What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lujo Bauer
Google Scholar
54
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Transparency or Information Overload? Evaluating Users' Comprehension and Perceptions of the iOS App Privacy Report.
Xiaoyuan Wu
Lydia Hu
Eric Zeng
Hana Habib
Lujo Bauer
2025
conf/soups
Adopting AI to Protect Industrial Control Systems: Assessing Challenges and Opportunities from the Operators' Perspective.
Clement Fung
Eric Zeng
Lujo Bauer
2025
conf/soups
Misuse, Misreporting, Misinterpretation of Statistical Methods in Usable Privacy and Security Papers.
Jenny Tang
Lujo Bauer
Nicolas Christin
2024
conf/ccs
Training Robust ML-based Raw-Binary Malware Detectors in Hours, not Months.
Keane Lucas
Weiran Lin
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
2024
conf/uss
The Impact of Exposed Passwords on Honeyword Efficacy.
Zonghao Huang
Lujo Bauer
Michael K. Reiter
2024
conf/ndss
Group-based Robustness: A General Framework for Customized Robustness in the Real World.
Weiran Lin
Keane Lucas
Neo Eyal
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
2024
conf/ndss
Attributions for ML-based ICS Anomaly Detection: From Theory to Practice.
Clement Fung
Eric Zeng
Lujo Bauer
2023
journals/popets
Speculative Privacy Concerns about AR Glasses Data Collection.
Andrea Gallardo
Chris Choy
Jaideep Juneja
Efe Bozkir
Camille Cobb
Lujo Bauer
Lorrie Cranor
2023
conf/uss
Adversarial Training for Raw-Binary Malware Classifiers.
Keane Lucas
Samruddhi Pai
Weiran Lin
Lujo Bauer
Michael K. Reiter
Mahmood Sharif
2023
conf/sp
Shedding Light on Inconsistencies in Grid Cybersecurity: Disconnects and Recommendations.
Brian Singer
Amritanshu Pandey
Shimiao Li
Lujo Bauer
Craig Miller
Lawrence T. Pileggi
Vyas Sekar
2023
conf/soups
Towards Usable Security Analysis Tools for Trigger-Action Programming.
McKenna McCall
Eric Zeng
Faysal Hossain Shezan
Mitchell Yang
Lujo Bauer
Abhishek Bichhawat
Camille Cobb
Limin Jia
Yuan Tian
2022
journals/popets
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Darion Cassel
Su-Chin Lin
Alessio Buraggina
William Wang
Andrew Zhang
Lujo Bauer
Hsu-Chun Hsiao
Limin Jia
Timothy Libert
2022
conf/soups
Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles.
Andrea Gallardo
Hanseul Kim
Tianying Li
Lujo Bauer
Lorrie Faith Cranor
2022
conf/esorics
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems.
Clement Fung
Shreya Srinarasi
Keane Lucas
Hay Bryan Phee
Lujo Bauer
2021
journals/popets
"I would have to evaluate their objections": Privacy tensions between smart home device owners and incidental users.
Camille Cobb
Sruti Bhagavatula
Kalil Anderson Garrett
Alison Hoffman
Varun Rao
Lujo Bauer
2021
journals/popets
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics.
Shikun Zhang
Yuanyuan Feng
Lujo Bauer
Lorrie Faith Cranor
Anupam Das
Norman M. Sadeh
2021
conf/asiaccs
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
Saurabh Shintre
2020
conf/ccs
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Joshua Tan
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2020
conf/soups
How Risky Are Real Users' IFTTT Applets?
Camille Cobb
Milijana Surbatovich
Anna Kawakami
Mahmood Sharif
Lujo Bauer
Anupam Das
Limin Jia
2019
conf/soups
Why people (don't) use password managers effectively.
Shikun Zhang
Sarah Pearman
Lujo Bauer
Nicolas Christin
2018
conf/soups
User Behaviors and Attitudes Under Password Expiration Policies.
Hana Habib
Pardis Emami Naeini
Summer Devlin
Maggie Oates
Chelse Swoopes
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2018
conf/ndss
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
William Melicher
Anupam Das
Mahmood Sharif
Lujo Bauer
Limin Jia
2017
conf/ccs
Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Sarah Pearman
Jeremy Thomas
Pardis Emami Naeini
Hana Habib
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Serge Egelman
Alain Forget
2017
conf/soups
Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles.
Cara Bloom
Joshua Tan
Javed Ramjohn
Lujo Bauer
2017
conf/soups
Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Sean M. Segreti
William Melicher
Saranga Komanduri
Darya Melicher
Richard Shay
Blase Ur
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Michelle L. Mazurek
2017
conf/soups
Privacy Expectations and Preferences in an IoT World.
Pardis Emami Naeini
Sruti Bhagavatula
Hana Habib
Martin Degeling
Lujo Bauer
Lorrie Faith Cranor
Norman M. Sadeh
2016
journals/popets
(Do Not) Track Me Sometimes: Users' Contextual Preferences for Web Tracking.
William Melicher
Mahmood Sharif
Joshua Tan
Lujo Bauer
Mihai Christodorescu
Pedro Giovanni Leon
2016
conf/ccs
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Mahmood Sharif
Sruti Bhagavatula
Lujo Bauer
Michael K. Reiter
2016
conf/uss
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks.
William Melicher
Blase Ur
Sean M. Segreti
Saranga Komanduri
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2016
conf/fc
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers.
Jassim Aljuraidan
Lujo Bauer
Michael K. Reiter
Matthias Beckerle
2015
conf/uss
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Blase Ur
Sean M. Segreti
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Saranga Komanduri
Darya Kurilova
Michelle L. Mazurek
William Melicher
Richard Shay
2015
conf/soups
"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab.
Blase Ur
Fumiko Noma
Jonathan Bees
Sean M. Segreti
Richard Shay
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2015
conf/ndss
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Lujo Bauer
Shaoying Cai
Limin Jia
Timothy Passaro
Michael Stroucken
Yuan Tian
2014
journals/compsec
Editorial.
Lakshmish Ramaswamy
Barbara Carminati
Lujo Bauer
Dongwan Shin
James Joshi
Calton Pu
Dimitris Gritzalis
2014
conf/cns
Analyzing the dangers posed by Chrome extensions.
Lujo Bauer
Shaoying Cai
Limin Jia
Timothy Passaro
Yuan Tian
2013
conf/ccs
What you want is not what you get: predicting sharing policies for text-based content on facebook.
Arunesh Sinha
Yan Li
Lujo Bauer
2013
conf/ccs
Measuring password guessability for an entire university.
Michelle L. Mazurek
Saranga Komanduri
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Patrick Gage Kelley
Richard Shay
Blase Ur
2013
conf/fc
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2013
conf/soups
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Pedro Giovanni Leon
Blase Ur
Yang Wang
Manya Sleeper
Rebecca Balebako
Richard Shay
Lujo Bauer
Mihai Christodorescu
Lorrie Faith Cranor
2013
conf/esorics
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Limin Jia
Jassim Aljuraidan
Elli Fragkaki
Lujo Bauer
Michael Stroucken
Kazuhide Fukushima
Shinsaku Kiyomoto
Yutaka Miyake
2012
conf/uss
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Blase Ur
Patrick Gage Kelley
Saranga Komanduri
Joel Lee
Michael Maass
Michelle L. Mazurek
Timothy Passaro
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2012
conf/sp
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Julio C. López
2012
conf/soups
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Richard Shay
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Blase Ur
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2012
conf/esorics
Modeling and Enhancing Android's Permission System.
Elli Fragkaki
Lujo Bauer
Limin Jia
David Swasey
2011
conf/acsac
Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement.
Ahren Studer
Timothy Passaro
Lujo Bauer
2010
conf/uss
Challenges in Access Right Assignment for Secure Home Networks.
Tiffany Hyun-Jin Kim
Lujo Bauer
James Newsome
Adrian Perrig
Jesse Walker
2010
conf/soups
Encountering stronger password requirements: user attitudes and behaviors.
Richard Shay
Saranga Komanduri
Patrick Gage Kelley
Pedro Giovanni Leon
Michelle L. Mazurek
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2007
conf/soups
Lessons learned from the deployment of a smartphone-based access-control system.
Lujo Bauer
Lorrie Faith Cranor
Michael K. Reiter
Kami Vaniea
2007
conf/esorics
Efficient Proving for Practical Distributed Access-Control Systems.
Lujo Bauer
Scott Garriss
Michael K. Reiter
2007
conf/ndss
Consumable Credentials in Linear-Logic-Based Access-Control Systems.
Kevin D. Bowers
Lujo Bauer
Deepak Garg
Frank Pfenning
Michael K. Reiter
2006
conf/esorics
A Linear Logic of Authorization and Knowledge.
Deepak Garg
Lujo Bauer
Kevin D. Bowers
Frank Pfenning
Michael K. Reiter
2005
conf/sp
Distributed Proving in Access-Control Systems.
Lujo Bauer
Scott Garriss
Michael K. Reiter
2005
conf/esorics
Enforcing Non-safety Security Policies with Program Monitors.
Jay Ligatti
Lujo Bauer
David Walker
2002
conf/uss
A General and Flexible Access-Control System for the Web.
Lujo Bauer
Michael A. Schneider
Edward W. Felten
Coauthors
Abhishek Bichhawat
(1)
Adrian Perrig
(1)
Ahren Studer
(1)
Alain Forget
(1)
Alessio Buraggina
(1)
Alison Hoffman
(1)
Amritanshu Pandey
(1)
Andrea Gallardo
(2)
Andrew Zhang
(1)
Anna Kawakami
(1)
Anupam Das
(3)
Arunesh Sinha
(1)
Barbara Carminati
(1)
Blase Ur
(8)
Brian Singer
(1)
Calton Pu
(1)
Camille Cobb
(4)
Cara Bloom
(1)
Chelse Swoopes
(1)
Chris Choy
(1)
Clement Fung
(3)
Craig Miller
(1)
Darion Cassel
(1)
Darya Kurilova
(1)
Darya Melicher
(1)
David Swasey
(1)
David Walker
(1)
Deepak Garg
(2)
Dimitris Gritzalis
(1)
Dongwan Shin
(1)
Edward W. Felten
(1)
Efe Bozkir
(1)
Elli Fragkaki
(2)
Eric Zeng
(4)
Faysal Hossain Shezan
(1)
Frank Pfenning
(2)
Fumiko Noma
(1)
Hana Habib
(4)
Hanseul Kim
(1)
Hay Bryan Phee
(1)
Hsu-Chun Hsiao
(1)
Jaideep Juneja
(1)
James Joshi
(1)
James Newsome
(1)
Jassim Aljuraidan
(2)
Javed Ramjohn
(1)
Jay Ligatti
(1)
Jenny Tang
(1)
Jeremy Thomas
(1)
Jesse Walker
(1)
Joel Lee
(1)
Jonathan Bees
(1)
Joshua Tan
(3)
Julio C. López
(1)
Kalil Anderson Garrett
(1)
Kami Vaniea
(1)
Kazuhide Fukushima
(1)
Keane Lucas
(5)
Kevin D. Bowers
(2)
Lakshmish Ramaswamy
(1)
Lawrence T. Pileggi
(1)
Limin Jia
(8)
Lorrie Cranor
(1)
Lorrie Faith Cranor
(18)
Lujo Bauer
(54)
Lydia Hu
(1)
Maggie Oates
(1)
Mahmood Sharif
(8)
Manya Sleeper
(1)
Martin Degeling
(1)
Matthias Beckerle
(1)
McKenna McCall
(1)
Michael A. Schneider
(1)
Michael K. Reiter
(12)
Michael Maass
(1)
Michael Stroucken
(2)
Michelle L. Mazurek
(8)
Mihai Christodorescu
(2)
Milijana Surbatovich
(1)
Mitchell Yang
(1)
Neo Eyal
(1)
Nicolas Christin
(15)
Norman M. Sadeh
(2)
Pardis Emami Naeini
(3)
Patrick Gage Kelley
(6)
Pedro Giovanni Leon
(3)
Rebecca Balebako
(1)
Richard Shay
(10)
Samruddhi Pai
(1)
Sarah Pearman
(2)
Saranga Komanduri
(9)
Saurabh Shintre
(1)
Scott Garriss
(2)
Sean M. Segreti
(4)
Serge Egelman
(1)
Shaoying Cai
(2)
Shikun Zhang
(2)
Shimiao Li
(1)
Shinsaku Kiyomoto
(1)
Shreya Srinarasi
(1)
Sruti Bhagavatula
(3)
Su-Chin Lin
(1)
Summer Devlin
(1)
Tianying Li
(1)
Tiffany Hyun-Jin Kim
(1)
Timothy Libert
(1)
Timothy Passaro
(4)
Timothy Vidas
(5)
Varun Rao
(1)
Vyas Sekar
(1)
Weiran Lin
(3)
William Melicher
(5)
William Wang
(1)
Xiaoyuan Wu
(1)
Yan Li
(1)
Yang Wang
(1)
Yuan Tian
(3)
Yuanyuan Feng
(1)
Yutaka Miyake
(1)
Zonghao Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to