Adam J. Aviv
Orcid: 0000-0002-3792-2485
According to our database1,
Adam J. Aviv
authored at least 92 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
How Does Connecting Online Activities to Advertising Inferences Impact Privacy Perceptions?
Proc. Priv. Enhancing Technol., 2024
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
"I would not install an app with this label": Privacy Label Impact on Risk Perception and Willingness to Install iOS Apps.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
2023
ACM Trans. Comput. Hum. Interact., October, 2023
Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies.
CoRR, 2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
"In Eighty Percent of the Cases, I Select the Password for Them": Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 European Symposium on Usable Security, 2023
"I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Poster: Longitudinal Measurement of the Adoption Dynamics in Apple's Privacy Label Ecosystem.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Investigating older adults' adoption and usage of online conferencing tools during COVID-19.
Proceedings of the W4A'22: 19th Web for All Conference, Lyon, France, April 25 - 26, 2022, 2022
"The Same PIN, Just Longer": On the (In)Security of Upgrading PINs from 4 to 6 Digits.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Security and Privacy Perceptions of Third-Party Application Access for Google Accounts.
Proceedings of the 31st USENIX Security Symposium, 2022
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
"Warn Them" or "Just Block Them"?: Investigating Privacy Concerns Among Older and Working Age Adults.
Proc. Priv. Enhancing Technol., 2021
Proc. Priv. Enhancing Technol., 2021
Security and Privacy Perceptions of Third-Party Application Access for Google Accounts (Extended Version).
CoRR, 2021
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version).
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
"Now I'm a bit angry: " Individuals' Awareness, Perception, and Responses to Data Breaches that Affected Them.
Proceedings of the 30th USENIX Security Symposium, 2021
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Examining the Examiners: Students' Privacy and Security Perceptions of Online Proctoring Services.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
"I have no idea what they're trying to accomplish: " Enthusiastic and Casual Signal Users' Understanding of Signal PINs.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
"Pretty Close to a Must-Have": Balancing Usability Desire and Security Concern in Biometric Adoption.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
J. Inf. Secur. Appl., 2018
IACR Cryptol. ePrint Arch., 2018
A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns.
CoRR, 2018
Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication.
CoRR, 2018
An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication.
Behav. Inf. Technol., 2018
Scaling Hardware Accelerated Network Monitoring to Concurrent and Dynamic Queries With *Flow.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the Thirteenth EuroSys Conference, 2018
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Internet Comput., 2017
Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
J. Comput. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
Preliminary Findings from an Exploratory Qualitative Study of Security-Conscious Users of Mobile Authentication.
Proceedings of the 2nd Workshop on Security Information Workers, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
J. Inf. Secur. Appl., 2015
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
LESS Is More: Host-Agent Based Simulator for Large-Scale Evaluation of Security Systems.
Proceedings of the Computer Security - ESORICS 2014, 2014
Understanding visual perceptions of usability and security of Android's graphical password pattern.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013
2012
Experiences in teaching an educational user-level operating systems implementation project.
ACM SIGOPS Oper. Syst. Rev., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011
2010
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Third European Workshop on System Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the Second European Workshop on System Security, 2009
2008
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the Usability, Psychology, and Security, 2008
2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007