Lujo Bauer
Orcid: 0000-0002-8209-6792Affiliations:
- Carnegie Mellon University, USA
According to our database1,
Lujo Bauer
authored at least 125 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Group-based Robustness: A General Framework for Customized Robustness in the Real World.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized Deletion.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
2022
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Proc. Priv. Enhancing Technol., 2022
"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media.
Proc. ACM Hum. Comput. Interact., 2022
Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks.
Proceedings of the International Conference on Machine Learning, 2022
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics.
Proc. Priv. Enhancing Technol., 2021
"I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users.
Proc. Priv. Enhancing Technol., 2021
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention.
Pervasive Mob. Comput., 2021
Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning.
Proceedings of the WWW '21: The Web Conference 2021, 2021
What breach? Measuring online awareness of security incidents by studying real-world browsing behavior.
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
ACM Trans. Priv. Secur., 2019
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection.
CoRR, 2019
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers.
CoRR, 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Proc. ACM Hum. Comput. Interact., 2018
On the Suitability of L<sub>p</sub>-norms for Creating and Preventing Adversarial Examples.
CoRR, 2018
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition.
CoRR, 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
Proc. Priv. Enhancing Technol., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers.
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Internet Comput., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 3rd ACM SIGPLAN International Workshop on the State Of the Art in Java Program analysis, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 12th USENIX conference on File and Storage Technologies, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013
A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality.
Proceedings of the DIM'13, 2013
What you want is not what you get: predicting sharing policies for text-based content on facebook.
Proceedings of the AISec'13, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012
Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Discovering access-control misconfigurations: new approaches and evaluation methodologies.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
J. Commun. Networks, 2011
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning".
J. Autom. Reason., 2011
More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
ACM Trans. Softw. Eng. Methodol., 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the Computer Security, 2007
2006
Proceedings of the Computer Security, 2006
2005
Int. J. Inf. Sec., 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Computer Security, 2005
2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 11th USENIX Security Symposium, 2002
Proceedings of the Software Security -- Theories and Systems, 2002