Serge Egelman

Orcid: 0000-0003-2288-0785

Affiliations:
  • University of California, Berkeley, USA
  • International Computer Science Institute, Berkeley, CA, USA


According to our database1, Serge Egelman authored at least 93 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EU Cyber Resilience Act: Socio-Technical and Research Challenges (Dagstuhl Seminar 24112).
Dagstuhl Reports, 2024

The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services.
CoRR, 2024

2023
Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA).
Proc. Priv. Enhancing Technol., July, 2023

A Model of Contextual Factors Affecting Older Adults' Information-Sharing Decisions in the U.S.
ACM Trans. Comput. Hum. Interact., February, 2023

Log: It's Big, It's Heavy, It's Filled with Personal Data! Measuring the Logging of Sensitive Information in the Android Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023

Security and Privacy Failures in Popular 2FA Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2022
Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps.
Proc. Priv. Enhancing Technol., 2022

Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives.
Proc. ACM Hum. Comput. Interact., 2022

Runtime Permissions for Privacy in Proactive Intelligent Assistants.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods.
Proceedings of the 3rd International CoNEXT Student Workshop, 2022

2020
The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
Proc. Priv. Enhancing Technol., 2020

Disaster privacy/privacy disaster.
J. Assoc. Inf. Sci. Technol., 2020

Conducting Privacy-Sensitive Surveys: A Case Study of Civil Society Organizations.
CoRR, 2020

Nudge me right: Personalizing online security nudges to people's decision-making styles.
Comput. Hum. Behav., 2020

Empirical Measurement of Systemic 2FA Usability.
Proceedings of the 29th USENIX Security Symposium, 2020

Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020

"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Decentralized backup and recovery of TOTP secrets.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

2019
50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System.
login Usenix Mag., 2019

Privacy Attitudes of Smart Speaker Users.
Proc. Priv. Enhancing Technol., 2019

Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Privacy and Security Threat Models and Mitigation Strategies of Older Adults.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Information Design in An Aged Care Context: Views of Older Adults on Information Sharing in a Care Triad.
Proceedings of the 13th EAI International Conference on Pervasive Computing Technologies for Healthcare, 2019

Privacy controls for always-listening devices.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
"Won't Somebody Think of the Children?" Examining COPPA Compliance at Scale.
Proc. Priv. Enhancing Technol., 2018

Dynamically Regulating Mobile Application Permissions.
IEEE Secur. Priv., 2018

Cybercasing 2.0: You Get What You Pay For.
CoRR, 2018

Quantifying Users' Beliefs about Software Updates.
CoRR, 2018

The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

Contextualizing Privacy Decisions for Better Prediction (and Protection).
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

An Experience Sampling Study of User Reactions to Browser Warnings in the Field.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
A Usability Evaluation of Tor Launcher.
Proc. Priv. Enhancing Technol., 2017

The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
The Anatomy Of Smartphone Unlocking: Why and How Android Users Around the World Lock their Phones.
GetMobile Mob. Comput. Commun., 2016

Recovering High-Value Secrets with SGX and Social Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

The Teaching Privacy Curriculum.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Behavior Ever Follows Intention?: A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Predicting privacy and security attitudes.
SIGCAS Comput. Soc., 2015

Teaching Privacy: Multimedia Making a Difference.
IEEE Multim., 2015

Risk Perceptions for Wearable Devices.
CoRR, 2015

Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium, 2015

Teaching Privacy: What Every Student Needs to Know (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

The Myth of the Average User: Improving Privacy and Security Systems through Individualization.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

HCI in Business: A Collaboration with Academia in IoT Privacy.
Proceedings of the HCI in Business - Second International Conference, 2015

Fingerprinting Web Users Through Font Metrics.
Proceedings of the Financial Cryptography and Data Security, 2015

Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS).
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.
Int. J. Mob. Hum. Comput. Interact., 2014

The effect of developer-specified explanations for permission requests on smartphone user behavior.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Are You Ready to Lock?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Crowdsourcing in HCI Research.
Proceedings of the Ways of Knowing in HCI, 2014

2013
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Markets for zero-day exploits: ethics and implications.
Proceedings of the New Security Paradigms Workshop, 2013

U-PriSM 2: the second usable privacy and security for mobile devices workshop.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

The Importance of Being Earnest [In Security Warnings].
Proceedings of the Financial Cryptography and Data Security, 2013

Does my password go up to eleven?: the impact of password meters on password selection.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Choice Architecture and Smartphone Privacy: There's a Price for That.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Helping Users Create Better Passwords.
login Usenix Mag., 2012

Choice Architecture and Smartphone Privacy: There's a Price for That.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

How to Ask for Permission.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Facebook and privacy: it's complicated.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Android permissions: user attention, comprehension, and behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2012

It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012

I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns.
Proceedings of the SPSM'12, 2012

2011
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study.
Inf. Syst. Res., 2011

It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011

Of passwords and people: measuring the effect of password-composition policies.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Oops, I did it again: mitigating repeated access control errors on facebook.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

This is your data on drugs: lessons computer security can learn from the drug war.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

2009
Crying Wolf: An Empirical Study of SSL Warning Effectiveness.
Proceedings of the 18th USENIX Security Symposium, 2009

It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

The impact of privacy indicators on search engine browsing patterns.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

It's not what you know, but who you know: a social approach to last-resort authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Timing is everything?: the effects of timing and placement of online privacy indicators.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
P3P deployment on websites.
Electron. Commer. Res. Appl., 2008

Family accounts: a new paradigm for user accounts within the home environment.
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008

You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
Proceedings of the Network and Distributed System Security Symposium, 2007

Security user studies: methodologies and best practices.
Proceedings of the Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

2006
Soups 2006.
IEEE Secur. Priv., 2006

Power strips, prophylactics, and privacy, oh my!
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006

An analysis of P3P-enabled web sites among top-20 search results.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2004
Suing Spammers for Fun and Profit.
login Usenix Mag., 2004


  Loading...