Publications

Found 12 results
Author Title Type [ Year(Desc)]
Filters: Author is David Wagner  [Clear All Filters]
2015
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Portnoff, R. S., Lee L. N., Egelman S., Mishra P., Leung D., & Wagner D. (2015).  Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
2016
Lee, L., Lee JH., Egelman S., & Wagner D. (2016).  Information Disclosure Concerns in The Age of Wearable Computing. Proceedings of the NDSS Workshop on Usable Security (USEC ’16).
2017
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Lee, L., Fifield D., Malkin N., Iyer G., Egelman S., & Wagner D. (2017).  A Usability Evaluation of Tor Launcher. Proceedings on Privacy Enhancing Technologies 2017.
2018
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
2019
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (2019).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
2021
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
2022
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.