Skip to main content

Showing 1–4 of 4 results for author: Simko, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.09708  [pdf, other

    cs.CR

    "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

    Authors: Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl

    Abstract: Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with potential drawbacks that can lead to account and asset loss. If users lose access to their additional authentication factors for any reason, they will… ▽ More

    Submitted 19 September, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

  2. arXiv:2012.01553  [pdf, other

    cs.CY cs.CR cs.HC

    COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion

    Authors: Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno

    Abstract: There is growing use of technology-enabled contact tracing, the process of identifying potentially infected COVID-19 patients by notifying all recent contacts of an infected person. Governments, technology companies, and research groups alike have been working towards releasing smartphone apps, using IoT devices, and distributing wearable technology to automatically track "close contacts" and iden… ▽ More

    Submitted 4 December, 2020; v1 submitted 2 December, 2020; originally announced December 2020.

    Comments: 37 pages, 11 figures. Supercedes arXiv:2005.06056

  3. arXiv:2005.06056  [pdf, other

    cs.CR cs.CY

    COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences

    Authors: Lucy Simko, Ryan Calo, Franziska Roesner, Tadayoshi Kohno

    Abstract: There is growing interest in technology-enabled contact tracing, the process of identifying potentially infected COVID-19 patients by notifying all recent contacts of an infected person. Governments, technology companies, and research groups alike recognize the potential for smartphones, IoT devices, and wearable technology to automatically track "close contacts" and identify prior contacts in the… ▽ More

    Submitted 17 December, 2020; v1 submitted 12 May, 2020; originally announced May 2020.

    Comments: 32 pages, 10 figures (including 5 in appendix B), 1 table, 2 appendices. NOTE: As of December 4, 2020, this report has been superseded by Report Version 2.0,found at arXiv:2012.01553. Please read and cite Report Version 2.0 instead

  4. arXiv:1812.09383  [pdf, other

    cs.CY

    Technology-Enabled Disinformation: Summary, Lessons, and Recommendations

    Authors: John Akers, Gagan Bansal, Gabriel Cadamuro, Christine Chen, Quanze Chen, Lucy Lin, Phoebe Mulcaire, Rajalakshmi Nandakumar, Matthew Rockett, Lucy Simko, John Toman, Tongshuang Wu, Eric Zeng, Bill Zorn, Franziska Roesner

    Abstract: Technology is increasingly used -- unintentionally (misinformation) or intentionally (disinformation) -- to spread false information at scale, with potentially broad-reaching societal effects. For example, technology enables increasingly realistic false images and videos, and hyper-personal targeting means different people may see different versions of reality. This report is the culmination of a… ▽ More

    Submitted 3 January, 2019; v1 submitted 21 December, 2018; originally announced December 2018.