Accepted papers

Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19
Adam Shostack & Josiah Dykstra

Towards Foundational Security Metrics
Nilofar Mansourzadeh & Anil Somayaji

Function Extraction, A New Paradigm for Producing Secure Code
Richard Linger, Mark Pleszkoch, Ali Mili, John Mchugh, Wided Ghardallou, Jack Mcgaughey

Balancing Security and Longevity: Benefits of Modular IoT Infrastructure
Maxwell Keleher, David Barrera, Sonia Chiasson

‘Debunk-It-Yourself’: Health Professionals’ Strategies for Responding to Misinformation on TikTok
Filipo Sharevski, Jennifer Vander Loop, Amy Devine, Peter Jachim, Sanchari Das

When Data Breaches Happen, Where Does the Buck Stop ... and Where Should it Stop?
Partha Das Chowdhury, Karen V. Renaud, Awais Rashid

Public Security User Interfaces: Supporting Spontaneous Engagement with IT Security
Doruntina Murtezaj, Viktorija Paneva, Verena Distler, Florian Alt

Adopting a Systemic Design Approach to Cyber Security Incident Response
Emma Woodward, Barnaby Craggs, Adam Joinson, Danaë Stanton Fraser

Is Crowdsourcing a Puppet Show? Detecting a New Type of Fraud in Online Platforms
Shengqian Wang, Israt Jahan Jui, Julie Thorpe

Don’t Patch the Researcher, Patch the Game: A Systematic Approach for Responsible Research via Federated IRBs
Alexandra Dirksen, Sebastian Giessler, Hendrik Erz, Martin Johns, Tobias Fiebig