Skip to main content

Showing 1–3 of 3 results for author: Sadik, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.03044  [pdf, ps, other

    cs.HC cs.CY

    A Large-Scale Survey of Password Entry Practices on Non-Desktop Devices

    Authors: John Sadik, Scott Ruoti

    Abstract: Password managers encourage users to generate passwords to improve their security. However, research has shown that users avoid generating passwords, often giving the rationale that it is difficult to enter generated passwords on devices without a password manager. In this paper, we conduct a survey ($n=999$) of individuals from the US, UK, and Europe, exploring the range of devices on which they… ▽ More

    Submitted 4 September, 2024; originally announced September 2024.

    Comments: 12 pages, 4 figures, 8 tables

  2. arXiv:2402.03255  [pdf, other

    cs.SI cs.CY cs.HC

    Security Advice for Parents and Children About Content Filtering and Circumvention as Found on YouTube and TikTok

    Authors: Ran Elgedawy, John Sadik, Anuj Gautam, Trinity Bissahoyo, Christopher Childress, Jacob Leonard, Clay Shubert, Scott Ruoti

    Abstract: In today's digital age, concerns about online security and privacy have become paramount. However, addressing these issues can be difficult, especially within the context of family relationships, wherein parents and children may have conflicting interests. In this environment, parents and children may turn to online security advice to determine how to proceed. In this paper, we examine the advice… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 15 pages, 5 figures, 8 tables

  3. arXiv:2402.00689  [pdf, other

    cs.CR cs.AI

    Ocassionally Secure: A Comparative Analysis of Code Generation Assistants

    Authors: Ran Elgedawy, John Sadik, Senjuti Dutta, Anuj Gautam, Konstantinos Georgiou, Farzin Gholamrezae, Fujiao Ji, Kyungchan Lim, Qian Liu, Scott Ruoti

    Abstract: $ $Large Language Models (LLMs) are being increasingly utilized in various applications, with code generations being a notable example. While previous research has shown that LLMs have the capability to generate both secure and insecure code, the literature does not take into account what factors help generate secure and effective code. Therefore in this paper we focus on identifying and understan… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 12 pages, 2 figures