Out-of-device privacy unveiled: Designing and validating the out-of-device privacy scale (odps)

H Farzand, K Marky, M Khamis - Proceedings of the CHI Conference on …, 2024 - dl.acm.org
This paper proposes an Out-of-Device Privacy Scale (ODPS)-a reliable, validated
psychometric privacy scale that measures users' importance of out-of-device privacy. In …

In the quest to protect users from {Side-Channel} attacks–a {User-Centred} design space to mitigate thermal attacks on public payment terminals

K Marky, S Macdonald, Y Abdrabou… - 32nd usenix security …, 2023 - usenix.org
Thermal attacks are an emerging threat that enables the reconstruction of user input after
interaction with a device by analysing heat traces. There are several ways to protect users …

Vulnerability Analysis and Security Assessment of Secure Keyboard Software to Prevent PS/2 Interface Keyboard Sniffing

K Lee, K Yim - Sensors, 2023 - mdpi.com
Online security threats have arisen through Internet banking hacking cases, and highly
sensitive user information such as the ID, password, account number, and account …

A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

Pin scrambler: Assessing the impact of randomized layouts on the usability and security of pins

D Kirkwood, C Tombul, C Firth, F Macdonald… - Proceedings of the 21st …, 2022 - dl.acm.org
Randomizing the layout of the keypad has been proposed to improve the security of PIN
entry. However, there has been no empirical quantification of its impact on usability and …

Conducting and Mitigating Portable Thermal Imaging Attacks on User Authentication using AI-driven Methods

SA Macdonald, NMT Alotaibi, MS Islam… - Proceedings of the …, 2023 - dl.acm.org
Thermal cameras have become portable enough to integrate into wearables, such as
glasses, and can be used maliciously to infer passwords observing heat traces left on …

RePaLM: A Data-Driven AI Assistant for Making Stronger Pattern Choices

C Milousi, GE Raptis, C Katsini, C Katsanos - IFIP Conference on Human …, 2023 - Springer
Security mechanisms based on patterns, such as Pattern Lock, are commonly used to
prevent unauthorized access. They introduce several benefits, such as ease of use, an …

Change Policy or Users? Mitigating the Security Risks of Thermal Attacks

SA Macdonald, H Farzand, N Alotaibi, MS Islam… - 2023 - eprints.gla.ac.uk
Attacks on passwords by thermal cameras are a poignant example of how emerging
technologies can pose unforeseen security risks. Despite being easy to perform and …

[引用][C] Assessment of existing cyber-attack detection models for web-based systems

OG Awuor - Global Journal of Engineering and Technology …, 2023

[PDF][PDF] Analysing and Preventing Self-Issued Voice Commands

S Esposito - pure.royalholloway.ac.uk
In this thesis, I investigate to what extent self-issued voice commands can threaten Voice-
Controllable Devices (VCDs) in real-world scenarios. First, I formalise the threat model for …