Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Dürmuth, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.05976  [pdf, other

    cs.CR cs.AI cs.CY cs.LG

    A Representative Study on Human Detection of Artificially Generated Media Across Countries

    Authors: Joel Frank, Franziska Herbert, Jonas Ricker, Lea Schönherr, Thorsten Eisenhofer, Asja Fischer, Markus Dürmuth, Thorsten Holz

    Abstract: AI-generated media has become a threat to our digital society as we know it. These forgeries can be created automatically and on a large scale based on publicly available technology. Recognizing this challenge, academics and practitioners have proposed a multitude of automatic detection strategies to detect such artificial media. However, in contrast to these technical advances, the human percepti… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

    Comments: Security and Privacy 2024 (S&P 24)

  2. 52 Weeks Later: Attitudes Towards COVID-19 Apps for Different Purposes Over Time

    Authors: Marvin Kowalewski, Christine Utz, Martin Degeling, Theodor Schnitzler, Franziska Herbert, Leonie Schaewitz, Florian M. Farke, Steffen Becker, Markus Dürmuth

    Abstract: The COVID-19 pandemic has prompted countries around the world to introduce smartphone apps to support disease control efforts. Their purposes range from digital contact tracing to quarantine enforcement to vaccination passports, and their effectiveness often depends on widespread adoption. While previous work has identified factors that promote or hinder adoption, it has typically examined data co… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 45 pages, 19 figures, 10 tables

  3. Digital Security -- A Question of Perspective. A Large-Scale Telephone Survey with Four At-Risk User Groups

    Authors: Franziska Herbert, Steffen Becker, Annalina Buckmann, Marvin Kowalewski, Jonas Hielscher, Yasemin Acar, Markus Dürmuth, Yixin Zou, M. Angela Sasse

    Abstract: This paper investigates the digital security experiences of four at-risk user groups in Germany, including older adults (70+), teenagers (14-17), people with migration backgrounds, and people with low formal education. Using computer-assisted telephone interviews, we sampled 250 participants per group, representative of region, gender, and partly age distributions. We examine their device usage, c… ▽ More

    Submitted 12 September, 2023; v1 submitted 25 December, 2022; originally announced December 2022.

  4. A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 Countries

    Authors: Franziska Herbert, Steffen Becker, Leonie Schaewitz, Jonas Hielscher, Marvin Kowalewski, M. Angela Sasse, Yasemin Acar, Markus Dürmuth

    Abstract: Misconceptions about digital security and privacy topics in the general public frequently lead to insecure behavior. However, little is known about the prevalence and extent of such misconceptions in a global context. In this work, we present the results of the first large-scale survey of a global population on misconceptions: We conducted an online survey with n = 12, 351 participants in 12 count… ▽ More

    Submitted 22 December, 2022; v1 submitted 20 December, 2022; originally announced December 2022.

  5. Understanding Users' Interaction with Login Notifications

    Authors: Philipp Markert, Leona Lassak, Maximilian Golla, Markus Dürmuth

    Abstract: Login notifications intend to inform users about sign-ins and help them protect their accounts from unauthorized access. Notifications are usually sent if a login deviates from previous ones, potentially indicating malicious activity. They contain information like the location, date, time, and device used to sign in. Users are challenged to verify whether they recognize the login (because it was t… ▽ More

    Submitted 31 March, 2024; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: 12+5 pages, 7 figures, 1+5 tables

    Journal ref: ACM Conference on Human Factors in Computing Systems 2024 (CHI '24)

  6. arXiv:2106.11676  [pdf, other

    cs.HC cs.CY

    Proof-of-Vax: Studying User Preferences and Perception of Covid Vaccination Certificates

    Authors: Marvin Kowalewski, Franziska Herbert, Theodor Schnitzler, Markus Dürmuth

    Abstract: Digital tools play an important role in fighting the current global COVID-19 pandemic. We conducted a representative online study in Germany on a sample of 599 participants to evaluate the user perception of vaccination certificates. We investigated five different variants of vaccination certificates, based on deployed and planned designs in a between-group design, including paper-based and app-ba… ▽ More

    Submitted 22 June, 2021; originally announced June 2021.

    Comments: 22 pages, 4 figures, 5 tables

  7. arXiv:2105.14066  [pdf, other

    cs.CY cs.HC

    Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity (Extended Version)

    Authors: Florian M. Farke, David G. Balash, Maximilian Golla, Markus Dürmuth, Adam J. Aviv

    Abstract: Privacy dashboards and transparency tools help users review and manage the data collected about them online. Since 2016, Google has offered such a tool, My Activity, which allows users to review and delete their activity data from Google services. We conducted an online survey with $n = 153$ participants to understand if Google's My Activity, as an example of a privacy transparency tool, increases… ▽ More

    Submitted 28 May, 2021; originally announced May 2021.

  8. What's in Score for Website Users: A Data-driven Long-term Study on Risk-based Authentication Characteristics

    Authors: Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono

    Abstract: Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it… ▽ More

    Submitted 26 January, 2021; originally announced January 2021.

    Comments: 23 pages, 4 figures, 5 tables

    Journal ref: 25th International Conference on Financial Cryptography and Data Security (FC '21). March 01-05, 2021. Springer

  9. Apps Against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three Continents

    Authors: Christine Utz, Steffen Becker, Theodor Schnitzler, Florian M. Farke, Franziska Herbert, Leonie Schaewitz, Martin Degeling, Markus Dürmuth

    Abstract: The COVID-19 pandemic has fueled the development of smartphone applications to assist disease management. Many "corona apps" require widespread adoption to be effective, which has sparked public debates about the privacy, security, and societal implications of government-backed health applications. We conducted a representative online study in Germany (n = 1,003), the US (n = 1,003), and China (n… ▽ More

    Submitted 1 February, 2021; v1 submitted 27 October, 2020; originally announced October 2020.

    Comments: 22 pages, 1 figure, 8 tables

  10. More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication

    Authors: Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono

    Abstract: Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional features during login, and when observed feature values differ significantly from previously seen ones, users have to provide additional authentication factors such as a verification code. RBA has the potential to offer more usable authentication, but the usability a… ▽ More

    Submitted 1 October, 2020; originally announced October 2020.

    Comments: 16 pages, 10 figures, 6 tables

    Journal ref: 36th Annual Computer Security Applications Conference (ACSAC '20). December 07-11, 2020

  11. Evaluation of Risk-based Re-Authentication Methods

    Authors: Stephan Wiefling, Tanvi Patil, Markus Dürmuth, Luigi Lo Iacono

    Abstract: Risk-based Authentication (RBA) is an adaptive security measure that improves the security of password-based authentication by protecting against credential stuffing, password guessing, or phishing attacks. RBA monitors extra features during login and requests for an additional authentication step if the observed feature values deviate from the usual ones in the login history. In state-of-the-art… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

    Comments: 14 pages, 5 figures. Paper accepted for IFIP SEC 2020. Keywords: Risk-based Authentication (RBA), Re-authentication, Usable Security

    Journal ref: 35th IFIP TC-11 International Conference on Information Security and Privacy Protection (IFIP SEC 2020). IFIP Advances in Information and Communication Technology, vol. 580, pp. 280-294. Springer, Cham

  12. Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild

    Authors: Stephan Wiefling, Luigi Lo Iacono, Markus Dürmuth

    Abstract: Risk-based authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional implicit features during password entry such as device or geolocation information, and requests additional authentication factors if a certain risk level is detected. RBA is recommended by the NIST digital identity guidelines, is used by several large online services… ▽ More

    Submitted 17 March, 2020; originally announced March 2020.

    Comments: 14 pages, 7 tables

    Journal ref: 34th IFIP TC-11 International Conference on Information Security and Privacy Protection (IFIP SEC 2019). IFIP Advances in Information and Communication Technology, vol. 562, pp. 134-148. Springer, Cham

  13. This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs

    Authors: Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv

    Abstract: In this paper, we provide the first comprehensive study of user-chosen 4- and 6-digit PINs (n=1220) collected on smartphones with participants being explicitly primed for device unlocking. We find that against a throttled attacker (with 10, 30, or 100 guesses, matching the smartphone unlock setting), using 6-digit PINs instead of 4-digit PINs provides little to no increase in security, and surpris… ▽ More

    Submitted 16 June, 2021; v1 submitted 10 March, 2020; originally announced March 2020.

    Comments: 15+3 pages, 9 figures, 8+5 tables

    Journal ref: IEEE Symposium on Security and Privacy 2020 (SP' 20)

  14. arXiv:1811.10548  [pdf, ps, other

    cs.CR cs.HC

    A Survey of Collection Methods and Cross-Data Set Comparison of Android Unlock Patterns

    Authors: Adam J. Aviv, Markus Duermuth

    Abstract: Android's graphical password unlock remains one of the most widely used schemes for phone unlock authentication, and it is has been studied extensively in the last decade since its launch. We have learned that users' choice of patterns mimics the poor password choices in other systems, such as PIN or text-based passwords. A wide variety of analysis and data collections methods was used to reach th… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

  15. arXiv:1304.6584  [pdf, ps, other

    cs.CR

    When Privacy meets Security: Leveraging personal information for password cracking

    Authors: Claude Castelluccia, Abdelberi Chaabane, Markus Dürmuth, Daniele Perito

    Abstract: Passwords are widely used for user authentication and, despite their weaknesses, will likely remain in use in the foreseeable future. Human-generated passwords typically have a rich structure, which makes them susceptible to guessing attacks. In this paper, we study the effectiveness of guessing attacks based on Markov models. Our contributions are two-fold. First, we propose a novel password crac… ▽ More

    Submitted 24 April, 2013; originally announced April 2013.

  16. arXiv:1112.2649  [pdf, other

    cs.CR

    X-pire! - A digital expiration date for images in social networks

    Authors: Julian Backes, Michael Backes, Markus Dürmuth, Sebastian Gerling, Stefan Lorenz

    Abstract: The Internet and its current information culture of preserving all kinds of data cause severe problems with privacy. Most of today's Internet users, especially teenagers, publish various kinds of sensitive information, yet without recognizing that revealing this information might be detrimental to their future life and career. Unflattering images that can be openly accessed now and in the future,… ▽ More

    Submitted 12 December, 2011; originally announced December 2011.