Skip to main content

Showing 1–13 of 13 results for author: Mazurek, Ł

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13017  [pdf, other

    cs.CR cs.HC

    As Advertised? Understanding the Impact of Influencer VPN Ads

    Authors: Omer Akgul, Richard Roberts, Emma Shroyer, Dave Levin, Michelle L. Mazurek

    Abstract: Influencer VPN ads (sponsored segments) on YouTube often disseminate misleading information about both VPNs, and security & privacy more broadly. However, it remains unclear how (or whether) these ads affect users' perceptions and knowledge about VPNs. In this work, we explore the relationship between YouTube VPN ad exposure and users' mental models of VPNs, security, and privacy. We use a novel V… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: Accepted for publication at USENIX Security 2025

  2. arXiv:2403.02292  [pdf, other

    cs.LG cs.HC

    A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends

    Authors: Omer Akgul, Sai Teja Peddinti, Nina Taft, Michelle L. Mazurek, Hamza Harkous, Animesh Srivastava, Benoit Seguin

    Abstract: We present an analysis of 12 million instances of privacy-relevant reviews publicly visible on the Google Play Store that span a 10 year period. By leveraging state of the art NLP techniques, we examine what users have been writing about privacy along multiple dimensions: time, countries, app types, diverse privacy topics, and even across a spectrum of emotions. We find consistent growth of privac… ▽ More

    Submitted 15 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: This is the extended version of the paper accepted to USENIX Security 2024

  3. arXiv:2309.00735  [pdf, other

    cs.CY cs.CR cs.HC

    SoK: Safer Digital-Safety Research Involving At-Risk Users

    Authors: Rosanna Bellini, Emily Tseng, Noel Warford, Alaa Daffalla, Tara Matthews, Sunny Consolvo, Jill Palzkill Woelfer, Patrick Gage Kelley, Michelle L. Mazurek, Dana Cuomo, Nicola Dell, Thomas Ristenpart

    Abstract: Research involving at-risk users -- that is, users who are more likely to experience a digital attack or to be disproportionately affected when harm from such an attack occurs -- can pose significant safety challenges to both users and researchers. Nevertheless, pursuing research in computer security and privacy is crucial to understanding how to meet the digital-safety needs of at-risk users and… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    Comments: 13 pages, 3 tables

  4. arXiv:2301.04781  [pdf, other

    cs.CR cs.SE

    Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem

    Authors: Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Michelle L. Mazurek, Daniel Votipka, Aron Laszka

    Abstract: Although researchers have characterized the bug-bounty ecosystem from the point of view of platforms and programs, minimal effort has been made to understand the perspectives of the main workers: bug hunters. To improve bug bounties, it is important to understand hunters' motivating factors, challenges, and overall benefits. We address this research gap with three studies: identifying key factors… ▽ More

    Submitted 7 March, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

  5. arXiv:2112.07047  [pdf, ps, other

    cs.CY

    SoK: A Framework for Unifying At-Risk User Research

    Authors: Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, Kurt Thomas

    Abstract: At-risk users are people who experience elevated digital security, privacy, and safety threats because of what they do, who they are, where they are, or who they are with. In this systematization work, we present a framework for reasoning about at-risk users based on a wide-ranging meta-analysis of 85 papers. Across the varied populations that we examined (e.g., children, activists, women in devel… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: 18 pages, 2 tables

  6. arXiv:2105.14619  [pdf, other

    cs.CR cs.HC

    Strategies and Perceived Risks of Sending Sensitive Documents

    Authors: Noel Warford, Collins W. Munyendo, Ashna Mediratta, Adam J. Aviv, Michelle L. Mazurek

    Abstract: People are frequently required to send documents, forms, or other materials containing sensitive data (e.g., personal information, medical records, financial data) to remote parties, sometimes without a formal procedure to do so securely. The specific transmission mechanisms end up relying on the knowledge and preferences of the parties involved. Through two online surveys ($n=60$ and $n=250$), we… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Comments: 25 pages, to appear in USENIX Security Symposium 2021

  7. arXiv:2001.00089  [pdf, other

    cs.CY cs.AI cs.LG

    Measuring Non-Expert Comprehension of Machine Learning Fairness Metrics

    Authors: Debjani Saha, Candice Schumann, Duncan C. McElfresh, John P. Dickerson, Michelle L. Mazurek, Michael Carl Tschantz

    Abstract: Bias in machine learning has manifested injustice in several areas, such as medicine, hiring, and criminal justice. In response, computer scientists have developed myriad definitions of fairness to correct this bias in fielded algorithms. While some definitions are based on established legal and ethical norms, others are largely mathematical. It is unclear whether the general public agrees with th… ▽ More

    Submitted 2 July, 2020; v1 submitted 16 December, 2019; originally announced January 2020.

  8. arXiv:1912.00317  [pdf, other

    cs.CR cs.HC

    An Observational Investigation of Reverse Engineers' Processes

    Authors: Daniel Votipka, Seth M. Rabin, Kristopher Micinski, Jeffrey S. Foster, Michelle L. Mazurek

    Abstract: Reverse engineering is a complex process essential to software-security tasks such as vulnerability discovery and malware analysis. Significant research and engineering effort has gone into developing tools to support reverse engineers. However, little work has been done to understand the way reverse engineers think when analyzing programs, leaving tool developers to make interface design decision… ▽ More

    Submitted 30 November, 2019; originally announced December 2019.

    Comments: 22 pages, 6 figures, to appear at the 2020 USENIX Security Symposium

  9. arXiv:1907.01679  [pdf, other

    cs.CR

    Build It, Break It, Fix It: Contesting Secure Development

    Authors: James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton

    Abstract: Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims to assess the ability to securely build software, not just break it. In BIBIFI, teams build specified software with the goal of maximizing correctness, performance, and security. The latter is tested when teams attempt to break other teams' s… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: 35pgs. Extension of arXiv:1606.01881 which was a conference paper previously published in CCS 2016. This is a journal version submitted to TOPS

  10. arXiv:1805.06542  [pdf, other

    cs.GT cs.CR cs.CY cs.HC

    Dancing Pigs or Externalities? Measuring the Rationality of Security Decisions

    Authors: Elissa M. Redmiles, Michelle L. Mazurek, John P. Dickerson

    Abstract: Accurately modeling human decision-making in security is critical to thinking about when, why, and how to recommend that users adopt certain secure behaviors. In this work, we conduct behavioral economics experiments to model the rationality of end-user security decision-making in a realistic online experimental system simulating a bank account. We ask participants to make a financially impactful… ▽ More

    Submitted 16 May, 2018; originally announced May 2018.

    Journal ref: 2018 ACM Conference on Economics and Computation

  11. Build It, Break It, Fix It: Contesting Secure Development

    Authors: Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel

    Abstract: Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to assess the ability to securely build software not just break it. In BIBIFI teams build specified software with the goal of maximizing correctness performance and security. The latter is tested when teams attempt to break other teams submissions… ▽ More

    Submitted 19 August, 2016; v1 submitted 6 June, 2016; originally announced June 2016.

  12. arXiv:1405.1861  [pdf, other

    cs.CR

    Modeling Bitcoin Contracts by Timed Automata

    Authors: Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

    Abstract: Bitcoin is a peer-to-peer cryptographic currency system. Since its introduction in 2008, Bitcoin has gained noticeable popularity, mostly due to its following properties: (1) the transaction fees are very low, and (2) it is not controlled by any central authority, which in particular means that nobody can "print" the money to generate inflation. Moreover, the transaction syntax allows to create th… ▽ More

    Submitted 27 June, 2014; v1 submitted 8 May, 2014; originally announced May 2014.

  13. arXiv:1312.3230  [pdf, ps, other

    cs.CR

    How to deal with malleability of BitCoin transactions

    Authors: Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek

    Abstract: BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction's hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a "refund" transaction… ▽ More

    Submitted 11 December, 2013; originally announced December 2013.