default search action
Lujo Bauer
Person information
- affiliation: Carnegie Mellon University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c96]Andrea Gallardo, Robert Erbes, Katya Le Blanc, Lujo Bauer, Lorrie Faith Cranor:
Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure. CHI 2024: 828:1-828:24 - [c95]Trevor Kann, Lujo Bauer, Robert K. Cunningham:
CoCoT: Collaborative Contact Tracing. CODASPY 2024: 175-186 - [c94]Suguru Horimoto, Keane Lucas, Lujo Bauer:
Approach for the Optimization of Machine Learning Models for Calculating Binary Function Similarity. DIMVA 2024: 309-329 - [c93]Clement Fung, Eric Zeng, Lujo Bauer:
Attributions for ML-based ICS Anomaly Detection: From Theory to Practice. NDSS 2024 - [c92]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. NDSS 2024 - [c91]Zonghao Huang, Lujo Bauer, Michael K. Reiter:
The Impact of Exposed Passwords on Honeyword Efficacy. USENIX Security Symposium 2024 - [i13]Weiran Lin, Anna Gerchanovsky, Omer Akgul, Lujo Bauer, Matt Fredrikson, Zifan Wang:
Sales Whisperer: A Human-Inconspicuous Attack on LLM Brand Recommendations. CoRR abs/2406.04755 (2024) - 2023
- [j23]Andrea Gallardo, Chris Choy, Jaideep Juneja, Efe Bozkir, Camille Cobb, Lujo Bauer, Lorrie Cranor:
Speculative Privacy Concerns about AR Glasses Data Collection. Proc. Priv. Enhancing Technol. 2023(4): 416-435 (2023) - [c90]Zhuoqun Huang, Neil G. Marchant, Keane Lucas, Lujo Bauer, Olga Ohrimenko, Benjamin I. P. Rubinstein:
RS-Del: Edit Distance Robustness Certificates for Sequence Classifiers via Randomized Deletion. NeurIPS 2023 - [c89]McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia, Yuan Tian:
Towards Usable Security Analysis Tools for Trigger-Action Programming. SOUPS 2023: 301-320 - [c88]Brian Singer, Amritanshu Pandey, Shimiao Li, Lujo Bauer, Craig Miller, Lawrence T. Pileggi, Vyas Sekar:
Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations. SP 2023: 38-55 - [c87]Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Adversarial Training for Raw-Binary Malware Classifiers. USENIX Security Symposium 2023: 1163-1180 - [i12]Zhuoqun Huang, Neil G. Marchant, Keane Lucas, Lujo Bauer, Olga Ohrimenko, Benjamin I. P. Rubinstein:
Certified Robustness of Learning-based Static Malware Detectors. CoRR abs/2302.01757 (2023) - [i11]Keane Lucas, Matthew Jagielski, Florian Tramèr, Lujo Bauer, Nicholas Carlini:
Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators. CoRR abs/2302.13464 (2023) - [i10]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. CoRR abs/2306.16614 (2023) - [i9]Zonghao Huang, Lujo Bauer, Michael K. Reiter:
The Impact of Exposed Passwords on Honeyword Efficacy. CoRR abs/2309.10323 (2023) - 2022
- [j22]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
"Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-27 (2022) - [j21]Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, Hsu-Chun Hsiao, Limin Jia, Timothy Libert:
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers. Proc. Priv. Enhancing Technol. 2022(1): 227-252 (2022) - [c86]Clement Fung, Shreya Srinarasi, Keane Lucas, Hay Bryan Phee, Lujo Bauer:
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems. ESORICS (3) 2022: 493-513 - [c85]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. ICML 2022: 13405-13430 - [c84]Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, Lorrie Faith Cranor:
Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. SOUPS @ USENIX Security Symposium 2022: 291-312 - [c83]Su-Chin Lin, Kai-Hsiang Chou, Yen Chen, Hsu-Chun Hsiao, Darion Cassel, Lujo Bauer, Limin Jia:
Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists. WWW 2022: 576-587 - 2021
- [j20]Tianshi Li, Camille Cobb, Jackie (Junrui) Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, Jason I. Hong:
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention. Pervasive Mob. Comput. 75: 101439 (2021) - [j19]Shikun Zhang, Yuanyuan Feng, Lujo Bauer, Lorrie Faith Cranor, Anupam Das, Norman M. Sadeh:
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics. Proc. Priv. Enhancing Technol. 2021(2): 282-304 (2021) - [j18]Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, Alison Hoffman, Varun Rao, Lujo Bauer:
"I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users. Proc. Priv. Enhancing Technol. 2021(4): 54-75 (2021) - [c82]Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. AsiaCCS 2021: 744-758 - [c81]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
What breach? Measuring online awareness of security incidents by studying real-world browsing behavior. EuroUSEC 2021: 180-199 - [c80]William Melicher, Clement Fung, Lujo Bauer, Limin Jia:
Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning. WWW 2021: 2684-2695 - [i8]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. CoRR abs/2112.14232 (2021) - 2020
- [c79]Joshua Tan, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements. CCS 2020: 1407-1426 - [c78]Qiuyu Xiao, Brittany Subialdea, Lujo Bauer, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. SACMAT 2020: 1-12 - [c77]Camille Cobb, Milijana Surbatovich, Anna Kawakami, Mahmood Sharif, Lujo Bauer, Anupam Das, Limin Jia:
How Risky Are Real Users' IFTTT Applets? SOUPS @ USENIX Security Symposium 2020: 505-529 - [i7]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
What breach? Measuring online awareness of security incidents by studying real-world browsing behavior. CoRR abs/2010.09843 (2020) - [i6]Sruti Bhagavatula, Lujo Bauer, Apu Kapadia:
(How) Do people change their passwords after a breach? CoRR abs/2010.09853 (2020) - [i5]Tianshi Li, Camille Cobb, Jackie Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, Jason I. Hong:
What Makes People Install a COVID-19 Contact-Tracing App? Understanding the Influence of App Design and Individual Difference on Contact-Tracing App Adoption Intention. CoRR abs/2012.12415 (2020)
2010 – 2019
- 2019
- [j17]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. ACM Trans. Priv. Secur. 22(3): 16:1-16:30 (2019) - [c76]Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, Nicolas Christin:
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. CHI 2019: 78 - [c75]Shikun Zhang, Sarah Pearman, Lujo Bauer, Nicolas Christin:
Why people (don't) use password managers effectively. SOUPS @ USENIX Security Symposium 2019 - [i4]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. CoRR abs/1912.09059 (2019) - [i3]Mahmood Sharif, Keane Lucas, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection. CoRR abs/1912.09064 (2019) - 2018
- [j16]Pardis Emami Naeini, Martin Degeling, Lujo Bauer, Richard Chow, Lorrie Faith Cranor, Mohammad R. Haghighat, Heather M. Patterson:
The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios. Proc. ACM Hum. Comput. Interact. 2(CSCW): 48:1-48:26 (2018) - [c74]Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Faith Cranor, Nicolas Christin:
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University. CHI 2018: 456 - [c73]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. CVPR Workshops 2018: 1605-1613 - [c72]William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia:
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting. NDSS 2018 - [c71]Hana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
User Behaviors and Attitudes Under Password Expiration Policies. SOUPS @ USENIX Security Symposium 2018: 13-30 - [c70]Joshua Tan, Mahmood Sharif, Sruti Bhagavatula, Matthias Beckerle, Michelle L. Mazurek, Lujo Bauer:
Comparing Hypothetical and Realistic Privacy Valuations. WPES@CCS 2018: 168-182 - [e5]Lujo Bauer, Ralf Küsters:
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings. Lecture Notes in Computer Science 10804, Springer 2018, ISBN 978-3-319-89721-9 [contents] - [i2]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. CoRR abs/1801.00349 (2018) - [i1]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples. CoRR abs/1802.09653 (2018) - 2017
- [j15]Toby C. Murray, Andrei Sabelfeld, Lujo Bauer:
Special issue on verified information flow security. J. Comput. Secur. 25(4-5): 319-321 (2017) - [j14]William Melicher, Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Better Passwords through Science (and Neural Networks). login Usenix Mag. 42(4) (2017) - [c69]Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget:
Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat. CCS 2017: 295-310 - [c68]Blase Ur, Felicia Alfieri, Maung Aung, Lujo Bauer, Nicolas Christin, Jessica Colnago, Lorrie Faith Cranor, Henry Dixon, Pardis Emami Naeini, Hana Habib, Noah Johnson, William Melicher:
Design and Evaluation of a Data-Driven Password Meter. CHI 2017: 3775-3786 - [c67]Joshua Tan, Lujo Bauer, Joseph Bonneau, Lorrie Faith Cranor, Jeremy Thomas, Blase Ur:
Can Unicorns Help Users Compare Crypto Key Fingerprints? CHI 2017: 3787-3798 - [c66]Primal Pappachan, Martin Degeling, Roberto Yus, Anupam Das, Sruti Bhagavatula, William Melicher, Pardis Emami Naeini, Shikun Zhang, Lujo Bauer, Alfred Kobsa, Sharad Mehrotra, Norman M. Sadeh, Nalini Venkatasubramanian:
Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences. ICDCS Workshops 2017: 193-198 - [c65]Willard Rafnsson, Limin Jia, Lujo Bauer:
Timing-Sensitive Noninterference through Composition. POST 2017: 3-25 - [c64]Sean M. Segreti, William Melicher, Saranga Komanduri, Darya Melicher, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Diversify to Survive: Making Passwords Stronger with Adaptive Policies. SOUPS 2017: 1-12 - [c63]Cara Bloom, Joshua Tan, Javed Ramjohn, Lujo Bauer:
Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles. SOUPS 2017: 357-375 - [c62]Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, Norman M. Sadeh:
Privacy Expectations and Preferences in an IoT World. SOUPS 2017: 399-412 - [c61]William Melicher, Blase Ur, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX ATC 2017 - [c60]Milijana Surbatovich, Jassim Aljuraidan, Lujo Bauer, Anupam Das, Limin Jia:
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes. WWW 2017: 1501-1510 - 2016
- [j13]William Melicher, Mahmood Sharif, Joshua Tan, Lujo Bauer, Mihai Christodorescu, Pedro Giovanni Leon:
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking. Proc. Priv. Enhancing Technol. 2016(2): 135-154 (2016) - [j12]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Designing Password Policies for Strength and Usability. ACM Trans. Inf. Syst. Secur. 18(4): 13:1-13:34 (2016) - [c59]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. CCS 2016: 1528-1540 - [c58]Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, Michelle L. Mazurek:
Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors. CHI 2016: 101-112 - [c57]William Melicher, Darya Kurilova, Sean M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Michelle L. Mazurek:
Usability and Security of Text Passwords on Mobile Devices. CHI 2016: 527-539 - [c56]Blase Ur, Jonathan Bees, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Do Users' Perceptions of Password Security Match Reality? CHI 2016: 3748-3760 - [c55]Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. Financial Cryptography 2016: 60-77 - [c54]William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. USENIX Security Symposium 2016: 175-191 - [e4]X. Sean Wang, Lujo Bauer, Florian Kerschbaum:
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016. ACM 2016, ISBN 978-1-4503-3802-8 [contents] - 2015
- [j11]Joel Lee, Lujo Bauer, Michelle L. Mazurek:
The Effectiveness of Security Images in Internet Banking. IEEE Internet Comput. 19(1): 54-62 (2015) - [j10]Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic cost enforcement of security policies. J. Comput. Secur. 23(6): 759-787 (2015) - [c53]Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Alain Forget, Saranga Komanduri, Michelle L. Mazurek, William Melicher, Sean M. Segreti, Blase Ur:
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior. CHI 2015: 2903-2912 - [c52]Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian:
Run-time Monitoring and Formal Analysis of Information Flows in Chromium. NDSS 2015 - [c51]Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab. SOUPS 2015: 123-140 - [c50]Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, Richard Shay:
Measuring Real-World Accuracies and Biases in Modeling Password Guessability. USENIX Security Symposium 2015: 463-481 - 2014
- [j9]Lakshmish Ramaswamy, Barbara Carminati, Lujo Bauer, Dongwan Shin, James Joshi, Calton Pu, Dimitris Gritzalis:
Editorial. Comput. Secur. 41: 1-2 (2014) - [c49]Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Can long passwords be secure and usable? CHI 2014: 2927-2936 - [c48]Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Yuan Tian:
Analyzing the dangers posed by Chrome extensions. CNS 2014: 184-192 - [c47]Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, Michael K. Reiter:
Toward strong, usable access control for shared distributed data. FAST 2014: 89-103 - [c46]Alessandro Oltramari, Noam Ben-Asher, Lorrie Faith Cranor, Lujo Bauer, Nicolas Christin:
General Requirements of a Hybrid-Modeling Framework for Cyber Security. MILCOM 2014: 129-135 - [c45]William Klieber, Lori Flynn, Amar Bhosale, Limin Jia, Lujo Bauer:
Android taint flow analysis for app sets. SOAP@PLDI 2014: 5:1-5:6 - [c44]Lujo Bauer, Florian Kerschbaum:
What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? SACMAT 2014: 127-128 - [c43]Lujo Bauer:
Human Factors, Defaults, and Automation: Challenges and Opporunities. SafeConfig 2014: 37 - [e3]Lorrie Faith Cranor, Lujo Bauer, Robert Biddle:
Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, July 9-11, 2014. USENIX Association 2014, ISBN 978-1-931971-13-3 [contents] - 2013
- [c42]Arunesh Sinha, Yan Li, Lujo Bauer:
What you want is not what you get: predicting sharing policies for text-based content on facebook. AISec 2013: 13-24 - [c41]Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur:
Measuring password guessability for an entire university. CCS 2013: 173-186 - [c40]Lujo Bauer, Cristian Bravo-Lillo, Elli Fragkaki, William Melicher:
A comparison of users' perceptions of and willingness to use Google, Facebook, and Google+ single-sign-on functionality. Digital Identity Management 2013: 25-36 - [c39]Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). ESORICS 2013: 775-792 - [c38]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs. Financial Cryptography Workshops 2013: 34-51 - [c37]Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, Lorrie Faith Cranor:
What matters to users?: factors that affect users' willingness to share information with online advertisers. SOUPS 2013: 7:1-7:12 - [c36]Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic Cost Enforcement of Security Policies. STM 2013: 144-159 - [c35]Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. WPES 2013: 1-12 - [e2]Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 [contents] - [e1]Lujo Bauer, Konstantin Beznosov, Lorrie Faith Cranor:
Symposium On Usable Privacy and Security, SOUPS '13, Newcastle, United Kingdom, July 24-26, 2013. ACM 2013, ISBN 978-1-4503-2319-2 [contents] - 2012
- [j8]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Julio C. López:
Helping Users Create Better Passwords. login Usenix Mag. 37(6) (2012) - [c34]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, Michael K. Reiter:
Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386 - [c33]Lujo Bauer, Yuan Liang, Michael K. Reiter, Chad Spensky:
Discovering access-control misconfigurations: new approaches and evaluation methodologies. CODASPY 2012: 95-104 - [c32]Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey:
Modeling and Enhancing Android's Permission System. ESORICS 2012: 1-18 - [c31]Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter:
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. PST 2012: 128-136 - [c30]Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Correct horse battery staple: exploring the usability of system-assigned passphrases. SOUPS 2012: 7 - [c29]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio C. López:
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. IEEE Symposium on Security and Privacy 2012: 523-537 - [c28]Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Jay Ligatti:
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors. STM 2012: 17-32 - [c27]Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. USENIX Security Symposium 2012: 65-80 - 2011
- [j7]Lujo Bauer, Sandro Etalle, Jerry den Hartog, Luca Viganò:
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning". J. Autom. Reason. 46(3-4): 223-224 (2011) - [j6]Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker:
Access right assignment mechanisms for secure home networks. J. Commun. Networks 13(2): 175-186 (2011) - [j5]Lujo Bauer, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. ACM Trans. Inf. Syst. Secur. 14(1): 2:1-2:28 (2011) - [c26]Ahren Studer, Timothy Passaro, Lujo Bauer:
Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. ACSAC 2011: 333-342 - [c25]Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea:
More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074 - [c24]Michelle L. Mazurek, Peter F. Klemperer, Richard Shay, Hassan Takabi, Lujo Bauer, Lorrie Faith Cranor:
Exploring reactive access control. CHI 2011: 2085-2094 - [c23]Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman:
Of passwords and people: measuring the effect of password-composition policies. CHI 2011: 2595-2604 - 2010
- [c22]Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, Michael K. Reiter:
Access control for home data sharing: evaluating social acceptability. CHI 2010: 645-654 - [c21]Lujo Bauer, Limin Jia, Divya Sharma:
Constraining Credential Usage in Logic-Based Access Control. CSF 2010: 154-168 - [c20]Lujo Bauer, Adam J. Lee:
Solving the access-control puzzle: finding the pieces and putting them together. SACMAT 2010: 159-160 - [c19]Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
Encountering stronger password requirements: user attitudes and behaviors. SOUPS 2010 - [c18]Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker:
Challenges in Access Right Assignment for Secure Home Networks. HotSec 2010
2000 – 2009
- 2009
- [j4]Jay Ligatti, Lujo Bauer, David Walker:
Run-Time Enforcement of Nonsafety Policies. ACM Trans. Inf. Syst. Secur. 12(3): 19:1-19:41 (2009) - [j3]Lujo Bauer, Jay Ligatti, David Walker:
Composing expressive runtime security policies. ACM Trans. Softw. Eng. Methodol. 18(3): 9:1-9:43 (2009) - [c17]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
Real life challenges in access-control management. CHI 2009: 899-908 - [c16]Lujo Bauer, Limin Jia, Michael K. Reiter, David Swasey:
xDomain: cross-border proofs of access. SACMAT 2009: 43-52 - 2008
- [c15]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea:
A user study of policy creation in a flexible access-control system. CHI 2008: 543-552 - [c14]Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong:
Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482 - [c13]Lujo Bauer, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. SACMAT 2008: 185-194 - 2007
- [c12]Lujo Bauer, Scott Garriss, Michael K. Reiter:
Efficient Proving for Practical Distributed Access-Control Systems. ESORICS 2007: 19-37 - [c11]Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter:
Consumable Credentials in Linear-Logic-Based Access-Control Systems. NDSS 2007 - [c10]Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75 - [c9]Jason Cornwell, Ian Fette, Gary Hsieh, Madhu K. Prabaker, Jinghai Rao, Karen P. Tang, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Jason I. Hong, Bruce M. McLaren, Mike Reiter, Norman M. Sadeh:
User-Controllable Security and Privacy for Pervasive Computing. HotMobile 2007: 14-19 - 2006
- [c8]Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter:
A Linear Logic of Authorization and Knowledge. ESORICS 2006: 297-312 - 2005
- [j2]Jay Ligatti, Lujo Bauer, David Walker:
Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Sec. 4(1-2): 2-16 (2005) - [c7]Jay Ligatti, Lujo Bauer, David Walker:
Enforcing Non-safety Security Policies with Program Monitors. ESORICS 2005: 355-373 - [c6]Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar:
Device-Enabled Authorization in the Grey-System. ISC 2005: 431-445 - [c5]Lujo Bauer, Jay Ligatti, David Walker:
Composing security policies with polymer. PLDI 2005: 305-314 - [c4]Lujo Bauer, Scott Garriss, Michael K. Reiter:
Distributed Proving in Access-Control Systems. S&P 2005: 81-95 - 2003
- [j1]Lujo Bauer, Andrew W. Appel, Edward W. Felten:
Mechanisms for secure modular programming in Java. Softw. Pract. Exp. 33(5): 461-480 (2003) - [c3]Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel:
Access Control on the Web Using Proof-carrying Authorization. DISCEX (2) 2003: 117-119 - 2002
- [c2]Lujo Bauer, Jarred Ligatti, David Walker:
Types and Effects for Non-interfering Program Monitors. ISSS 2002: 154-171 - [c1]Lujo Bauer, Michael A. Schneider, Edward W. Felten:
A General and Flexible Access-Control System for the Web. USENIX Security Symposium 2002: 93-108
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint