Publications
Research papers from the Georgetown Security Lab.
Papers are included to ensure timely dissemination of scholarly work on a non-commercial basis. Please respect the rights of the copyright holder(s).
Paper information is pulled from dblp. Please report errors or omissions to seclab@cs.georgetown.edu.
2026
- DetailsBayesian Perspective on Memorization and Reconstruction17th Innovations in Theoretical Computer Science Conference, ITCS 2026, Bocconi University, Milan, Italy, January 27-30, 2026 — 2026
- DetailsDifferentially Private Quasi-Concave Optimization: Bypassing the Lower Bound and Application to Geometric ProblemsProceedings of the 2026 Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2026, Vancouver, BC, Canada, January 11-14, 2026 — 2026
2025
- DetailsSCIF: Privacy-Preserving Statistics Collection with Input Validation and Full SecurityProc. Priv. Enhancing Technol. — 2025
- DetailsCensorship Evasion with Unidentified Protocol Generation34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025 — 2025
- DetailsA Systems Security Approach for Emerging Programmable Network ArchitecturesIEEE Secur. Priv. — 2025
- DetailsChimera: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability DiscoveryIEEE Symposium on Security and Privacy, SP 2025, San Francisco, CA, USA, May 12-15, 2025 — 2025
- DetailsOn the Rival Nature of Data: Tech and Policy ImplicationsProceedings of the 2025 Symposium on Computer Science and Law, CSLAW 2025, Munich, Germany, March 25-27, 2025 — 2025
- DetailsData Reconstruction: When You See It and When You Don’t16th Innovations in Theoretical Computer Science Conference, ITCS 2025, Columbia University, New York, NY, USA, January 7-10, 2025 — 2025
- DetailsExtending the Heilmeier Catechism to Evaluate Security and Privacy Systems: Who is Left Out?IEEE Secur. Priv. — 2025
- Details
- DetailsModels Matter: Setting Accurate Privacy Expectations for Local and Central Differential PrivacyProc. Priv. Enhancing Technol. — 2025
- DetailsPublic Opinions About Copyright for AI-Generated Art: The Role of Egocentricity, Competition, and ExperienceProceedings of the 2025 CHI Conference on Human Factors in Computing Systems, CHI 2025, YokohamaJapan, 26 April 2025- 1 May 2025 — 2025
- DetailsReflexivity & Reflection (R&R) for Sociotechnical Safety: Creating a Space for Collective LearningCompanion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing, CSCW Companion 2025, Bergen, Norway, October 18-22, 2025 — 2025
- DetailsCo-Constructing the Future of Digital IntimacyCompanion Publication of the 2025 Conference on Computer-Supported Cooperative Work and Social Computing, CSCW Companion 2025, Bergen, Norway, October 18-22, 2025 — 2025
- DetailsAnalyzing the AI Nudification Application Ecosystem34th USENIX Security Symposium, USENIX Security 2025, Seattle, WA, USA, August 13-15, 2025 — 2025
2024
- Details
- Details"Modern problems require modern solutions": Community-Developed Techniques for Online Exam Proctoring EvasionProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024 — 2024
- DetailsOn Precisely Detecting Censorship Circumvention in Real-World Networks31st Annual Network and Distributed System Security Symposium, NDSS 2024, San Diego, California, USA, February 26 - March 1, 2024 — 2024
- DetailsYou Can Find Me Here: A Study of the Early Adoption of GeofeedsPassive and Active Measurement - 25th International Conference, PAM 2024, Virtual Event, March 11-13, 2024, Proceedings, Part II — 2024
- Details"I can say I’m John Travolta...but I’m not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified AccountsTwentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024 — 2024
- DetailsNetShuffle: Circumventing Censorship with Shuffle Proxies at the EdgeIEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024 — 2024
- DetailsSpotProxy: Rediscovering the Cloud for Censorship Circumvention33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024 — 2024
- DetailsSCIF: Privacy-Preserving Statistics Collection with Input Validation and Full SecurityIACR Cryptol. ePrint Arch. — 2024
- Details
- Details
- DetailsExploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024 — 2024
- DetailsLaunching the Society for Privacy and Confidentiality Research to Own the Journal of Privacy and ConfidentialityJ. Priv. Confidentiality — 2024
- DetailsCredit Attribution and Stable CompressionAdvances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10 - 15, 2024 — 2024
- DetailsFrom Isolation to IdentificationPrivacy in Statistical Databases - International Conference, PSD 2024, Antibes Juan-les-Pins, France, September 25-27, 2024, Proceedings — 2024
- DetailsFriction Matters: Balancing the Pursuit of Perfect Protection With Target HardeningIEEE Secur. Priv. — 2024
- DetailsSafer Digital Intimacy for Sex Workers and Beyond: A Technical Research AgendaIEEE Secur. Priv. — 2024
- DetailsSafer Algorithmically-Mediated Offline Introductions: Harms and Protective BehaviorsProc. ACM Hum. Comput. Interact. — 2024
- Details"I Had Sort of a Sense that I Was Always Being Watched...Since I Was": Examining Interpersonal Discomfort From Continuous Location-Sharing ApplicationsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024 — 2024
- DetailsAnalyzing User Engagement with TikTok’s Short Format Video Recommendations using Data DonationsProceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024 — 2024
- DetailsIt’s Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based BiasProceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024 — 2024
- DetailsHow We Browse: Measurement and Analysis of Browsing Behavior6th IEEE International Conference on Cognitive Machine Intelligence, CogMI 2024, Washington, DC, USA, October 28-31, 2024 — 2024
- Details"Violation of my body: " Perceptions of AI-generated non-consensual (intimate) imageryTwentieth Symposium on Usable Privacy and Security, SOUPS 2024, Philadelphia, PA, USA, August 11-13, 2024 — 2024
- Details"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024 — 2024
- Details"Did They F***ing Consent to That?": Safer Digital Intimacy via Proactive Protection Against Image-Based Sexual Abuse33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024 — 2024
- Details"I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024 — 2024
- DetailsSoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024 — 2024
- DetailsRepositioning Real-World Website Fingerprinting on TorProceedings of the 23rd Workshop on Privacy in the Electronic Society, WPES 2024, Salt Lake City, UT, USA, October 14-18, 2024 — 2024
- Details
2023
- DetailsCadence: A Simulator for Human Movement-based Communication Protocols2023 Cyber Security Experimentation and Test Workshop, CSET 2023, Marina del Rey, CA, USA, August 7-8, 2023 — 2023
- DetailsEducators’ Perspectives of Using (or Not Using) Online Exam Proctoring32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 — 2023
- DetailsIntender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 — 2023
- Details
- DetailsDoquet: Differentially Oblivious Range and Join Queries with Private Data StructuresProc. VLDB Endow. — 2023
- DetailsBlack-Box Differential Privacy for Interactive MLAdvances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023 — 2023
- DetailsPrivate Everlasting PredictionAdvances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023 — 2023
- DetailsAdaptive Data Analysis in a Balanced Adversarial ModelAdvances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023 — 2023
- Details
- Details"I need a better description": An Investigation Into User Expectations For Differential PrivacyJ. Priv. Confidentiality — 2023
- Details"Nudes? Shouldn’t I charge for these?": Motivations of New Sexual Content Creators on OnlyFansProceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023 — 2023
- DetailsExploring Privacy and Incentives Considerations in Adoption of COVID-19 Contact Tracing Apps32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 — 2023
- DetailsWhat Are the Chances? Explaining the Epsilon Parameter in Differential Privacy32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 — 2023
- DetailsProblematic Advertising and its Disparate Exposure on Facebook32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 — 2023
- DetailsData-Explainable Website Fingerprinting with Network SimulationProc. Priv. Enhancing Technol. — 2023
2022
- DetailsLearning to Behave: Improving Covert Channel Security with Behavior-Based DesignsProc. Priv. Enhancing Technol. — 2022
- DetailsAccountable Private Set Cardinality for Distributed MeasurementACM Trans. Priv. Secur. — 2022
- DetailsUser Perceptions of the Privacy and Usability of Smart DNSAnnual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022 — 2022
- DetailsThe Sample Complexity of Distribution-Free Parity Learning in the Robust Shuffle ModelJ. Priv. Confidentiality — 2022
- DetailsDynamic algorithms against an adaptive adversary: generic constructions and lower boundsSTOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022 — 2022
- Details
- DetailsHow Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision AidsDTRAP — 2022
- DetailsNot Only for Contact Tracing: Use of Belgium’s Contact Tracing App among Young AdultsProc. ACM Interact. Mob. Wearable Ubiquitous Technol. — 2022
- DetailsEthics and Efficacy of Unsolicited Anti-Trafficking SMS OutreachProc. ACM Hum. Comput. Interact. — 2022
- DetailsRisk, Resilience and Reward: Impacts of Shifting to Digital Sex WorkProc. ACM Hum. Comput. Interact. — 2022
- DetailsCtrl-Shift: How Privacy Sentiment Changed from 2019 to 2021Proc. Priv. Enhancing Technol. — 2022
- DetailsAnalyzing Biases in Perception of Truth in News Stories and Their Implications for Fact CheckingIEEE Trans. Comput. Soc. Syst. — 2022
- DetailsA Large-Scale Measurement of Cybercrime Against IndividualsCHI ’22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022 — 2022
- DetailsField Evidence of the Effects of Privacy, Data Transparency, and Pro-social Appeals on COVID-19 App AttractivenessCHI ’22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022 — 2022
- DetailsCOVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption IntentionCHIIR ’22: ACM SIGIR Conference on Human Information Interaction and Retrieval, Regensburg, Germany, March 14 - 18, 2022 — 2022
- DetailsDimensions of Diversity in Human Perceptions of Algorithmic FairnessEquity and Access in Algorithms, Mechanisms, and Optimization, EAAMO 2022, Arlington, VA, USA, October 6-9, 2022 — 2022
- DetailsEthical Practices for Security Research with At-Risk PopulationsIEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022 — 2022
- DetailsCommunity Under Surveillance: Impacts of Marginalization on an Online Labor ForumProceedings of the Sixteenth International AAAI Conference on Web and Social Media, ICWSM 2022, Atlanta, Georgia, USA, June 6-9, 2022 — 2022
- Details"Like Lesbians Walking the Perimeter": Experiences of U.S. LGBTQ+ Folks With Online Security, Safety, and Privacy Advice31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022 — 2022
- DetailsThe Need for Respectful Technologies: Going Beyond PrivacyPerspectives on Digital Humanism — 2022
- DetailsCo-opting Linux Processes for High-Performance Network SimulationProceedings of the 2022 USENIX Annual Technical Conference, USENIX ATC 2022, Carlsbad, CA, USA, July 11-13, 2022 — 2022
2021
- DetailsHoles in the Geofence: Privacy Vulnerabilities in "Smart" DNS ServicesProc. Priv. Enhancing Technol. — 2021
- Details
- DetailsExamining the Examiners: Students’ Privacy and Security Perceptions of Online Proctoring ServicesSeventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021 — 2021
- DetailsCausal Analysis for Software-Defined Networking Attacks30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021 — 2021
- Details
- Details
- Details\(ε\)psolute: Efficiently Querying Databases While Providing Differential PrivacyCCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021 — 2021
- DetailsSeparating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage ModelAdvances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part III — 2021
- DetailsPrivacy: From Database Reconstruction to Legal TheoremsPODS’21: Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, Virtual Event, China, June 20-25, 2021 — 2021
- DetailsFoundations for Robust Data Protection: Co-designing Law and Computer Science3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021, Atlanta, GA, USA, December 13-15, 2021 — 2021
- DetailsTheory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part I— 2021
- DetailsTheory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part II— 2021
- DetailsTheory of Cryptography - 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part III— 2021
- DetailsUser Concerns 8 Tradeoffs in Technology-facilitated COVID-19 ResponseDigit. Gov. Res. Pract. — 2021
- DetailsCharacterizing the Online Learning Landscape: What and How People Learn OnlineProc. ACM Hum. Comput. Interact. — 2021
- Details"I need a better description": An Investigation Into User Expectations For Differential PrivacyCCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021 — 2021
- DetailsAn Inside Look into the Practice of Malware AnalysisCCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021 — 2021
- Details"Disadvantaged in the American-dominated Internet": Sex, Work, and TechnologyCHI ’21: CHI Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021 — 2021
- DetailsAMP: authentication of media via provenanceMMSys ’21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021 - 1 October 2021 — 2021
- DetailsDesigning Media Provenance Indicators to Combat Fake MediaRAID ’21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, October 6-8, 2021 — 2021
- DetailsDriving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021 — 2021
- Details"It’s stressful having all these phones": Investigating Sex Workers’ Safety Goals, Risks, and Practices Online30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021 — 2021
- DetailsFrom Secure to Military-Grade: Exploring the Effect of App Descriptions on User Perceptions of Secure MessagingWPES ’21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 15 November 2021 — 2021
2020
- DetailsBypassing Tor Exit Blocking with Exit Bridge Onion ServicesCCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020 — 2020
- DetailsEphemeral Exit Bridges for Tor50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020, Valencia, Spain, June 29 - July 2, 2020 — 2020
- DetailsSecuring the software-defined networking control plane by using control and data dependency techniques— 2020
- DetailsAutomated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020 — 2020
- DetailsProvenance for Intent-Based Networking6th IEEE Conference on Network Softwarization, NetSoft 2020, Ghent, Belgium, June 29 - July 3, 2020 — 2020
- Details
- Details
- Details
- Details
- DetailsComputational Two-Party Correlation: A Dichotomy for Key-Agreement ProtocolsSIAM J. Comput. — 2020
- DetailsPrivate Summation in the Multi-Message Shuffle ModelCCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020 — 2020
- DetailsThe Complexity of Verifying Loop-Free Programs as Differentially Private47th International Colloquium on Automata, Languages, and Programming, ICALP 2020, Saarbrücken, Germany (Virtual Conference), July 8-11, 2020 — 2020
- DetailsThe Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers1st Conference on Information-Theoretic Cryptography, ITC 2020, Boston, MA, USA, June 17-19, 2020 — 2020
- DetailsOn the Round Complexity of the Shuffle ModelTheory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part II — 2020
- Details
- DetailsAmericans’ willingness to adopt a COVID-19 tracking app The role of app distributorFirst Monday — 2020
- DetailsGet Paid to Program: Evaluating an Employment-Aware After-School Program for High School Women of ColorProceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2020, Trondheim, Norway, June 15-19, 2020 — 2020
- DetailsA Comprehensive Quality Evaluation of Security and Privacy Advice on the Web29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020 — 2020
- DetailsCLAPS: Client-Location-Aware Path Selection in TorCCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020 — 2020
2019
- Details
- DetailsWhisper: a unilateral defense against VoIP traffic re-identification attacksProceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019 — 2019
- DetailsDoes Being Verified Make You More Credible?: Account Verification’s Effect on Tweet CredibilityProceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, Glasgow, Scotland, UK, May 04-09, 2019 — 2019
- DetailsYou Talk Too Much: Limiting Privacy Exposure Via Voice Input2019 IEEE Security and Privacy Workshops, SP Workshops 2019, San Francisco, CA, USA, May 19-23, 2019 — 2019
- DetailsPoint Break: A Study of Bandwidth Denial-of-Service Attacks against Tor28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019 — 2019
- DetailsData Protection Intents for Software-Defined Networking5th IEEE Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019 — 2019
- Details
- Details
- DetailsConcentration Bounds for High Sensitivity Functions Through Differential PrivacyJ. Priv. Confidentiality — 2019
- DetailsExploring Differential ObliviousnessApproximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2019, Massachusetts Institute of Technology, Cambridge, MA, USA, September 20-22, 2019 — 2019
- DetailsPrivate Center Points and Learning of HalfspacesConference on Learning Theory, COLT 2019, 25-28 June 2019, Phoenix, AZ, USA — 2019
- DetailsThe Privacy Blanket of the Shuffle ModelAdvances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part II — 2019
- DetailsSurveillance and privacy in the public and private sectors: panelSymposium on Computer Science and Law, CSLAW 2019, New York, NY, USA, October 28-29, 2019 — 2019
- Details
- Details
- Details
- DetailsComparing and Developing Tools to Measure the Readability of Domain-Specific TextsProceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, EMNLP-IJCNLP 2019, Hong Kong, China, November 3-7, 2019 — 2019
- DetailsAnalyzing Biases in Perception of Truth in News Stories and Their Implications for Fact CheckingProceedings of the Conference on Fairness, Accountability, and Transparency, FAT* 2019, Atlanta, GA, USA, January 29-31, 2019 — 2019
- DetailsOn Microtargeting Socially Divisive Ads: A Case Study of Russia-Linked Ad Campaigns on FacebookProceedings of the Conference on Fairness, Accountability, and Transparency, FAT* 2019, Atlanta, GA, USA, January 29-31, 2019 — 2019
- Details"I Just Want to Feel Safe": A Diary Study of Safety Perceptions on Social MediaProceedings of the Thirteenth International Conference on Web and Social Media, ICWSM 2019, Munich, Germany, June 11-14, 2019 — 2019
- Details"Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019 — 2019
- DetailsHow Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019 — 2019
- DetailsAuditing Offline Data Brokers via Facebook’s Advertising PlatformThe World Wide Web Conference, WWW 2019, San Francisco, CA, USA, May 13-17, 2019 — 2019
- DetailsGuard Placement Attacks on Path Selection Algorithms for TorProc. Priv. Enhancing Technol. — 2019
- DetailsStormy: Statistics in Tor by Measuring SecurelyProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019 — 2019