Scott Ruoti

Orcid: 0000-0002-6917-4186

According to our database1, Scott Ruoti authored at least 48 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring Crowdworkers' Perceptions, Current Practices, and Desired Practices Regarding Using Non-Workstation Devices for Crowdwork.
CoRR, 2024

Unveiling the Inter-Related Preferences of Crowdworkers: Implications for Personalized and Flexible Platform Design.
CoRR, 2024

A Large-Scale Survey of Password Entry Practices on Non-Desktop Devices.
CoRR, 2024

Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers.
CoRR, 2024

Security Advice for Parents and Children About Content Filtering and Circumvention as Found on YouTube and TikTok.
CoRR, 2024

Ocassionally Secure: A Comparative Analysis of Code Generation Assistants.
CoRR, 2024

2023
"If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Improving Password Generation Through the Design of a Password Composition Policy Description Language.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Beyond a One-Size-Fits-All Approach: Towards Personalizing Multi-device Setups in Crowdwork.
Proceedings of the Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers, 2022

"It Basically Started Using Me: " An Observational Study of Password Manager Usage.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
SoK: Securing Email - A Stakeholder-Based Analysis.
Proceedings of the Financial Cryptography and Data Security, 2021

Systematization of Password ManagerUse Cases and Design Paradigms.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
SenCAPTCHA: A Mobile-First CAPTCHA Using Orientation Sensors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers.
Proceedings of the 29th USENIX Security Symposium, 2020

Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Usability Study of Four Secure Email Tools Using Paired Participants.
ACM Trans. Priv. Secur., 2019

Blockchain Technology: What Is It Good for?
ACM Queue, 2019

Johnny's Journey Toward Usable Secure Email.
IEEE Secur. Priv., 2019

SoK: Blockchain Technology and Its Potential Use Cases.
CoRR, 2019

That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Thirteen Password Managers.
CoRR, 2019

2018
Securing Email.
CoRR, 2018

A Tale of Two Studies: The Best and Worst of YubiKey Usability.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

A Comparative Usability Study of Key Management in Secure Email.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
TLS Inspection: How Often and Who Cares?
IEEE Internet Comput., 2017

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
Proceedings of the 26th USENIX Security Symposium, 2017

Augmenting Centralized Password Management with Application-Specific Passwords.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Layering Security at Global Control Points to Secure Unmodified Software.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

End-to-End Passwords.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

2016
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
CoRR, 2016

Private Webmail 2.0: Simple and Easy-to-Use Secure Email.
Proceedings of the 29th Annual Symposium on User Interface Software and Technology, 2016

Standard Metrics and Scenarios for Usable Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

User Attitudes Toward the Inspection of Encrypted Traffic.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Strengthening Password-based Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Content-based security for the web.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

TLS Proxies: Friend or Foe?
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
At Least Tell Me: User Attitudes Toward the Inspection of Encrypted Traffic.
CoRR, 2015

Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client.
CoRR, 2015

MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research.
CoRR, 2015

Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email.
CoRR, 2015

Johnny and Jane: Analyzing Secure Email Using Two Novice Users.
CoRR, 2015

Authentication Melee: A Usability Analysis of Seven Web Authentication Systems.
Proceedings of the 24th International Conference on World Wide Web, 2015

2014
POSTER: TLS Proxies: Friend or Foe?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Confused Johnny: when automatic encryption leads to confusion and mistakes.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
Private Facebook Chat.
Proceedings of the 2012 International Conference on Privacy, 2012


  Loading...