Computer security paper
Paper list
Paper list
280
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates
User study
Compliance
435
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model
Smartphone
Permission
Runtime Permission Model
User study
Android
iOS
457
Why Older Adults (Don't) Use Password Managers
Password
Password Managers
User study
622
Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data
Voice Assistant
VA
Privacy
User study
633
Security and Privacy Perceptions of Third-Party Application Access for Google Accounts
Google
Online service
API
Platform
User study
GAFA
SSO
1742
Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World
Autonomous Vehicle
Object detection
manualSet
CARLA
User study
YOLOv5
SSD
Faster R-CNN
Mask-RCNN
1750
Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack
Autonomous Vehicle
Lane detection
manualSet
ALC
Camera
User study
OpenPilot
LGSVL
Physical-World
1995
Users really do respond to smishing
Smishing
user study