Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Stegman, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.05824  [pdf, other

    cs.CR cs.HC

    No Privacy in the Electronics Repair Industry

    Authors: Jason Ceci, Jonah Stegman, Hassan Khan

    Abstract: Electronics repair and service providers offer a range of services to computing device owners across North America -- from software installation to hardware repair. Device owners obtain these services and leave their device along with their access credentials at the mercy of technicians, which leads to privacy concerns for owners' personal data. We conduct a comprehensive four-part study to measur… ▽ More

    Submitted 10 November, 2022; originally announced November 2022.

    Comments: This paper has been accepted to appear at the 44th IEEE Symposium on Security and Privacy (IEEE S&P 2023)

  2. arXiv:2209.11878  [pdf, other

    cs.CR cs.HC

    "My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software

    Authors: Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan

    Abstract: Employees are often required to use Enterprise Security Software ("ESS") on corporate and personal devices. ESS products collect users' activity data including users' location, applications used, and websites visited - operating from employees' device to the cloud. To the best of our knowledge, the privacy implications of this data collection have yet to be explored. We conduct an online survey (n… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Comments: To appear in USENIX Security Symposium 2023

  3. arXiv:2008.10697  [pdf, other

    cs.HC cs.CR

    Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond

    Authors: Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber

    Abstract: Personal Identification Numbers (PINs) are widely used as an access control mechanism for digital assets (e.g., smartphones), financial assets (e.g., ATM cards), and physical assets (e.g., locks for garage doors or homes). Using semi-structured interviews (n=35), participants reported on PIN usage for different types of assets, including how users choose, share, inherit, and reuse PINs, as well as… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.