Skip to main content

Cross-Cutting Thrusts: Usable Privacy and Security

Projects List

Advancing Logic-Based Access Control
Research Area: Secure Home Computing
Cross Cutting Thrusts: Formal Methods | Usable Privacy and Security
Researcher: Lujo Bauer

Android App Scanner
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Janne Lindqvist

Attention Economics in Information Rich Environments
Research Area: Privacy Protection
Cross Cutting Thrusts: Business Risk Analysis and Economic Implications | Usable Privacy and Security
Researcher: Alessandro Acquisti

Audio CAPTCHAs for Authenticating Human Users
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Luis von Ahn

Augmenting the Wisdom of Crowds for Anti-Phishing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Bryan Pendleton

Casual Authentication
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Eiji Hayashi

Computer-Readable Privacy Policies
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Context-Aware Scalable Authentication: Using passive multi-factor sensing to facilitate authentication
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Continuous Authentication
Research Area: Security of Cyber-Physical Systems
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Marios Savvides

CrowdScanning: Using Crowdsourcing and Static Analysis to understand the Privacy Issues in Smartphone Apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Norman Sadeh

Differentially-Private Synthetic Dataset Release for Machine Learning and Clustering
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Avrim Blum

Effective Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Evaluating and Improving Browser Encryption
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researchers: Collin Jackson, Lin-Shung Huang, Eric Chen

Evolutionary Roots of Privacy and Security Concerns
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Alessandro Acquisti

Gort: An analysis tool for understanding the privacy and security behaviors of smartphone apps
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

Grey Project: device-enabled authorization
Research Area: Mobility | Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lujo Bauer

Improving the Security and Usability of Text Passwords
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lorrie Cranor, Lujo Bauer, Nicolas Christin

Mobile Users Effectively Control Privacy in a Friend-Finder Application
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

Multichannel Modeling for Enhancing and Masking Speech Communications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Ted Selker, Ian Lane

Password-Composition Policies and the Security and Usability of Passwords
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Nicolas Christin, Lorrie Cranor

Passwords
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Nicolas Christin

Privacy and Usability in Pervasive Computing Environments
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lujo Bauer

Privacy Decision-Making
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lorrie Cranor, Alessandro Acquisti

Privacy notice and choice in practice
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Privacy Nudging
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Alessandro Acquisti, Lorrie Cranor, Norman Sadeh

Protecting Browsers from Mixed Content Injection Attacks
Cross Cutting Thrusts: Software Security | Usable Privacy and Security
Researchers: Collin Jackson

Reconciling Privacy and Usability by Learning Default Privacy Policies
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Norman Sadeh

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security | Cryptography
Researchers: Michael Farb, Adrian Perrig, Jonathan McCune, Tiffany Hyun-Jin Kim, Yue-Hsun Lin

Securable, Usable Context Toolkit for Mobile Applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Pei Zhang, Joy Zhang

Secure digital home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Greg Ganger, Lorrie Cranor

Secure Home Storage
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Greg Ganger

Securing the Digital Home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Greg Ganger, Adrian Perrig

Security Behavior Observatory
Research Area: Secure Home Computing | Privacy Protection
Cross Cutting Thrusts: Software Security | Usable Privacy and Security | Threat Analysis and Modeling
Researchers: Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang

Semantic Geotagging for Situational Awareness During Disaster Response
Research Area: Mobility | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Ray Bareiss, Steven Rosenberg, Joy Zhang

System Integrity Manager for the Everyday Users
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Hyong Kim, James Hoe

Usable Cyber Trust Indicators
Research Area: Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lorrie Cranor

Usable security and privacy for context-aware mobile applications
Research Area: Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Martin Griss, Anind Dey, Pei Zhang

User-Controllable Policy Learning
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor

User Controllable Security & Privacy for Mobile Social Networking
Research Area: Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Lorrie Cranor, Jason Hong

User-Controllable Security and Privacy for Pervasive Computing
Research Area: Privacy Protection | Mobility
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Norman Sadeh, Jason Hong, Lorrie Cranor, Lujo Bauer

Use Your Illusion: Using Visual Distortion to Secure Image-Based Authentication
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Jason Hong, Nicolas Christin, Eiji Hayashi

Visualizing Home Networks
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong

VMA: Dynamic and Secure Heterogeneous System for Elder Care
Research Area: Next Generation Secure and Available Networks | Mobility | Privacy Protection
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Pei Zhang, Martin Griss, Raj Rajkumar, Daniel Siewiorek, Asim Smailagic