Publications

Found 12 results
Author Title [ Type(Asc)] Year
Filters: Author is David Wagner  [Clear All Filters]
Conference Paper
Lee, L., Fifield D., Malkin N., Iyer G., Egelman S., & Wagner D. (2017).  A Usability Evaluation of Tor Launcher. Proceedings on Privacy Enhancing Technologies 2017.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (2019).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Portnoff, R. S., Lee L. N., Egelman S., Mishra P., Leung D., & Wagner D. (2015).  Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.
Lee, L., Lee JH., Egelman S., & Wagner D. (2016).  Information Disclosure Concerns in The Age of Wearable Computing. Proceedings of the NDSS Workshop on Usable Security (USEC ’16).
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.