Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy (DOI)
Susan Landau
Towards In-Band Non-Cryptographic Authentication (DOI)
Nour Dabbour, Anil Somayaji
Putting the Sec in DevSecOps: Using Social Practice Theory to Improve Secure Software Development (DOI)
Debi Ashenden, Gail Ollis
The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely (DOI)
Verena Distler, Gabriele Lenzini, Carine Lallemand, Vincent Koenig
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic (DOI)
Peter Jachim, Filipo Sharevski, Paige Treebridge
Trust-Based Security; Or, Trust Considered Harmful (DOI)
Abe Singer, Matt Bishop
Transcending the Teetering Tower of Trust: Demonstrated with Virtual Memory Fuses for Software Enclaves (DOI)
Scott Brookes
Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity (DOI)
Justin Joque, S M Taiabul Haque
On managing vulnerabilities in AI/ML systems (DOI)
Jonathan M. Spring, April Galyardt, Allen D. Householder, Nathan VanHoudnos
Out of Sight, Out of Mind: UI Design and the Inhibition of Mental Models of Security (DOI)
Eric Spero, Robert Biddle