stash-Free Write-Only ORAM.
IACR Cryptol. ePrint Arch., 2017

Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind.
Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility, 2017

Towards Baselines for Shoulder Surfing on Mobile Authentication.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Exploring large scale security system reproducibility with the LESS simulator.
J. Comput. Secur., 2016

ObliviSync: Practical Oblivious File Backup and Synchronization.
IACR Cryptol. ePrint Arch., 2016

Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication.
Proceedings of the 2nd Workshop on Security Information Workers, 2016

Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Enabling Practical Software-defined Networking Security Applications with OFX.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Timing SDN Control Planes to Infer Network Configurations.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

Timing-based reconnaissance and defense in software-defined networks.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Managing Cloud Storage Obliviously.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Cross-domain collaboration for improved IDS rule set selection.
J. Inf. Secur. Appl., 2015

A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.
IACR Cryptol. ePrint Arch., 2015

Oblivious Secure Deletion with Bounded History Independence.
CoRR, 2015

POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Measuring Privacy Disclosures in URL Query Strings.
IEEE Internet Comput., 2014

Privacy-aware message exchanges for HumaNets.
Comput. Commun., 2014

LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems.
Proceedings of the Computer Security - ESORICS 2014, 2014

Understanding visual perceptions of usability and security of Android's graphical password pattern.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

2012
Experiences in teaching an educational user-level operating systems implementation project.
ACM SIGOPS Oper. Syst. Rev., 2012

Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Proceedings of the Computer Security - ESORICS 2012, 2012

Practicality of accelerometer side channels on smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Challenges in Experimenting with Botnet Detection Systems.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

2010
Smudge Attacks on Smartphone Touch Screens.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010

Evading Cellular Data Monitoring with Human Movement Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

Differential privacy for collaborative security.
Proceedings of the Third European Workshop on System Security, 2010

Spam mitigation using spatio-temporal reputations from blacklist history.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
QuanTM: a quantitative trust management system.
Proceedings of the Second European Workshop on System Security, 2009

2008
Security Evaluation of ES&S Voting Machines and Election Management System.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies.
Proceedings of the Usability, Psychology, and Security, 2008

2007
SSARES: Secure Searchable Automated Remote Email Storage.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007


  Loading...