publications
Google Scholar profile, publications list in DBLP, ACM DL Author Profile
all Konstantin’s publications in LERSSE DL (you can download each)
generated by
2024
(1)
Trust, Privacy, and Safety Factors Associated with Decision Making in P2P Markets Based on Social Networks: A Case Study of Facebook Marketplace in USA and Canada.
Azadeh Mokhberi, Yue Huang, Guillaume Humbert, Borke Obada-Obieh, Masoud Mehrabi Koushki, & Konstantin Beznosov.
In
Proceedings of the CHI Conference on Human Factors in Computing Systems, pages 1–25, 2024.
Paper
link
bibtex
2 downloads
@inproceedings{mokhberi2024trust,
title={Trust, Privacy, and Safety Factors Associated with Decision Making in P2P Markets Based on Social Networks: A Case Study of Facebook Marketplace in USA and Canada},
author={Mokhberi, Azadeh and Huang, Yue and Humbert, Guillaume and Obada-Obieh, Borke and Mehrabi Koushki, Masoud and Beznosov, Konstantin},
booktitle={Proceedings of the CHI Conference on Human Factors in Computing Systems},
pages={1--25},
url = {https://doi.org/10.1145/3613904.3641966},
year={2024}
}
2022
(5)
SoK: the dual nature of technology in sexual abuse.
Borke Obada-Obieh, Yue Huang, Lucrezia Spagnolo, & Konstantin Beznosov.
In
2022 IEEE Symposium on Security and Privacy (SP), pages 2320–2343, 2022. IEEE
link
bibtex
@inproceedings{obada2022sok,
title={SoK: the dual nature of technology in sexual abuse},
author={Obada-Obieh, Borke and Huang, Yue and Spagnolo, Lucrezia and Beznosov, Konstantin},
booktitle={2022 IEEE Symposium on Security and Privacy (SP)},
pages={2320--2343},
year={2022},
organization={IEEE}
}
Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User {Access-Control} Solutions on Smartphones.
Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, & Konstantin Beznosov.
In
31st USENIX Security Symposium (USENIX Security 22), pages 917–935, 2022.
link
bibtex
@inproceedings{koushki2022neither,
title={Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User $\{$Access-Control$\}$ Solutions on Smartphones},
author={Koushki, Masoud Mehrabi and Huang, Yue and Rubin, Julia and Beznosov, Konstantin},
booktitle={31st USENIX Security Symposium (USENIX Security 22)},
pages={917--935},
year={2022}
}
Users' Perceptions of Chrome Compromised Credential Notification.
Yue Huang, Borke Obada-Obieh, & Konstantin Beznosov.
In
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pages 155–174, 2022.
link
bibtex
@inproceedings{huang2022users,
title={Users' Perceptions of Chrome Compromised Credential Notification},
author={Huang, Yue and Obada-Obieh, Borke and Beznosov, Konstantin},
booktitle={Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)},
pages={155--174},
year={2022}
}
Users' Expectations, Experiences, and Concerns With COVID Alert, an Exposure-Notification App.
Yue Huang, Borke Obada-Obieh, Satya Lokam, & Konstantin Beznosov.
Proceedings of the ACM on Human-Computer Interaction, 6(CSCW2): 1–33. 2022.
link
bibtex
@article{huang2022users,
title={Users' Expectations, Experiences, and Concerns With COVID Alert, an Exposure-Notification App},
author={Huang, Yue and Obada-Obieh, Borke and Lokam, Satya and Beznosov, Konstantin},
journal={Proceedings of the ACM on Human-Computer Interaction},
volume={6},
number={CSCW2},
pages={1--33},
year={2022},
publisher={ACM New York, NY, USA}
}
2021
(8)
Bits under the mattress: Understanding different risk perceptions and security behaviors of crypto-asset users.
Svetlana Abramova, Artemij Voskobojnikov, Konstantin Beznosov, & Rainer Böhme.
In
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–19, 2021.
link
bibtex
@inproceedings{abramova2021bits,
title={Bits under the mattress: Understanding different risk perceptions and security behaviors of crypto-asset users},
author={Abramova, Svetlana and Voskobojnikov, Artemij and Beznosov, Konstantin and B{\"o}hme, Rainer},
booktitle={Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems},
pages={1--19},
year={2021}
}
On smartphone users’ difficulty with understanding implicit authentication.
Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, & Konstantin Beznosov.
In
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–14, 2021.
link
bibtex
@inproceedings{koushki2021smartphone,
title={On smartphone users’ difficulty with understanding implicit authentication},
author={Koushki, Masoud Mehrabi and Obada-Obieh, Borke and Huh, Jun Ho and Beznosov, Konstantin},
booktitle={Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems},
pages={1--14},
year={2021}
}
The u in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets.
Artemij Voskobojnikov, Oliver Wiese, Masoud Mehrabi Koushki, Volker Roth, & Konstantin Beznosov.
In
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–14, 2021.
Honorable Mention, acceptance rate: 26%,
link
bibtex
@inproceedings{voskobojnikov2021u,
title={The u in crypto stands for usable: An empirical study of user experience with mobile cryptocurrency wallets},
author={Voskobojnikov, Artemij and Wiese, Oliver and Mehrabi Koushki, Masoud and Roth, Volker and Beznosov, Konstantin},
booktitle={Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems},
pages={1--14},
bibbase_note = {<span style="color: red">Honorable Mention</span>, acceptance rate: 26%,},
year={2021}
}
Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk.
Artemij Voskobojnikov, Svetlana Abramova, Konstantin Beznosov, & Rainer Böhme.
In
ECIS, 2021.
link
bibtex
@inproceedings{voskobojnikov2021non,
title={Non-Adoption of Crypto-Assets: Exploring the Role of Trust, Self-Efficacy, and Risk.},
author={Voskobojnikov, Artemij and Abramova, Svetlana and Beznosov, Konstantin and B{\"o}hme, Rainer},
booktitle={ECIS},
year={2021}
}
Challenges and threats of mass telecommuting: a qualitative study of workers.
Borke Obada-Obieh, Yue Huang, & Konstantin Beznosov.
In
Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), pages 675–694, 2021.
link
bibtex
@inproceedings{obada2021challenges,
title={Challenges and threats of mass telecommuting: a qualitative study of workers},
author={Obada-Obieh, Borke and Huang, Yue and Beznosov, Konstantin},
booktitle={Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)},
pages={675--694},
year={2021}
}
SoK: human, organizational, and technological dimensions of developers’ challenges in engineering secure software.
Azadeh Mokhberi, & Konstantin Beznosov.
In
Proceedings of the 2021 European Symposium on Usable Security, pages 59–75, 2021.
link
bibtex
@inproceedings{mokhberi2021sok,
title={SoK: human, organizational, and technological dimensions of developers’ challenges in engineering secure software},
author={Mokhberi, Azadeh and Beznosov, Konstantin},
booktitle={Proceedings of the 2021 European Symposium on Usable Security},
pages={59--75},
year={2021}
}
2020
(7)
Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks.
Yue Huang, Borke Obada-Obieh, & Konstantin Beznosov.
In
Proceedings of the 2020 CHI conference on human factors in computing systems, pages 402:1—402:13, 2020.
Honorable Mention, acceptance rate: 24%,
Paper
link
bibtex
1 download
@inproceedings{huang2020amazon,
title={Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks},
author={Huang, Yue and Obada-Obieh, Borke and Beznosov, Konstantin},
booktitle={Proceedings of the 2020 CHI conference on human factors in computing systems},
pages={402:1—402:13},
bibbase_note = {<span style="color: red">Honorable Mention</span>, acceptance rate: 24%,},
url = {http://dx.doi.org/10.1145/3313831.3376529},
year={2020}
}
The burden of ending online account sharing.
Borke Obada-Obieh, Yue Huang, & Konstantin Beznosov.
In
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pages 1–13, 2020.
link
bibtex
@inproceedings{obada2020burden,
title={The burden of ending online account sharing},
author={Obada-Obieh, Borke and Huang, Yue and Beznosov, Konstantin},
booktitle={Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
pages={1--13},
year={2020}
}
Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users.
Artemij Voskobojnikov, Borke Obada-Obieh, Yue Huang, & Konstantin Beznosov.
In Joseph Bonneau, & Nadia Heninger., editor(s),
International Conference on Financial Cryptography and Data Security (FC), pages 595–614, 2020. Springer International Publishing
offical copy
author copy
presentation video
video summary
presentation slides
doi
link
bibtex
abstract
9 downloads
@inproceedings{voskobojnikov2020surviving,
title={Surviving the Cryptojungle: Perception and Management of Risk Among North American Cryptocurrency (Non) Users},
author={Voskobojnikov, Artemij and Obada-Obieh, Borke and Huang, Yue and Beznosov, Konstantin},
booktitle={International Conference on Financial Cryptography and Data Security (FC)},
editor = "Bonneau, Joseph and Heninger, Nadia",
pages = {595--614},
year = {2020},
organization = {Springer International Publishing},
abstract = "With the massive growth of cryptocurrency markets in recent years has come an influx of new users and investors, pushing the overall number of owners into the millions. At the same time, the number of distinct cryptocurrencies has exploded to over 4,900. In this burgeoning and chaotic ``cryptojungle,'' new and unexplored incentives and risks drive the behavior of users and non-users of cryptocurrencies. While previous research has focused almost exclusively on Bitcoin, other cryptocurrencies and utility tokens have been ignored. This paper presents findings from an interview study of cryptocurrency users and non-users (N=20). We specifically focus on their perceptions and management of cryptocurrency risks as well as their reasons for or against involvement with cryptocurrencies. Our results suggest that associated risks and mitigation strategies (among other factors) might be specific to a particular crypto-asset and its application area. Further, we identify misunderstandings of both users and non-users that might lead to skewed risk perceptions or dangerous errors. Lastly, we discuss ways of aiding users with managing risks, as well as design implications for coin management tools.",
isbn="978-3-030-51280-4",
url_Offical_Copy = {https://doi.org/10.1007/978-3-030-51280-4_32},
url_Author_Copy = {https://drive.google.com/file/d/1IbXWx0Dv6vo_AE94VWxgvyZNbnUJxmqz},
url_Presentation_Video = {https://youtu.be/P1wWGsusW70},
url_Video_Summary = {https://youtu.be/ILs9Kfnci1s},
url_Presentation_Slides = {https://drive.google.com/file/d/1J4IfIyTV4zavNLFbkHgM4hQVxgPSjGvQ},
DOI = {10.1007/978-3-030-51280-4_32}
}
With the massive growth of cryptocurrency markets in recent years has come an influx of new users and investors, pushing the overall number of owners into the millions. At the same time, the number of distinct cryptocurrencies has exploded to over 4,900. In this burgeoning and chaotic ``cryptojungle,'' new and unexplored incentives and risks drive the behavior of users and non-users of cryptocurrencies. While previous research has focused almost exclusively on Bitcoin, other cryptocurrencies and utility tokens have been ignored. This paper presents findings from an interview study of cryptocurrency users and non-users (N=20). We specifically focus on their perceptions and management of cryptocurrency risks as well as their reasons for or against involvement with cryptocurrencies. Our results suggest that associated risks and mitigation strategies (among other factors) might be specific to a particular crypto-asset and its application area. Further, we identify misunderstandings of both users and non-users that might lead to skewed risk perceptions or dangerous errors. Lastly, we discuss ways of aiding users with managing risks, as well as design implications for coin management tools.
Towards understanding privacy and trust in online reporting of sexual assault.
Borke Obada-Obieh, Lucrezia Spagnolo, & Konstantin Beznosov.
In
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), pages 145–164, 2020.
link
bibtex
@inproceedings{obada2020towards,
title={Towards understanding privacy and trust in online reporting of sexual assault},
author={Obada-Obieh, Borke and Spagnolo, Lucrezia and Beznosov, Konstantin},
booktitle={Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)},
pages={145--164},
year={2020}
}
Is implicit authentication on smartphones really popular? On android users’ perception of “smart lock for android”.
Masoud Mehrabi Koushki, Borke Obada-Obieh, Jun Ho Huh, & Konstantin Beznosov.
In
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services, pages 1–17, 2020.
link
bibtex
@inproceedings{mehrabi2020implicit,
title={Is implicit authentication on smartphones really popular? On android users’ perception of “smart lock for android”},
author={Mehrabi Koushki, Masoud and Obada-Obieh, Borke and Huh, Jun Ho and Beznosov, Konstantin},
booktitle={22nd International Conference on Human-Computer Interaction with Mobile Devices and Services},
pages={1--17},
year={2020}
}
On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better?.
Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, & Hyoungshick Kim.
ACM Transactions on Privacy and Security (TOPS), 23(4): 1–32. 2020.
link
bibtex
@article{cho2020security,
title={On the security and usability implications of providing multiple authentication choices on smartphones: The more, the better?},
author={Cho, Geumhwan and Huh, Jun Ho and Kim, Soolin and Cho, Junsung and Park, Heesung and Lee, Yenah and Beznosov, Konstantin and Kim, Hyoungshick},
journal={ACM Transactions on Privacy and Security (TOPS)},
volume={23},
number={4},
pages={1--32},
year={2020},
publisher={ACM New York, NY, USA}
}
2019
(4)
Forecasting suspicious account activity at large-scale online service providers.
Hassan Halawa, Konstantin Beznosov, Baris Coskun, Meizhu Liu, & Matei Ripeanu.
In
Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers 23, pages 569–587, 2019. Springer International Publishing
link
bibtex
@inproceedings{halawa2019forecasting,
title={Forecasting suspicious account activity at large-scale online service providers},
author={Halawa, Hassan and Beznosov, Konstantin and Coskun, Baris and Liu, Meizhu and Ripeanu, Matei},
booktitle={Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18--22, 2019, Revised Selected Papers 23},
pages={569--587},
year={2019},
organization={Springer International Publishing}
}
Vulnerability & blame: Making sense of unauthorized access to smartphones.
Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, & Konstantin Beznosov.
In
Proceedings of the 2019 chi conference on human factors in computing systems, pages 1–13, 2019.
link
bibtex
@inproceedings{marques2019vulnerability,
title={Vulnerability \& blame: Making sense of unauthorized access to smartphones},
author={Marques, Diogo and Guerreiro, Tiago and Carri{\c{c}}o, Luis and Beschastnikh, Ivan and Beznosov, Konstantin},
booktitle={Proceedings of the 2019 chi conference on human factors in computing systems},
pages={1--13},
year={2019}
}
Towards understanding the link between age and smartphone authentication.
Lina Qiu, Alexander De Luca, Ildar Muslukhov, & Konstantin Beznosov.
In
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pages 1–10, 2019.
link
bibtex
@inproceedings{qiu2019towards,
title={Towards understanding the link between age and smartphone authentication},
author={Qiu, Lina and De Luca, Alexander and Muslukhov, Ildar and Beznosov, Konstantin},
booktitle={Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems},
pages={1--10},
year={2019}
}
Vulnerability & Blame.
Diogo Marques, Tiago Guerreiro, Luis Carriço, Ivan Beschastnikh, & Konstantin Beznosov.
In
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019. ACM
link
bibtex
@inproceedings{marques2019vulnerability,
title={Vulnerability \& Blame},
author={Marques, Diogo and Guerreiro, Tiago and Carri{\c{c}}o, Luis and Beschastnikh, Ivan and Beznosov, Konstantin},
booktitle={Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems},
year={2019},
organization={ACM}
}
2018
(4)
Contextualizing privacy decisions for better prediction (and protection).
Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David Wagner, Konstantin Beznosov, & Serge Egelman.
In
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 1–13, 2018.
link
bibtex
@inproceedings{wijesekera2018contextualizing,
title={Contextualizing privacy decisions for better prediction (and protection)},
author={Wijesekera, Primal and Reardon, Joel and Reyes, Irwin and Tsai, Lynn and Chen, Jung-Wei and Good, Nathan and Wagner, David and Beznosov, Konstantin and Egelman, Serge},
booktitle={Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems},
pages={1--13},
year={2018}
}
Dynamically regulating mobile application permissions.
Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, & Konstantin Beznosov.
IEEE Security & Privacy, 16(1): 64–71. 2018.
link
bibtex
@article{wijesekera2018dynamically,
title={Dynamically regulating mobile application permissions},
author={Wijesekera, Primal and Baokar, Arjun and Tsai, Lynn and Reardon, Joel and Egelman, Serge and Wagner, David and Beznosov, Konstantin},
journal={IEEE Security \& Privacy},
volume={16},
number={1},
pages={64--71},
year={2018},
publisher={IEEE}
}
Source Attribution of Cryptographic API Misuse in Android Applications.
Ildar Muslukhov, Yazan Boshmaf, & Konstantin Beznosov.
. 2018.
link
bibtex
@article{muslukhov2018source,
title={Source Attribution of Cryptographic API Misuse in Android Applications},
author={Muslukhov, Ildar and Boshmaf, Yazan and Beznosov, Konstantin},
year={2018}
}
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers.
Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, & Meizhu Liu.
arXiv preprint arXiv:1801.08629. 2018.
link
bibtex
@article{halawa2018forecasting,
title={Forecasting Suspicious Account Activity at Large-Scale Online Service Providers},
author={Halawa, Hassan and Ripeanu, Matei and Beznosov, Konstantin and Coskun, Baris and Liu, Meizhu},
journal={arXiv preprint arXiv:1801.08629},
year={2018}
}
2017
(5)
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences.
Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, & Konstantin Beznosov.
In
2017 IEEE Symposium on Security and Privacy (SP), pages 1077–1093, 2017. IEEE
link
bibtex
@inproceedings{wijesekera2017feasibility,
title={The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences},
author={Wijesekera, Primal and Baokar, Arjun and Tsai, Lynn and Reardon, Joel and Egelman, Serge and Wagner, David and Beznosov, Konstantin},
booktitle={2017 IEEE Symposium on Security and Privacy (SP)},
pages={1077--1093},
year={2017},
organization={IEEE}
}
Characterizing social insider attacks on Facebook.
Wali Ahmed Usmani, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago Guerreiro, & Luı́s Carriço.
In
Proceedings of the 2017 CHI conference on human factors in computing systems, pages 3810–3820, 2017.
link
bibtex
@inproceedings{usmani2017characterizing,
title={Characterizing social insider attacks on Facebook},
author={Usmani, Wali Ahmed and Marques, Diogo and Beschastnikh, Ivan and Beznosov, Konstantin and Guerreiro, Tiago and Carri{\c{c}}o, Lu{\'\i}s},
booktitle={Proceedings of the 2017 CHI conference on human factors in computing systems},
pages={3810--3820},
year={2017}
}
I Don’t Use Apple Pay because it’s less secure...: perception of security and usability in mobile tap-and-pay.
Jun Ho Huh, Saurabh Verma, Swathi Sri V Rayala, Rakesh B Bobba, Konstantin Beznosov, & Hyoungshick Kim.
In
Workshop on Usable Security, San Diego, CA, 2017.
link
bibtex
@inproceedings{huh2017don,
title={I Don’t Use Apple Pay because it’s less secure...: perception of security and usability in mobile tap-and-pay},
author={Huh, Jun Ho and Verma, Saurabh and Rayala, Swathi Sri V and Bobba, Rakesh B and Beznosov, Konstantin and Kim, Hyoungshick},
booktitle={Workshop on Usable Security, San Diego, CA},
year={2017}
}
I'm too busy to reset my LinkedIn password: On the effectiveness of password reset emails.
Jun Ho Huh, Hyoungshick Kim, Swathi SVP Rayala, Rakesh B Bobba, & Konstantin Beznosov.
In
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pages 387–391, 2017.
link
bibtex
@inproceedings{huh2017m,
title={I'm too busy to reset my LinkedIn password: On the effectiveness of password reset emails},
author={Huh, Jun Ho and Kim, Hyoungshick and Rayala, Swathi SVP and Bobba, Rakesh B and Beznosov, Konstantin},
booktitle={Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems},
pages={387--391},
year={2017}
}
An early warning system for suspicious accounts.
Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, & Meizhu Liu.
In
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pages 51–52, 2017.
link
bibtex
@inproceedings{halawa2017early,
title={An early warning system for suspicious accounts},
author={Halawa, Hassan and Ripeanu, Matei and Beznosov, Konstantin and Coskun, Baris and Liu, Meizhu},
booktitle={Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security},
pages={51--52},
year={2017}
}
2016
(9)
Phishing threat avoidance behaviour: An empirical investigation.
Nalin Asanka Gamagedara Arachchilage, Steve Love, & Konstantin Beznosov.
Computers in Human Behavior, 60: 185–197. 2016.
link
bibtex
@article{arachchilage2016phishing,
title={Phishing threat avoidance behaviour: An empirical investigation},
author={Arachchilage, Nalin Asanka Gamagedara and Love, Steve and Beznosov, Konstantin},
journal={Computers in Human Behavior},
volume={60},
pages={185--197},
year={2016},
publisher={Pergamon}
}
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs.
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Lerı́a, Jorge, Jose Lorenzo, Matei Ripeanu, Konstantin Beznosov, & Hassan Halawa.
Computers & Security, 61: 142–168. 2016.
link
bibtex
@article{boshmaf2016integro,
title={{\'I}ntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs},
author={Boshmaf, Yazan and Logothetis, Dionysios and Siganos, Georgos and Ler{\'\i}a, Jorge and Lorenzo, Jose and Ripeanu, Matei and Beznosov, Konstantin and Halawa, Hassan},
journal={Computers \& Security},
volume={61},
pages={142--168},
year={2016},
publisher={Elsevier Advanced Technology}
}
Snooping on mobile phones: Prevalence and trends.
Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Luı́s Carriço, & Konstantin Beznosov.
In
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pages 159–174, 2016.
Distinguished Paper Award, acceptance rate: 25%,
link
bibtex
@inproceedings{marques2016snooping,
title={Snooping on mobile phones: Prevalence and trends},
author={Marques, Diogo and Muslukhov, Ildar and Guerreiro, Tiago and Carri{\c{c}}o, Lu{\'\i}s and Beznosov, Konstantin},
booktitle={Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)},
pages={159--174},
bibbase_note = {<span style="color: red">Distinguished Paper Award</span>, acceptance rate: 25%,},
year={2016}
}
Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population.
Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, & Elizeu Santos-Neto.
In
Proceedings of the 2016 new security paradigms workshop, pages 11–22, 2016.
link
bibtex
@inproceedings{halawa2016harvesting,
title={Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population},
author={Halawa, Hassan and Beznosov, Konstantin and Boshmaf, Yazan and Coskun, Baris and Ripeanu, Matei and Santos-Neto, Elizeu},
booktitle={Proceedings of the 2016 new security paradigms workshop},
pages={11--22},
year={2016}
}
Advancing the understanding of android unlocking and usage.
Lina Qiu, Ildar Muslukhov, & Konstantin Beznosov.
In
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016.
link
bibtex
@inproceedings{qiu2016advancing,
title={Advancing the understanding of android unlocking and usage},
author={Qiu, Lina and Muslukhov, Ildar and Beznosov, Konstantin},
booktitle={Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)},
year={2016}
}
Decoupling data-at-rest encryption and smartphone locking with wearable devices.
Ildar Muslukhov, San-Tsai Sun, Primal Wijesekera, Yazan Boshmaf, & Konstantin Beznosov.
Pervasive and Mobile Computing, 32: 26–34. 2016.
link
bibtex
@article{muslukhov2016decoupling,
title={Decoupling data-at-rest encryption and smartphone locking with wearable devices},
author={Muslukhov, Ildar and Sun, San-Tsai and Wijesekera, Primal and Boshmaf, Yazan and Beznosov, Konstantin},
journal={Pervasive and Mobile Computing},
volume={32},
pages={26--34},
year={2016},
publisher={Elsevier}
}
Android users in the wild: Their authentication and usage behavior.
Ahmed Mahfouz, Ildar Muslukhov, & Konstantin Beznosov.
Pervasive and Mobile Computing, 32: 50–61. 2016.
link
bibtex
@article{mahfouz2016android,
title={Android users in the wild: Their authentication and usage behavior},
author={Mahfouz, Ahmed and Muslukhov, Ildar and Beznosov, Konstantin},
journal={Pervasive and Mobile Computing},
volume={32},
pages={50--61},
year={2016},
publisher={Elsevier}
}
Estimating Vulnerability Scores To Augment Enterprise Security Systems.
Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, & Alex Loffler.
. 2016.
link
bibtex
@article{halawa2016estimating,
title={Estimating Vulnerability Scores To Augment Enterprise Security Systems},
author={Halawa, Hassan and Ripeanu, Matei and Beznosov, Konstantin and Loffler, Alex},
year={2016}
}
2015
(8)
On the Memorability of System-generated PINs: Can Chunking Help?.
Jun Ho Huh, Hyoungshick Kim, Rakesh B Bobba, Masooda N Bashir, & Konstantin Beznosov.
In
eleventh symposium on usable privacy and security (SOUPS 2015), pages 197–209, 2015.
link
bibtex
@inproceedings{huh2015memorability,
title={On the Memorability of System-generated PINs: Can Chunking Help?},
author={Huh, Jun Ho and Kim, Hyoungshick and Bobba, Rakesh B and Bashir, Masooda N and Beznosov, Konstantin},
booktitle={eleventh symposium on usable privacy and security (SOUPS 2015)},
pages={197--209},
year={2015}
}
Integro: Leveraging victim prediction for robust fake account detection in OSNs.
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Lerı́a, Jorge, Jose Lorenzo, Matei Ripeanu, & Konstantin Beznosov.
In
NDSS, volume 15, pages 8–11, 2015.
link
bibtex
@inproceedings{boshmaf2015integro,
title={Integro: Leveraging victim prediction for robust fake account detection in OSNs.},
author={Boshmaf, Yazan and Logothetis, Dionysios and Siganos, Georgos and Ler{\'\i}a, Jorge and Lorenzo, Jose and Ripeanu, Matei and Beznosov, Konstantin},
booktitle={NDSS},
volume={15},
pages={8--11},
year={2015}
}
Android permissions remystified: A field study on contextual integrity.
Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, & Konstantin Beznosov.
In
24th USENIX Security Symposium (USENIX Security 15), pages 499–514, 2015.
link
bibtex
@inproceedings{wijesekera2015android,
title={Android permissions remystified: A field study on contextual integrity},
author={Wijesekera, Primal and Baokar, Arjun and Hosseini, Ashkan and Egelman, Serge and Wagner, David and Beznosov, Konstantin},
booktitle={24th USENIX Security Symposium (USENIX Security 15)},
pages={499--514},
year={2015}
}
On the Impact of Touch ID on iPhone Passcodes.
Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, & Konstantin Beznosov.
In
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pages 257–276, 2015.
link
bibtex
@inproceedings{cherapau2015impact,
title={On the Impact of Touch ID on iPhone Passcodes},
author={Cherapau, Ivan and Muslukhov, Ildar and Asanka, Nalin and Beznosov, Konstantin},
booktitle={Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)},
pages={257--276},
year={2015}
}
Thwarting fake OSN accounts by predicting their victims.
Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, & Elizeu Santos-Neto.
In
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, pages 81–89, 2015.
link
bibtex
@inproceedings{boshmaf2015thwarting,
title={Thwarting fake OSN accounts by predicting their victims},
author={Boshmaf, Yazan and Ripeanu, Matei and Beznosov, Konstantin and Santos-Neto, Elizeu},
booktitle={Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security},
pages={81--89},
year={2015}
}
Surpass: System-initiated user-replaceable passwords.
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, & S Raj Rajagopalan.
In
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 170–181, 2015.
link
bibtex
@inproceedings{huh2015surpass,
title={Surpass: System-initiated user-replaceable passwords},
author={Huh, Jun Ho and Oh, Seongyeol and Kim, Hyoungshick and Beznosov, Konstantin and Mohan, Apurva and Rajagopalan, S Raj},
booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
pages={170--181},
year={2015}
}
Android rooting: Methods, detection, and evasion.
San-Tsai Sun, Andrea Cuadros, & Konstantin Beznosov.
In
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, pages 3–14, 2015.
link
bibtex
@inproceedings{sun2015android,
title={Android rooting: Methods, detection, and evasion},
author={Sun, San-Tsai and Cuadros, Andrea and Beznosov, Konstantin},
booktitle={Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices},
pages={3--14},
year={2015}
}
2014
(8)
Poster: Helping users review and make sense of access policies in organizations.
Pooya Jaferian, & Konstantin Beznosov.
In
SOUPS, volume 14, pages 301–320, 2014.
link
bibtex
@inproceedings{jaferian2014poster,
title={Poster: Helping users review and make sense of access policies in organizations},
author={Jaferian, Pooya and Beznosov, Konstantin},
booktitle={SOUPS},
volume={14},
pages={301--320},
year={2014}
}
Helping users review and make sense of access policies in organizations.
Pooya Jaferian, Hootan Rashtian, & Konstantin Beznosov.
In
CHI'14 Extended Abstracts on Human Factors in Computing Systems, pages 2017–2022. 2014.
link
bibtex
@incollection{jaferian2014helping,
title={Helping users review and make sense of access policies in organizations},
author={Jaferian, Pooya and Rashtian, Hootan and Beznosov, Konstantin},
booktitle={CHI'14 Extended Abstracts on Human Factors in Computing Systems},
pages={2017--2022},
year={2014}
}
To befriend or not? A model of friend request acceptance on Facebook.
Hootan Rashtian, Yazan Boshmaf, Pooya Jaferian, & Konstantin Beznosov.
In
10th Symposium On Usable Privacy and Security (SOUPS 2014), pages 285–300, 2014.
link
bibtex
@inproceedings{rashtian2014befriend,
title={To befriend or not? A model of friend request acceptance on Facebook},
author={Rashtian, Hootan and Boshmaf, Yazan and Jaferian, Pooya and Beznosov, Konstantin},
booktitle={10th Symposium On Usable Privacy and Security (SOUPS 2014)},
pages={285--300},
year={2014}
}
To authorize or not authorize: helping users review access policies in organizations.
Pooya Jaferian, Hootan Rashtian, & Konstantin Beznosov.
In
10th Symposium On Usable Privacy and Security (SOUPS 2014), pages 301–320, 2014.
link
bibtex
@inproceedings{jaferian2014authorize,
title={To authorize or not authorize: helping users review access policies in organizations},
author={Jaferian, Pooya and Rashtian, Hootan and Beznosov, Konstantin},
booktitle={10th Symposium On Usable Privacy and Security (SOUPS 2014)},
pages={301--320},
year={2014}
}
A game storyboard design for avoiding phishing attacks.
Nalin AG Arachchilage, Ivan Flechais, & Konstantin Beznosov.
In
Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS), 2014.
link
bibtex
@inproceedings{arachchilage2014game,
title={A game storyboard design for avoiding phishing attacks},
author={Arachchilage, Nalin AG and Flechais, Ivan and Beznosov, Konstantin},
booktitle={Proceedings of the 11th Symposium On Usable Privacy and Security (SOUPS)},
year={2014}
}
Cued Mnemonics for Better Security and Memorability.
Primal Wijesekera, Ivan Cherapau, Ayumi Samarakoon, & Konstantin Beznosov.
Who are you,1–3. 2014.
link
bibtex
@article{wijesekera2014cued,
title={Cued Mnemonics for Better Security and Memorability},
author={Wijesekera, Primal and Cherapau, Ivan and Samarakoon, Ayumi and Beznosov, Konstantin},
journal={Who are you},
pages={1--3},
year={2014}
}
Towards Understanding and Improving IT Security Management.
Kosta Beznosov.
In
Symposium on Usable Privacy and Security (SOUPS), pages 301–320, 2014.
link
bibtex
@inproceedings{beznosov2014towards,
title={Towards Understanding and Improving IT Security Management},
author={Beznosov, Kosta},
booktitle={Symposium on Usable Privacy and Security (SOUPS)},
pages={301--320},
year={2014}
}
2013
(8)
Analysis of ANSI RBAC support in EJB.
Wesam Darwish, & Konstantin Beznosov.
In
Developing and Evaluating Security-Aware Software Systems, pages 177–204. IGI Global, 2013.
link
bibtex
@incollection{darwish2013analysis,
title={Analysis of ANSI RBAC support in EJB},
author={Darwish, Wesam and Beznosov, Konstantin},
booktitle={Developing and Evaluating Security-Aware Software Systems},
pages={177--204},
year={2013},
publisher={IGI Global}
}
Design and analysis of a social botnet.
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu.
Computer Networks, 57(2): 556–578. 2013.
link
bibtex
@article{boshmaf2013design,
title={Design and analysis of a social botnet},
author={Boshmaf, Yazan and Muslukhov, Ildar and Beznosov, Konstantin and Ripeanu, Matei},
journal={Computer Networks},
volume={57},
number={2},
pages={556--578},
year={2013},
publisher={Elsevier}
}
Does my password go up to eleven? The impact of password meters on password selection.
Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, & Cormac Herley.
In
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2379–2388, 2013.
link
bibtex
@inproceedings{egelman2013does,
title={Does my password go up to eleven? The impact of password meters on password selection},
author={Egelman, Serge and Sotirakopoulos, Andreas and Muslukhov, Ildar and Beznosov, Konstantin and Herley, Cormac},
booktitle={Proceedings of the SIGCHI Conference on Human Factors in Computing Systems},
pages={2379--2388},
year={2013}
}
Know your enemy: the risk of unauthorized access in smartphones by insiders.
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, & Konstantin Beznosov.
In
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pages 271–280, 2013.
link
bibtex
@inproceedings{muslukhov2013know,
title={Know your enemy: the risk of unauthorized access in smartphones by insiders},
author={Muslukhov, Ildar and Boshmaf, Yazan and Kuo, Cynthia and Lester, Jonathan and Beznosov, Konstantin},
booktitle={Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services},
pages={271--280},
year={2013}
}
Investigating users’ perspectives of web single sign-on: Conceptual gaps and acceptance model.
San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, & Konstantin Beznosov.
ACM Transactions on Internet Technology (TOIT), 13(1): 1–35. 2013.
link
bibtex
@article{sun2013investigating,
title={Investigating users’ perspectives of web single sign-on: Conceptual gaps and acceptance model},
author={Sun, San-Tsai and Pospisil, Eric and Muslukhov, Ildar and Dindar, Nuray and Hawkey, Kirstie and Beznosov, Konstantin},
journal={ACM Transactions on Internet Technology (TOIT)},
volume={13},
number={1},
pages={1--35},
year={2013},
publisher={ACM New York, NY, USA}
}
Efficient authentication and key management mechanisms for smart grid communications.
Hasen Nicanfar, Paria Jokar, Konstantin Beznosov, & Victor CM Leung.
IEEE systems journal, 8(2): 629–640. 2013.
link
bibtex
@article{nicanfar2013efficient,
title={Efficient authentication and key management mechanisms for smart grid communications},
author={Nicanfar, Hasen and Jokar, Paria and Beznosov, Konstantin and Leung, Victor CM},
journal={IEEE systems journal},
volume={8},
number={2},
pages={629--640},
year={2013},
publisher={IEEE}
}
2012
(8)
Retrofitting existing web applications with effective dynamic protection against sql injection attacks.
San-Tsai Sun, & Konstantin Beznosov.
In
Security-Aware Systems Applications and Software Development Methods, pages 169–189. IGI Global, 2012.
link
bibtex
@incollection{sun2012retrofitting,
title={Retrofitting existing web applications with effective dynamic protection against sql injection attacks},
author={Sun, San-Tsai and Beznosov, Konstantin},
booktitle={Security-Aware Systems Applications and Software Development Methods},
pages={169--189},
year={2012},
publisher={IGI Global}
}
Speculative authorization.
Pranab Kini, & Konstantin Beznosov.
IEEE Transactions on Parallel and Distributed Systems, 24(4): 814–824. 2012.
link
bibtex
@article{kini2012speculative,
title={Speculative authorization},
author={Kini, Pranab and Beznosov, Konstantin},
journal={IEEE Transactions on Parallel and Distributed Systems},
volume={24},
number={4},
pages={814--824},
year={2012},
publisher={IEEE}
}
Understanding users' requirements for data protection in smartphones.
Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, & Konstantin Beznosov.
In
2012 IEEE 28th international conference on data engineering workshops, pages 228–235, 2012. IEEE
link
bibtex
@inproceedings{muslukhov2012understanding,
title={Understanding users' requirements for data protection in smartphones},
author={Muslukhov, Ildar and Boshmaf, Yazan and Kuo, Cynthia and Lester, Jonathan and Beznosov, Konstantin},
booktitle={2012 IEEE 28th international conference on data engineering workshops},
pages={228--235},
year={2012},
organization={IEEE}
}
Key challenges in defending against malicious socialbots.
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu.
In
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12), 2012.
link
bibtex
@inproceedings{boshmaf2012key,
title={Key challenges in defending against malicious socialbots},
author={Boshmaf, Yazan and Muslukhov, Ildar and Beznosov, Konstantin and Ripeanu, Matei},
booktitle={5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12)},
year={2012}
}
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems.
San-Tsai Sun, & Konstantin Beznosov.
In
Proceedings of the 2012 ACM conference on Computer and communications security, pages 378–390, 2012.
link
bibtex
@inproceedings{sun2012devil,
title={The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems},
author={Sun, San-Tsai and Beznosov, Konstantin},
booktitle={Proceedings of the 2012 ACM conference on Computer and communications security},
pages={378--390},
year={2012}
}
Augur: Aiding malware detection using large-scale machine learning.
Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Kyle Zeeuwen, David Cornell, & Dmitry Samosseiko.
In
Proceedings of the 21st Usenix Security Symposium (Poster session)(August 2012), 2012.
link
bibtex
@inproceedings{boshmaf2012augur,
title={Augur: Aiding malware detection using large-scale machine learning},
author={Boshmaf, Yazan and Ripeanu, Matei and Beznosov, Konstantin and Zeeuwen, Kyle and Cornell, David and Samosseiko, Dmitry},
booktitle={Proceedings of the 21st Usenix Security Symposium (Poster session)(August 2012)},
year={2012}
}
Symposium On Usable Privacy and Security SOUPS 2012.
Sonia Chiasson, Kirstie Hawkey, Konstantin Beznosov, Alessandro Acquisti, Lujo Bauer, Robert Biddle, L Jean Camp, Lynne Coventry, Alexander De Luca, Simson L Garfinkel, & others.
. 2012.
link
bibtex
@article{chiasson2012symposium,
title={Symposium On Usable Privacy and Security SOUPS 2012},
author={Chiasson, Sonia and Hawkey, Kirstie and Beznosov, Konstantin and Acquisti, Alessandro and Bauer, Lujo and Biddle, Robert and Camp, L Jean and Coventry, Lynne and De Luca, Alexander and Garfinkel, Simson L and others},
year={2012}
}
2011
(13)
Toward understanding distributed cognition in IT security management: the role of cues and norms.
David Botta, Kasia Muldner, Kirstie Hawkey, & Konstantin Beznosov.
Cognition, Technology & Work, 13: 121–134. 2011.
link
bibtex
@article{botta2011toward,
title={Toward understanding distributed cognition in IT security management: the role of cues and norms},
author={Botta, David and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin},
journal={Cognition, Technology \& Work},
volume={13},
pages={121--134},
year={2011},
publisher={Springer-Verlag}
}
The socialbot network: when bots socialize for fame and money.
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu.
In
Proceedings of the 27th annual computer security applications conference (ACSAC), pages 93–102, 2011.
Best Paper Award, acceptance rate: 25%,
doi
link
bibtex
@inproceedings{boshmaf2011socialbot,
title={The socialbot network: when bots socialize for fame and money},
author={Boshmaf, Yazan and Muslukhov, Ildar and Beznosov, Konstantin and Ripeanu, Matei},
booktitle={Proceedings of the 27th annual computer security applications conference (ACSAC)},
pages={93--102},
bibbase_note = {<span style="color: red">Best Paper Award</span>, acceptance rate: 25%,},
doi = {10.1145/2076732.2076746},
year={2011}
}
On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings.
Andreas Sotirakopoulos, Kirstie Hawkey, & Konstantin Beznosov.
In
Proceedings of the Seventh Symposium on Usable Privacy and Security, pages 1–18, 2011.
link
bibtex
@inproceedings{sotirakopoulos2011challenges,
title={On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings},
author={Sotirakopoulos, Andreas and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Proceedings of the Seventh Symposium on Usable Privacy and Security},
pages={1--18},
year={2011}
}
OpenID-enabled browser: towards usable and secure web single sign-on.
San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, & Konstantin Beznosov.
In
CHI'11 Extended Abstracts on Human Factors in Computing Systems, pages 1291–1296. 2011.
link
bibtex
@incollection{sun2011openid,
title={OpenID-enabled browser: towards usable and secure web single sign-on},
author={Sun, San-Tsai and Pospisil, Eric and Muslukhov, Ildar and Dindar, Nuray and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={CHI'11 Extended Abstracts on Human Factors in Computing Systems},
pages={1291--1296},
year={2011}
}
Authorization recycling in hierarchical RBAC systems.
Qiang Wei, Jason Crampton, Konstantin Beznosov, & Matei Ripeanu.
ACM Transactions on Information and System Security (TISSEC), 14(1): 1–29. 2011.
link
bibtex
@article{wei2011authorization,
title={Authorization recycling in hierarchical RBAC systems},
author={Wei, Qiang and Crampton, Jason and Beznosov, Konstantin and Ripeanu, Matei},
journal={ACM Transactions on Information and System Security (TISSEC)},
volume={14},
number={1},
pages={1--29},
year={2011},
publisher={ACM New York, NY, USA}
}
What makes users refuse web single sign-on? An empirical investigation of OpenID.
San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, & Konstantin Beznosov.
In
Proceedings of the seventh symposium on usable privacy and security, pages 1–20, 2011.
link
bibtex
@inproceedings{sun2011makes,
title={What makes users refuse web single sign-on? An empirical investigation of OpenID},
author={Sun, San-Tsai and Pospisil, Eric and Muslukhov, Ildar and Dindar, Nuray and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Proceedings of the seventh symposium on usable privacy and security},
pages={1--20},
year={2011}
}
Poster: Motivating users to choose better passwords through peer pressure.
Andreas Sotirakopoulos, Ildar Muslukov, Konstantin Beznosov, Cormac Herley, & Serge Egelman.
Proc. SOUPS 2011. 2011.
link
bibtex
@article{sotirakopoulos2011poster,
title={Poster: Motivating users to choose better passwords through peer pressure},
author={Sotirakopoulos, Andreas and Muslukov, Ildar and Beznosov, Konstantin and Herley, Cormac and Egelman, Serge},
journal={Proc. SOUPS 2011},
year={2011}
}
Improving malicious URL re-evaluation scheduling through an empirical study of malware download centers.
Kyle Zeeuwen, Matei Ripeanu, & Konstantin Beznosov.
In
Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, of
WebQuality '11, pages 42–49, New York, NY, USA, 2011. Association for Computing Machinery
Paper
doi
link
bibtex
abstract
1 download
@inproceedings{Zeeuwen2011,
author = {Zeeuwen, Kyle and Ripeanu, Matei and Beznosov, Konstantin},
title = {Improving malicious URL re-evaluation scheduling through an empirical study of malware download centers},
year = {2011},
isbn = {9781450307062},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/1964114.1964123},
doi = {10.1145/1964114.1964123},
abstract = {The retrieval and analysis of malicious content is an essential task for security researchers. At the same time, the distributors of malicious files deploy countermeasures to evade the scrutiny of security researchers. This paper investigates two techniques used by malware download centers: frequently updating the malicious payload, and blacklisting (i.e., refusing HTTP requests from researchers based on their IP). To this end, we sent HTTP requests to malware download centers over a period of four months. The requests are distributed across two pools of IPs, one exhibiting high volume research behaviour and another exhibiting semi-random, low volume behaviour. We identify several distinct update patterns, including sites that do not update the binary at all, sites that update the binary for each new client but then repeatedly serve a specific binary to the same client, sites that periodically update the binary with periods ranging from one hour to 84 days, and server-side polymorphic sites, that deliver new binaries for each HTTP request. From this classification we identify several guidelines for crawlers that re-query malware download centers looking for binary updates. We propose a scheduling algorithm that incorporates these guidelines, and perform a limited evaluation of the algorithm using the data we collected. We analyze our data for evidence of blacklisting and find strong evidence that a small minority of URLs blacklisted our high volume IPs, but for the majority of malicious URLs studied, there was no observable blacklisting response, despite issuing over over 1.5 million requests to 5001 different malware download centers.},
booktitle = {Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality},
pages = {42–49},
numpages = {8},
keywords = {server side polymorphism, sample collection, malware download centers, low interaction honeyclient, IP blacklisting},
location = {Hyderabad, India},
series = {WebQuality '11}
}
The retrieval and analysis of malicious content is an essential task for security researchers. At the same time, the distributors of malicious files deploy countermeasures to evade the scrutiny of security researchers. This paper investigates two techniques used by malware download centers: frequently updating the malicious payload, and blacklisting (i.e., refusing HTTP requests from researchers based on their IP). To this end, we sent HTTP requests to malware download centers over a period of four months. The requests are distributed across two pools of IPs, one exhibiting high volume research behaviour and another exhibiting semi-random, low volume behaviour. We identify several distinct update patterns, including sites that do not update the binary at all, sites that update the binary for each new client but then repeatedly serve a specific binary to the same client, sites that periodically update the binary with periods ranging from one hour to 84 days, and server-side polymorphic sites, that deliver new binaries for each HTTP request. From this classification we identify several guidelines for crawlers that re-query malware download centers looking for binary updates. We propose a scheduling algorithm that incorporates these guidelines, and perform a limited evaluation of the algorithm using the data we collected. We analyze our data for evidence of blacklisting and find strong evidence that a small minority of URLs blacklisted our high volume IPs, but for the majority of malicious URLs studied, there was no observable blacklisting response, despite issuing over over 1.5 million requests to 5001 different malware download centers.
A brick wall, a locked door, and a bandit.
Fahimeh Raja, Kirstie Hawkey, Steven Hsu, Kai-Le Clement Wang, & Konstantin Beznosov.
In
Proceedings of the Seventh Symposium on Usable Privacy and Security, 2011. ACM
link
bibtex
@inproceedings{raja2011brick,
title={A brick wall, a locked door, and a bandit},
author={Raja, Fahimeh and Hawkey, Kirstie and Hsu, Steven and Wang, Kai-Le Clement and Beznosov, Konstantin},
booktitle={Proceedings of the Seventh Symposium on Usable Privacy and Security},
year={2011},
organization={ACM}
}
2010
(13)
Do Windows users follow the principle of least privilege? Investigating user account control practices.
Sara Motiee, Kirstie Hawkey, & Konstantin Beznosov.
In
Proceedings of the Sixth Symposium on Usable Privacy and Security, pages 1–13, 2010.
link
bibtex
@inproceedings{motiee2010windows,
title={Do Windows users follow the principle of least privilege? Investigating user account control practices},
author={Motiee, Sara and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Proceedings of the Sixth Symposium on Usable Privacy and Security},
pages={1--13},
year={2010}
}
I did it because I trusted you”: Challenges with the study environment biasing participant behaviours.
Andreas Sotirakopoulos, Kirstie Hawkey, & Konstantin Beznosov.
In
SOUPS Usable Security Experiment Reports (USER) Workshop, 2010.
link
bibtex
@inproceedings{sotirakopoulos2010did,
title={I did it because I trusted you”: Challenges with the study environment biasing participant behaviours},
author={Sotirakopoulos, Andreas and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={SOUPS Usable Security Experiment Reports (USER) Workshop},
year={2010}
}
Preparation, detection, and analysis: the diagnostic work of IT security incident response.
Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, & Konstantin Beznosov.
Information Management & Computer Security. 2010.
link
bibtex
@article{werlinger2010preparation,
title={Preparation, detection, and analysis: the diagnostic work of IT security incident response},
author={Werlinger, Rodrigo and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin},
journal={Information Management \& Computer Security},
year={2010},
publisher={Emerald Group Publishing Limited}
}
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle.
San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov.
In
Proceedings of the 6th ACM workshop on Digital identity management, pages 49–58, 2010.
link
bibtex
@inproceedings{sun2010openidemail,
title={OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle},
author={Sun, San-Tsai and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Proceedings of the 6th ACM workshop on Digital identity management},
pages={49--58},
year={2010}
}
A billion keys, but few locks: the crisis of web single sign-on.
San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey, & Konstantin Beznosov.
In
Proceedings of the 2010 new security paradigms workshop, pages 61–72, 2010.
link
bibtex
@inproceedings{sun2010billion,
title={A billion keys, but few locks: the crisis of web single sign-on},
author={Sun, San-Tsai and Boshmaf, Yazan and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Proceedings of the 2010 new security paradigms workshop},
pages={61--72},
year={2010}
}
Efficient and spontaneous privacy-preserving protocol for secure vehicular communication.
Hu Xiong, Konstantin Beznosov, Zhiguang Qin, & Matei Ripeanu.
In
2010 IEEE International Conference on Communications, pages 1–6, 2010. IEEE
link
bibtex
@inproceedings{xiong2010efficient,
title={Efficient and spontaneous privacy-preserving protocol for secure vehicular communication},
author={Xiong, Hu and Beznosov, Konstantin and Qin, Zhiguang and Ripeanu, Matei},
booktitle={2010 IEEE International Conference on Communications},
pages={1--6},
year={2010},
organization={IEEE}
}
It's too complicated, so i turned it off! expectations, perceptions, and misconceptions of personal firewalls.
Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, & Kellogg S Booth.
In
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, pages 53–62, 2010.
link
bibtex
@inproceedings{raja2010s,
title={It's too complicated, so i turned it off! expectations, perceptions, and misconceptions of personal firewalls},
author={Raja, Fahimeh and Hawkey, Kirstie and Jaferian, Pooya and Beznosov, Konstantin and Booth, Kellogg S},
booktitle={Proceedings of the 3rd ACM workshop on Assurable and usable security configuration},
pages={53--62},
year={2010}
}
Investigating an appropriate design for personal firewalls.
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, & Kellogg S Booth.
In
CHI'10 Extended Abstracts on Human Factors in Computing Systems, pages 4123–4128. 2010.
link
bibtex
@incollection{raja2010investigating,
title={Investigating an appropriate design for personal firewalls},
author={Raja, Fahimeh and Hawkey, Kirstie and Beznosov, Konstantin and Booth, Kellogg S},
booktitle={CHI'10 Extended Abstracts on Human Factors in Computing Systems},
pages={4123--4128},
year={2010}
}
Poster: Validating and extending a study on the effectiveness of ssl warnings.
Andreas Sotirakopoulos, Kirstie Hawkey, & Konstantin Beznosov.
In
Poster at Symposium on Usable Privacy and Security, 2010.
link
bibtex
@inproceedings{sotirakopoulos2010poster,
title={Poster: Validating and extending a study on the effectiveness of ssl warnings},
author={Sotirakopoulos, Andreas and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Poster at Symposium on Usable Privacy and Security},
year={2010}
}
Investigating user account control practices.
Sara Motiee, Kirstie Hawkey, & Konstantin Beznosov.
In
CHI'10 Extended Abstracts on Human Factors in Computing Systems, pages 4129–4134. 2010.
link
bibtex
@incollection{motiee2010investigating,
title={Investigating user account control practices},
author={Motiee, Sara and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={CHI'10 Extended Abstracts on Human Factors in Computing Systems},
pages={4129--4134},
year={2010}
}
Challenges in evaluating complex IT security management systems.
Pooya Jaferian, Kirstie Hawkey, & Konstantin Beznosov.
In
Symposium on Usable Privacy and Security (SOUPS), 2010.
link
bibtex
@inproceedings{jaferian2010challenges,
title={Challenges in evaluating complex IT security management systems},
author={Jaferian, Pooya and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Symposium on Usable Privacy and Security (SOUPS)},
year={2010}
}
2009
(16)
Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports.
Hafiz Abdur Rahman, Konstantin Beznosov, & Martı́, José R.
International Journal of Critical Infrastructures, 5(3): 220–244. 2009.
link
bibtex
@article{rahman2009identification,
title={Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports},
author={Rahman, Hafiz Abdur and Beznosov, Konstantin and Mart{\'\i}, Jos{\'e} R},
journal={International Journal of Critical Infrastructures},
volume={5},
number={3},
pages={220--244},
year={2009},
publisher={Inderscience Publishers}
}
An integrated view of human, organizational, and technological challenges of IT security management.
Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov.
Information Management & Computer Security. 2009.
link
bibtex
@article{werlinger2009integrated,
title={An integrated view of human, organizational, and technological challenges of IT security management},
author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin},
journal={Information Management \& Computer Security},
year={2009},
publisher={Emerald Group Publishing Limited}
}
Revealing hidden context: improving mental models of personal firewall users.
Fahimeh Raja, Kirstie Hawkey, & Konstantin Beznosov.
In
Proceedings of the 5th Symposium on Usable Privacy and Security, pages 1–12, 2009.
link
bibtex
@inproceedings{raja2009revealing,
title={Revealing hidden context: improving mental models of personal firewall users},
author={Raja, Fahimeh and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Proceedings of the 5th Symposium on Usable Privacy and Security},
pages={1--12},
year={2009}
}
Secure web 2.0 content sharing beyond walled gardens.
San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov.
In
2009 Annual Computer Security Applications Conference, pages 409–418, 2009. IEEE
link
bibtex
@inproceedings{sun2009secure,
title={Secure web 2.0 content sharing beyond walled gardens},
author={Sun, San-Tsai and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={2009 Annual Computer Security Applications Conference},
pages={409--418},
year={2009},
organization={IEEE}
}
Security practitioners in context: Their activities and interactions with other stakeholders within organizations.
Rodrigo Werlinger, Kirstie Hawkey, David Botta, & Konstantin Beznosov.
International Journal of Human-Computer Studies, 67(7): 584–606. 2009.
link
bibtex
@article{werlinger2009security,
title={Security practitioners in context: Their activities and interactions with other stakeholders within organizations},
author={Werlinger, Rodrigo and Hawkey, Kirstie and Botta, David and Beznosov, Konstantin},
journal={International Journal of Human-Computer Studies},
volume={67},
number={7},
pages={584--606},
year={2009},
publisher={Academic Press}
}
Towards improving mental models of personal firewall users.
Fahimeh Raja, Kirstie Hawkey, & Konstantin Beznosov.
In
CHI'09 Extended Abstracts on Human Factors in Computing Systems, pages 4633–4638. 2009.
link
bibtex
@incollection{raja2009towards,
title={Towards improving mental models of personal firewall users},
author={Raja, Fahimeh and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={CHI'09 Extended Abstracts on Human Factors in Computing Systems},
pages={4633--4638},
year={2009}
}
Usability meets access control: challenges and research opportunities.
Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, & Mary Ellen Zurko.
In
Proceedings of the 14th ACM symposium on Access control models and technologies, pages 73–74, 2009.
link
bibtex
@inproceedings{beznosov2009usability,
title={Usability meets access control: challenges and research opportunities},
author={Beznosov, Konstantin and Inglesant, Philip and Lobo, Jorge and Reeder, Rob and Zurko, Mary Ellen},
booktitle={Proceedings of the 14th ACM symposium on Access control models and technologies},
pages={73--74},
year={2009}
}
A case study of enterprise identity management system adoption in an insurance organization.
Pooya Jaferian, David Botta, Kirstie Hawkey, & Konstantin Beznosov.
In
Proceedings of the Symposium on Computer Human interaction for the Management of information Technology, pages 46–55, 2009.
link
bibtex
@inproceedings{jaferian2009case,
title={A case study of enterprise identity management system adoption in an insurance organization},
author={Jaferian, Pooya and Botta, David and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={Proceedings of the Symposium on Computer Human interaction for the Management of information Technology},
pages={46--55},
year={2009}
}
Open problems in web 2.0 user content sharing.
San-Tsai Sun, & Konstantin Beznosov.
In
iNetSec 2009–Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers, pages 37–51, 2009. Springer Berlin Heidelberg
link
bibtex
@inproceedings{sun2009open,
title={Open problems in web 2.0 user content sharing},
author={Sun, San-Tsai and Beznosov, Konstantin},
booktitle={iNetSec 2009--Open Research Problems in Network Security: IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers},
pages={37--51},
year={2009},
organization={Springer Berlin Heidelberg}
}
Application-based TCP hijacking.
Oliver Zheng, Jason Poon, & Konstantin Beznosov.
In
Proceedings of the Second European Workshop on System Security, pages 9–15, 2009.
link
bibtex
@inproceedings{zheng2009application,
title={Application-based TCP hijacking},
author={Zheng, Oliver and Poon, Jason and Beznosov, Konstantin},
booktitle={Proceedings of the Second European Workshop on System Security},
pages={9--15},
year={2009}
}
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens.
San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov.
In
2009 International Conference on Computational Science and Engineering, volume 4, pages 979–984, 2009. IEEE
link
bibtex
@inproceedings{sun2009towards,
title={Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens},
author={Sun, San-Tsai and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={2009 International Conference on Computational Science and Engineering},
volume={4},
pages={979--984},
year={2009},
organization={IEEE}
}
A multi-method approach for user-centered design of identity management systems.
Pooya Jaferian, David Botta, Kirstie Hawkey, & Konstantin Beznosov.
In
SOUPS, 2009.
link
bibtex
@inproceedings{jaferian2009multi,
title={A multi-method approach for user-centered design of identity management systems.},
author={Jaferian, Pooya and Botta, David and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={SOUPS},
year={2009}
}
Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents.
Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, & Konstantin Beznosov.
In
HAISA, pages 119–134, 2009.
link
bibtex
@inproceedings{werlinger2009towards,
title={Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents.},
author={Werlinger, Rodrigo and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={HAISA},
pages={119--134},
year={2009}
}
SQLPrevent: Effective dynamic detection and prevention of SQL injection.
San-Tsai Sun, & Konstantin Beznosov.
Technical Report Technical report, March, 2009.
link
bibtex
@techreport{sun2009sqlprevent,
title={SQLPrevent: Effective dynamic detection and prevention of SQL injection},
author={Sun, San-Tsai and Beznosov, Konstantin},
year={2009},
institution={Technical report, March}
}
Auxiliary material for the study of security practitioners in context: their activities and interactions with other stakeholders within organizations.
Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov.
Technical Report Technical Report LERSSE-TR-2009-01, Laboratory for Education and Research in …, 2009.
link
bibtex
@techreport{werlinger2009auxiliary,
title={Auxiliary material for the study of security practitioners in context: their activities and interactions with other stakeholders within organizations},
author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin},
year={2009},
institution={Technical Report LERSSE-TR-2009-01, Laboratory for Education and Research in~…}
}
Poster: Towards Secure Web 2.0 User Content Sharing Beyond Walled Gardens.
San-Tsai Sun, & Konstantin Beznosov.
2009.
link
bibtex
@misc{sun2009poster,
title={Poster: Towards Secure Web 2.0 User Content Sharing Beyond Walled Gardens},
author={Sun, San-Tsai and Beznosov, Konstantin},
year={2009}
}
2008
(13)
Authorization recycling in RBAC systems.
Qiang Wei, Jason Crampton, Konstantin Beznosov, & Matei Ripeanu.
In
Proceedings of the 13th ACM symposium on Access control models and technologies, pages 63–72, 2008.
link
bibtex
@inproceedings{wei2008authorization,
title={Authorization recycling in RBAC systems},
author={Wei, Qiang and Crampton, Jason and Beznosov, Konstantin and Ripeanu, Matei},
booktitle={Proceedings of the 13th ACM symposium on Access control models and technologies},
pages={63--72},
year={2008}
}
The challenges of using an intrusion detection system: is it worth the effort?.
Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, & Konstantin Beznosov.
In
Proceedings of the 4th symposium on Usable privacy and security, pages 107–118, 2008.
link
bibtex
@inproceedings{werlinger2008challenges,
title={The challenges of using an intrusion detection system: is it worth the effort?},
author={Werlinger, Rodrigo and Hawkey, Kirstie and Muldner, Kasia and Jaferian, Pooya and Beznosov, Konstantin},
booktitle={Proceedings of the 4th symposium on Usable privacy and security},
pages={107--118},
year={2008}
}
Human, organizational, and technological factors of IT security.
Kirstie Hawkey, David Botta, Rodrigo Werlinger, Kasia Muldner, Andre Gagne, & Konstantin Beznosov.
In
CHI'08 extended abstracts on Human factors in computing systems, pages 3639–3644. 2008.
link
bibtex
@incollection{hawkey2008human,
title={Human, organizational, and technological factors of IT security},
author={Hawkey, Kirstie and Botta, David and Werlinger, Rodrigo and Muldner, Kasia and Gagne, Andre and Beznosov, Konstantin},
booktitle={CHI'08 extended abstracts on Human factors in computing systems},
pages={3639--3644},
year={2008}
}
Searching for the right fit: balancing IT security management model trade-offs.
Kirstie Hawkey, Kasia Muldner, & Konstantin Beznosov.
IEEE Internet Computing, 12(3): 22–30. 2008.
link
bibtex
@article{hawkey2008searching,
title={Searching for the right fit: balancing IT security management model trade-offs},
author={Hawkey, Kirstie and Muldner, Kasia and Beznosov, Konstantin},
journal={IEEE Internet Computing},
volume={12},
number={3},
pages={22--30},
year={2008},
publisher={IEEE}
}
Identifying Differences between Security and other IT Professionals: a Qualitative Analysis.
André Gagné, Kasia Muldner, & Konstantin Beznosov.
HAISA, 8: 69–80. 2008.
link
bibtex
@article{gagne2008identifying,
title={Identifying Differences between Security and other IT Professionals: a Qualitative Analysis.},
author={Gagn{\'e}, Andr{\'e} and Muldner, Kasia and Beznosov, Konstantin},
journal={HAISA},
volume={8},
pages={69--80},
year={2008}
}
Security practitioners in context: their activities and interactions.
Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov.
In
CHI'08 extended abstracts on Human factors in computing systems, pages 3789–3794. 2008.
link
bibtex
@incollection{werlinger2008security,
title={Security practitioners in context: their activities and interactions},
author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin},
booktitle={CHI'08 extended abstracts on Human factors in computing systems},
pages={3789--3794},
year={2008}
}
Security for the rest of us: An industry perspective on the secure-software challenge.
Konstantin Beznosov, & Brian Chess.
IEEE Software, 25(1): 10–12. 2008.
link
bibtex
@article{beznosov2008security,
title={Security for the rest of us: An industry perspective on the secure-software challenge},
author={Beznosov, Konstantin and Chess, Brian},
journal={IEEE Software},
volume={25},
number={1},
pages={10--12},
year={2008},
publisher={IEEE}
}
Authorization using the publish-subscribe model.
Qiang Wei, Matei Ripeanu, & Konstantin Beznosov.
In
2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pages 53–62, 2008. IEEE
link
bibtex
@inproceedings{wei2008authorization,
title={Authorization using the publish-subscribe model},
author={Wei, Qiang and Ripeanu, Matei and Beznosov, Konstantin},
booktitle={2008 IEEE International Symposium on Parallel and Distributed Processing with Applications},
pages={53--62},
year={2008},
organization={IEEE}
}
Protecting ASP. NET Web Services.
Konstantin Beznosov.
In
Securing Web Services: Practical Usage of Standards and Specifications, pages 206–227. IGI Global, 2008.
link
bibtex
@incollection{beznosov2008protecting,
title={Protecting ASP. NET Web Services},
author={Beznosov, Konstantin},
booktitle={Securing Web Services: Practical Usage of Standards and Specifications},
pages={206--227},
year={2008},
publisher={IGI Global}
}
Sqlprevent: Effective dynamic detection and prevention of sql injection attacks without access to the application source code.
San-Tsai Sun, & Konstantin Beznosov.
Technical Report Technical Report, 2008.
link
bibtex
@techreport{sun2008sqlprevent,
title={Sqlprevent: Effective dynamic detection and prevention of sql injection attacks without access to the application source code},
author={Sun, San-Tsai and Beznosov, Konstantin},
year={2008},
institution={Technical Report}
}
Human, Organizational and Technological Challenges of Implementing IT Security in Organizations.
Rodrigo Werlinger, Kirstie Hawkey, & Konstantin Beznosov.
HAISA, 8: 35–48. 2008.
Best Paper Award,
link
bibtex
@article{werlinger2008human,
title={Human, Organizational and Technological Challenges of Implementing IT Security in Organizations.},
author={Werlinger, Rodrigo and Hawkey, Kirstie and Beznosov, Konstantin},
journal={HAISA},
volume={8},
pages={35--48},
bibbase_note = {<span style="color: red">Best Paper Award</span>,},
year={2008}
}
2007
(7)
On the imbalance of the security problem space and its expected consequences.
Konstantin Beznosov, & Olga Beznosova.
Information Management & Computer Security, 15(5): 420–431. 2007.
link
bibtex
@article{beznosov2007imbalance,
title={On the imbalance of the security problem space and its expected consequences},
author={Beznosov, Konstantin and Beznosova, Olga},
journal={Information Management \& Computer Security},
volume={15},
number={5},
pages={420--431},
year={2007},
publisher={Emerald Group Publishing Limited}
}
Cooperative secondary authorization recycling.
Qiang Wei, Matei Ripeanu, & Konstantin Beznosov.
In
Proceedings of the 16th international symposium on High performance distributed computing, pages 65–74, 2007.
link
bibtex
@inproceedings{wei2007cooperative,
title={Cooperative secondary authorization recycling},
author={Wei, Qiang and Ripeanu, Matei and Beznosov, Konstantin},
booktitle={Proceedings of the 16th international symposium on High performance distributed computing},
pages={65--74},
year={2007}
}
Detecting, analyzing and responding to security incidents: a qualitative analysis.
Rodrigo Werlinger, David Botta, & Konstantin Beznosov.
In
Proceedings of the 3rd symposium on Usable privacy and security, pages 149–150, 2007.
link
bibtex
@inproceedings{werlinger2007detecting,
title={Detecting, analyzing and responding to security incidents: a qualitative analysis},
author={Werlinger, Rodrigo and Botta, David and Beznosov, Konstantin},
booktitle={Proceedings of the 3rd symposium on Usable privacy and security},
pages={149--150},
year={2007}
}
Support for ANSI RBAC in CORBA.
Konstantin Beznosov, & Wesam Darwish.
In
Technical Report LERSSE-TR-2007-01, accessible from http://lersse-dl. ece. ubc. ca/search. py? recid= 129. Laboratory for Education and Research in Secure Systems Engineering …, 2007.
link
bibtex
@incollection{beznosov2007support,
title={Support for ANSI RBAC in CORBA},
author={Beznosov, Konstantin and Darwish, Wesam},
booktitle={Technical Report LERSSE-TR-2007-01, accessible from http://lersse-dl. ece. ubc. ca/search. py? recid= 129},
year={2007},
publisher={Laboratory for Education and Research in Secure Systems Engineering~…}
}
Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs.
Kirstie Hawkey, Kasia Muldner, & Konstantin Beznosov.
Technical Report tech. report LERSSE-TR-2007-03, Laboratory for Education and Research in …, 2007.
link
bibtex
@techreport{hawkey2007searching,
title={Searching for the Right Fit: A Case Study of IT Security Management Model Tradeoffs},
author={Hawkey, Kirstie and Muldner, Kasia and Beznosov, Konstantin},
year={2007},
institution={tech. report LERSSE-TR-2007-03, Laboratory for Education and Research in~…}
}
Studying IT security professionals: research design and lessons learned.
David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, & Brian Fisher.
In
Workshop on security user studies: methodologies and best practices, 2007.
link
bibtex
@inproceedings{botta2007studying,
title={Studying IT security professionals: research design and lessons learned},
author={Botta, David and Werlinger, Rodrigo and Gagn{\'e}, Andr{\'e} and Beznosov, Konstantin and Iverson, Lee and Fels, Sidney and Fisher, Brian},
booktitle={Workshop on security user studies: methodologies and best practices},
year={2007}
}
2006
(8)
Extending XP practices to support security requirements engineering.
Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, & Philippe Kruchten.
In
Proceedings of the 2006 international workshop on Software engineering for secure systems, pages 11–18, 2006.
link
bibtex
@inproceedings{bostrom2006extending,
title={Extending XP practices to support security requirements engineering},
author={Bostr{\"o}m, Gustav and W{\"a}yrynen, Jaana and Bod{\'e}n, Marine and Beznosov, Konstantin and Kruchten, Philippe},
booktitle={Proceedings of the 2006 international workshop on Software engineering for secure systems},
pages={11--18},
year={2006}
}
The secondary and approximate authorization model and its application to Bell-LaPadula policies.
Jason Crampton, Wing Leung, & Konstantin Beznosov.
In
Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 111–120, 2006.
link
bibtex
@inproceedings{crampton2006secondary,
title={The secondary and approximate authorization model and its application to Bell-LaPadula policies},
author={Crampton, Jason and Leung, Wing and Beznosov, Konstantin},
booktitle={Proceedings of the eleventh ACM symposium on Access control models and technologies},
pages={111--120},
year={2006}
}
Multiple-channel security architecture and its implementation over SSL.
Yong Song, Konstantin Beznosov, & Victor CM Leung.
EURASIP Journal on Wireless Communications and Networking, 2006: 1–14. 2006.
link
bibtex
@article{song2006multiple,
title={Multiple-channel security architecture and its implementation over SSL},
author={Song, Yong and Beznosov, Konstantin and Leung, Victor CM},
journal={EURASIP Journal on Wireless Communications and Networking},
volume={2006},
pages={1--14},
year={2006},
publisher={Springer International Publishing}
}
A security analysis of the precise time protocol (short paper).
Jeanette Tsang, & Konstantin Beznosov.
In
Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings 8, pages 50–59, 2006. Springer Berlin Heidelberg
link
bibtex
@inproceedings{tsang2006security,
title={A security analysis of the precise time protocol (short paper)},
author={Tsang, Jeanette and Beznosov, Konstantin},
booktitle={Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings 8},
pages={50--59},
year={2006},
organization={Springer Berlin Heidelberg}
}
Cooperative Approximate Authorization Recycling.
Qiang Wei, Konstantin Beznosov, & Matei Ripeanu.
. 2006.
link
bibtex
@article{wei2006cooperative,
title={Cooperative Approximate Authorization Recycling},
author={Wei, Qiang and Beznosov, Konstantin and Ripeanu, Matei},
year={2006}
}
HOT Admin: Human, Organization, and Technology Centred Improvement of IT Security Administration.
David Botta, Rodrigo Werlinger, Andre Gagne, Konstantin Beznosov, Lee Iverson, Brian Fisher, & Sidney Fels.
In
Proceedings of the Annual Computer Security Applications Conference, 2006.
link
bibtex
@inproceedings{botta2006hot,
title={HOT Admin: Human, Organization, and Technology Centred Improvement of IT Security Administration},
author={Botta, David and Werlinger, Rodrigo and Gagne, Andre and Beznosov, Konstantin and Iverson, Lee and Fisher, Brian and Fels, Sidney},
booktitle={Proceedings of the Annual Computer Security Applications Conference},
year={2006}
}
Usable Security: Quo Vadis?.
Dirk Balfanz, Konstantin Beznosov, Paul Van Oorschot, & Ka-Ping Yee.
In
15th USENIX Security Symposium (USENIX Security 06), 2006.
link
bibtex
@inproceedings{balfanz2006usable,
title={Usable Security: Quo Vadis?},
author={Balfanz, Dirk and Beznosov, Konstantin and Van Oorschot, Paul and Yee, Ka-Ping},
booktitle={15th USENIX Security Symposium (USENIX Security 06)},
year={2006}
}
2005
(10)
Introduction to Web services and their security.
Konstantin Beznosov, Donald J Flinn, Shirley Kawamoto, & Bret Hartman.
Information Security Technical Report, 10(1): 2–14. 2005.
link
bibtex
@article{beznosov2005introduction,
title={Introduction to Web services and their security},
author={Beznosov, Konstantin and Flinn, Donald J and Kawamoto, Shirley and Hartman, Bret},
journal={Information Security Technical Report},
volume={10},
number={1},
pages={2--14},
year={2005},
publisher={Elsevier Advanced Technology}
}
Flooding and recycling authorizations.
Konstantin Beznosov.
In
Proceedings of the 2005 workshop on New security paradigms, pages 67–72, 2005.
link
bibtex
@inproceedings{beznosov2005flooding,
title={Flooding and recycling authorizations},
author={Beznosov, Konstantin},
booktitle={Proceedings of the 2005 workshop on New security paradigms},
pages={67--72},
year={2005}
}
Experience report: Design and implementation of a component-based protection architecture for ASP. NET web services.
Konstantin Beznosov.
In
International Symposium on Component-Based Software Engineering, pages 337–352, 2005. Springer Berlin Heidelberg Berlin, Heidelberg
link
bibtex
@inproceedings{beznosov2005experience,
title={Experience report: Design and implementation of a component-based protection architecture for ASP. NET web services},
author={Beznosov, Konstantin},
booktitle={International Symposium on Component-Based Software Engineering},
pages={337--352},
year={2005},
organization={Springer Berlin Heidelberg Berlin, Heidelberg}
}
Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM).
Konstantin Beznosov.
University of British Columbia. 2005.
link
bibtex
@article{beznosov2005recycling,
title={Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM)},
author={Beznosov, Konstantin},
journal={University of British Columbia},
year={2005}
}
Analysis of scalable security–MC-SSL savings.
Johnson Lee, Victor CM Leung, & Konstantin Beznosov.
In
Tech. Rep. LERSSE-TR-2005-02. Laboratory for Education and Research in Secure Systems Engineering (LERSSE …, 2005.
link
bibtex
@incollection{lee2005analysis,
title={Analysis of scalable security--MC-SSL savings},
author={Lee, Johnson and Leung, Victor CM and Beznosov, Konstantin},
booktitle={Tech. Rep. LERSSE-TR-2005-02},
year={2005},
publisher={Laboratory for Education and Research in Secure Systems Engineering (LERSSE~…}
}
Future direction of access control models, architectures, and technologies.
Konstantin Beznosov.
In
Proceedings of the tenth ACM symposium on Access control models and technologies, pages 48–48, 2005.
link
bibtex
@inproceedings{beznosov2005future,
title={Future direction of access control models, architectures, and technologies},
author={Beznosov, Konstantin},
booktitle={Proceedings of the tenth ACM symposium on Access control models and technologies},
pages={48--48},
year={2005}
}
A Method for Assessing the Trustworthiness of an Entity by Cooperating Authorities.
Konstantin Beznosov, & Ing Daniel Fischer.
. 2005.
link
bibtex
@article{beznosov2005method,
title={A Method for Assessing the Trustworthiness of an Entity by Cooperating Authorities},
author={Beznosov, Konstantin and Fischer, Ing Daniel},
year={2005}
}
SPAPI: A security and protection architecture for physical infrastructures and its deployment strategy using wireless sensor networks.
Hafiz Abdur Rahman, & Konstantin Beznosov.
In
2005 IEEE Conference on Emerging Technologies and Factory Automation, volume 2, pages 8–pp, 2005. IEEE
link
bibtex
@inproceedings{rahman2005spapi,
title={SPAPI: A security and protection architecture for physical infrastructures and its deployment strategy using wireless sensor networks},
author={Rahman, Hafiz Abdur and Beznosov, Konstantin},
booktitle={2005 IEEE Conference on Emerging Technologies and Factory Automation},
volume={2},
pages={8--pp},
year={2005},
organization={IEEE}
}
CITI Fault Report Classification and Encoding for Vulnerability and Risk Assessment of Interconnected Infrastructures.
Hafiz Abdur Rahman, & Konstantin Beznosov.
. 2005.
link
bibtex
@article{rahman2005citi,
title={CITI Fault Report Classification and Encoding for Vulnerability and Risk Assessment of Interconnected Infrastructures},
author={Rahman, Hafiz Abdur and Beznosov, Konstantin},
year={2005}
}
Analysis of Interdependencies between CITI and other Critical Infrastructures using RISKS Forum data.
Hafiz Abdur Rahman, & Konstantin Beznosov.
. 2005.
link
bibtex
@article{rahman2005analysis,
title={Analysis of Interdependencies between CITI and other Critical Infrastructures using RISKS Forum data},
author={Rahman, Hafiz Abdur and Beznosov, Konstantin},
year={2005}
}
2004
(7)
Towards agile security assurance.
Konstantin Beznosov, & Philippe Kruchten.
In
Proceedings of the 2004 workshop on New security paradigms, pages 47–54, 2004.
link
bibtex
@inproceedings{beznosov2004towards,
title={Towards agile security assurance},
author={Beznosov, Konstantin and Kruchten, Philippe},
booktitle={Proceedings of the 2004 workshop on New security paradigms},
pages={47--54},
year={2004}
}
Applying Aspect-Orientation in Designing Security Systems: A Case Study.
Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin Beznosov, & Kendra ML Cooper.
In
SEKE, pages 360–365, 2004.
link
bibtex
@inproceedings{gao2004applying,
title={Applying Aspect-Orientation in Designing Security Systems: A Case Study.},
author={Gao, Shu and Deng, Yi and Yu, Huiqun and He, Xudong and Beznosov, Konstantin and Cooper, Kendra ML},
booktitle={SEKE},
pages={360--365},
year={2004}
}
Supporting End-To-End Security Across Proxies with Multiplechannel SSL.
Yong Song, Victor CM Leung, & Konstantin Beznosov.
In
Security and Protection in Information Processing Systems: IFIP 18 th World Computer Congress TC11 19 th International Information Security Conference 22–27 August 2004 Toulouse, France, pages 323–337, 2004. Springer US
link
bibtex
@inproceedings{song2004supporting,
title={Supporting End-To-End Security Across Proxies with Multiplechannel SSL},
author={Song, Yong and Leung, Victor CM and Beznosov, Konstantin},
booktitle={Security and Protection in Information Processing Systems: IFIP 18 th World Computer Congress TC11 19 th International Information Security Conference 22--27 August 2004 Toulouse, France},
pages={323--337},
year={2004},
organization={Springer US}
}
On the benefits of decomposing policy engines into components.
Konstantin Beznosov.
In
Proceedings of the 3rd workshop on Adaptive and reflective middleware, pages 183–188, 2004.
link
bibtex
@inproceedings{beznosov2004benefits,
title={On the benefits of decomposing policy engines into components},
author={Beznosov, Konstantin},
booktitle={Proceedings of the 3rd workshop on Adaptive and reflective middleware},
pages={183--188},
year={2004}
}
Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need.
Konstantin Beznosov.
In
International Workshop on Software Engineering and Middleware, pages 3–18, 2004. Springer Berlin Heidelberg Berlin, Heidelberg
link
bibtex
@inproceedings{beznosov2004here,
title={Here’s Your LegoTM Security Kit: How to Give Developers All Protection Mechanisms They Will Ever Need},
author={Beznosov, Konstantin},
booktitle={International Workshop on Software Engineering and Middleware},
pages={3--18},
year={2004},
organization={Springer Berlin Heidelberg Berlin, Heidelberg}
}
Constraints.
Konstantin Beznosov.
In
Symposium on Access Control Models and Technologies: Proceedings of the ninth ACM symposium on Access control models and technologies, volume 2004, 2004.
link
bibtex
@inproceedings{beznosov2004constraints,
title={Constraints},
author={Beznosov, Konstantin},
booktitle={Symposium on Access Control Models and Technologies: Proceedings of the ninth ACM symposium on Access control models and technologies},
volume={2004},
year={2004}
}
2003
(7)
Mastering web services security.
Bret Hartman, Donald J Flinn, Konstantin Beznosov, & Shirley Kawamoto.
2003.
link
bibtex
@misc{hartman2003mastering,
title={Mastering web services security},
author={Hartman, Bret and Flinn, Donald J and Beznosov, Konstantin and Kawamoto, Shirley},
year={2003},
publisher={John Wiley \& Sons}
}
Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it.
Konstantin Beznosov.
In
First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA, volume 31, 2003.
link
bibtex
@inproceedings{beznosov2003extreme,
title={Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it},
author={Beznosov, Konstantin},
booktitle={First ACM Workshop on Business Driven Security Engineering (BizSec), Fairfax, VA},
volume={31},
year={2003}
}
A Two-factor Authentication Mechanism Using Mobile Phones.
Nima Kaviani, Kirstie Hawkey, & Konstantin Beznosov.
available at, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Technical report LERSSE-TR-2008-03,(Aug. 20, 2008). 2003.
link
bibtex
@article{kaviani2003two,
title={A Two-factor Authentication Mechanism Using Mobile Phones},
author={Kaviani, Nima and Hawkey, Kirstie and Beznosov, Konstantin},
journal={available at, Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Technical report LERSSE-TR-2008-03,(Aug. 20, 2008)},
year={2003}
}
Securing Web services.
B Hartman, DJ Flinn, K Beznosov, & S Kawamoto.
APPLICATION DEVELOPMENT TRENDS, 10(2): 39–46. 2003.
link
bibtex
@article{hartman2003securing,
title={Securing Web services},
author={Hartman, B and Flinn, DJ and Beznosov, K and Kawamoto, S},
journal={APPLICATION DEVELOPMENT TRENDS},
volume={10},
number={2},
pages={39--46},
year={2003},
publisher={MICROSOFT CORPORATION}
}
eXtensible Access Control Markup.
Anne Anderson, Bill Parducci, Entrust Carlisle Adams, Don Flinn, Gerald Brose, Hal Lockhart, Konstantin Beznosov, IBM Michiharu Kudo, Polar Humenn, Simon Godik, & others.
language, 28: 29. 2003.
link
bibtex
@article{anderson2003extensible,
title={eXtensible Access Control Markup},
author={Anderson, Anne and Parducci, Bill and Carlisle Adams, Entrust and Flinn, Don and Brose, Gerald and Lockhart, Hal and Beznosov, Konstantin and Michiharu Kudo, IBM and Humenn, Polar and Godik, Simon and others},
journal={language},
volume={28},
pages={29},
year={2003}
}
Attribute Function: an enabler for effective inexpensive application-specific security decisions.
Konstantin Beznosov.
. 2003.
link
bibtex
@article{beznosov2003attribute,
title={Attribute Function: an enabler for effective inexpensive application-specific security decisions},
author={Beznosov, Konstantin},
year={2003}
}
2002
(4)
Enterprise Security with EJB and CORBA.
Bret Hartman, Donald J Flinn, & Konstantin Beznosov.
2002.
link
bibtex
@misc{hartman2002enterprise,
title={Enterprise Security with EJB and CORBA},
author={Hartman, Bret and Flinn, Donald J and Beznosov, Konstantin},
year={2002},
publisher={John Wiley \& Sons}
}
Object security attributes: Enabling application-specific access control in middleware.
Konstantin Beznosov.
In
OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", pages 693–710, 2002. Springer Berlin Heidelberg Berlin, Heidelberg
link
bibtex
@inproceedings{beznosov2002object,
title={Object security attributes: Enabling application-specific access control in middleware},
author={Beznosov, Konstantin},
booktitle={OTM Confederated International Conferences" On the Move to Meaningful Internet Systems"},
pages={693--710},
year={2002},
organization={Springer Berlin Heidelberg Berlin, Heidelberg}
}
Mastering Web Services Security.
Konstantin Beznosov, B Hartman, DJ Flinn, & S Kawamoto.
2002.
link
bibtex
@misc{beznosov2002mastering,
title={Mastering Web Services Security},
author={Beznosov, Konstantin and Hartman, B and Flinn, DJ and Kawamoto, S},
year={2002},
publisher={Wiley}
}
Security Engineering for Large Scale Distributed Applications.
Konstantin Beznosov.
. 2002.
link
bibtex
@article{beznosov2002security,
title={Security Engineering for Large Scale Distributed Applications},
author={Beznosov, Konstantin},
year={2002}
}
2001
(1)
Engineering access control in distributed applications.
Konstantin Beznosov, & Yi Deng.
In
Handbook of Software Engineering and Knowledge Engineering: Volume I: Fundamentals, pages 69–90. 2001.
link
bibtex
@incollection{beznosov2001engineering,
title={Engineering access control in distributed applications},
author={Beznosov, Konstantin and Deng, Yi},
booktitle={Handbook of Software Engineering and Knowledge Engineering: Volume I: Fundamentals},
pages={69--90},
year={2001}
}
2000
(4)
Engineering access control for distributed enterprise applications.
Konstantin Beznosov.
Ph.D. Thesis, Florida International University, 2000.
link
bibtex
@phdthesis{beznosov2000engineering,
title={Engineering access control for distributed enterprise applications},
author={Beznosov, Konstantin},
year={2000},
school={Florida International University}
}
Design and Implementation of Resource Access Decision Server.
Luis Espinal, Konstantin Beznosov, & Yi Deng.
Center for Advanced Distributed Systems Engineering (CADSE)-Florida International University, Miami technical report, 1. 2000.
link
bibtex
@article{espinal2000design,
title={Design and Implementation of Resource Access Decision Server},
author={Espinal, Luis and Beznosov, Konstantin and Deng, Yi},
journal={Center for Advanced Distributed Systems Engineering (CADSE)-Florida International University, Miami technical report},
volume={1},
year={2000}
}
1999
(3)
Supporting relationships in access control using role based access control.
John Barkley, Konstantin Beznosov, & Jinny Uppal.
In
Proceedings of the fourth ACM workshop on Role-based access control, pages 55–65, 1999.
link
bibtex
@inproceedings{barkley1999supporting,
title={Supporting relationships in access control using role based access control},
author={Barkley, John and Beznosov, Konstantin and Uppal, Jinny},
booktitle={Proceedings of the fourth ACM workshop on Role-based access control},
pages={55--65},
year={1999}
}
A resource access decision service for CORBA-based distributed systems.
Konstantin Beznosov, Yi Deng, Bob Blakley, Carol Burt, & John Barkley.
In
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), pages 310–319, 1999. IEEE
link
bibtex
@inproceedings{beznosov1999resource,
title={A resource access decision service for CORBA-based distributed systems},
author={Beznosov, Konstantin and Deng, Yi and Blakley, Bob and Burt, Carol and Barkley, John},
booktitle={Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)},
pages={310--319},
year={1999},
organization={IEEE}
}
A framework for implementing role-based access control using CORBA security service.
Konstantin Beznosov, & Yi Deng.
In
Proceedings of the fourth ACM workshop on Role-based access control, pages 19–30, 1999.
link
bibtex
@inproceedings{beznosov1999framework,
title={A framework for implementing role-based access control using CORBA security service},
author={Beznosov, Konstantin and Deng, Yi},
booktitle={Proceedings of the fourth ACM workshop on Role-based access control},
pages={19--30},
year={1999}
}
1998
(4)
Requirements for access control: US healthcare domain.
Konstantin Beznosov.
In
Proceedings of the third ACM workshop on Role-based access control, pages 43, 1998.
link
bibtex
@inproceedings{beznosov1998requirements,
title={Requirements for access control: US healthcare domain},
author={Beznosov, Konstantin},
booktitle={Proceedings of the third ACM workshop on Role-based access control},
pages={43},
year={1998}
}
Computer and Distributed Security: Introductory Overview for Researchers.
Konstantin Beznosov.
. 1998.
link
bibtex
@article{beznosov1998computer,
title={Computer and Distributed Security: Introductory Overview for Researchers},
author={Beznosov, Konstantin},
year={1998}
}
Decoupling Authorization Logic From Application Logic in CORBA Security-Aware Applications.
Konstantin Beznosov, Yi Dengy, Bob Blakleyz, Carol Burtx, & John Barkley.
. 1998.
link
bibtex
@article{beznosov1998decoupling,
title={Decoupling Authorization Logic From Application Logic in CORBA Security-Aware Applications},
author={Beznosov, Konstantin and Dengy, Yi and Blakleyz, Bob and Burtx, Carol and Barkley, John},
year={1998},
publisher={Citeseer}
}
1997
(1)
CORBAmed security white paper.
Wayne Wilson, & Konstantin Beznosov.
Object Management Group corbamed/97-11-03. 1997.
link
bibtex
@article{wilson1997corbamed,
title={CORBAmed security white paper},
author={Wilson, Wayne and Beznosov, Konstantin},
journal={Object Management Group corbamed/97-11-03},
year={1997}
}
undefined
(27)
Realizing Service-Centric Software Systems.
Konstantin Beznosov, & Brian Chess.
. .
link
bibtex
@article{beznosovrealizing,
title={Realizing Service-Centric Software Systems},
author={Beznosov, Konstantin and Chess, Brian}
}
Christoph Schuba, Sun Microsystems, Inc.(Program Chair) Charles Payne, Adventium Labs (Program Co-Chair).
Pierangela Samarati, Terry Benzel, Konstantin Beznosov, Germano Caronni, Ramaswamy Chandramouli, Marc Dacier, Ernesto Damianti, Gary Ellison, Dieter Gollmann, Steven J Greenwald, & others.
. .
link
bibtex
@article{samaratichristoph,
title={Christoph Schuba, Sun Microsystems, Inc.(Program Chair) Charles Payne, Adventium Labs (Program Co-Chair)},
author={Samarati, Pierangela and Benzel, Terry and Beznosov, Konstantin and Caronni, Germano and Chandramouli, Ramaswamy and Dacier, Marc and Damianti, Ernesto and Ellison, Gary and Gollmann, Dieter and Greenwald, Steven J and others}
}
An RT-based Policy Model for Converged Networks.
San-Tsai Sun, & Konstantin Beznosov.
. .
link
bibtex
@article{sunrt,
title={An RT-based Policy Model for Converged Networks},
author={Sun, San-Tsai and Beznosov, Konstantin}
}
OASIS eXtensible Access Control Markup Language (XACML) Committee Specification 1.0, 7 November 2002.
Anne Anderson, Don Flinn, Quadrasis Ernesto Damiani, Konstantin Beznosov, Quadrasis Michiharu Kudo, Pierangela Samarati, Pirasenna Velandai Thiyagarajan, Polar Humenn, Sekhar Vajjhala, Seth Proctor, & others.
. .
link
bibtex
@article{andersonoasis,
title={OASIS eXtensible Access Control Markup Language (XACML) Committee Specification 1.0, 7 November 2002},
author={Anderson, Anne and Flinn, Don and Damiani, Quadrasis Ernesto and Beznosov, Konstantin and Kudo, Quadrasis Michiharu and Samarati, Pierangela and Thiyagarajan, Pirasenna Velandai and Humenn, Polar and Vajjhala, Sekhar and Proctor, Seth and others}
}
Evaluation of SAAMBLP.
Kyle Zeeuwen, & Konstantin Beznosov.
. .
link
bibtex
@article{zeeuwenevaluation,
title={Evaluation of SAAMBLP},
author={Zeeuwen, Kyle and Beznosov, Konstantin}
}
Ian Marshall.
Ehab Al-Shaer, Xuhui Ao, Arosha Bandara, Jean Bacon, Moritz Becker, Elisa Bertino, Konstantin Beznosov, Rakesh Bobba, Marcus Brunner, Mark Burgess, & others.
. .
link
bibtex
@article{alian,
title={Ian Marshall},
author={Al-Shaer, Ehab and Ao, Xuhui and Bandara, Arosha and Bacon, Jean and Becker, Moritz and Bertino, Elisa and Beznosov, Konstantin and Bobba, Rakesh and Brunner, Marcus and Burgess, Mark and others}
}
Understanding IT Security Administration through a Field Study.
David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney Fels, & Brian Fisher.
. .
link
bibtex
@article{bottaunderstanding,
title={Understanding IT Security Administration through a Field Study},
author={Botta, David and Werlinger, Rodrigo and Gagn{\'e}, Andr{\'e} and Beznosov, Konstantin and Iverson, Lee and Fels, Sidney and Fisher, Brian}
}
UsefUl CompUTer seCUrITy.
Bryan D Payne, W Keith Edwards, Kirstie Hawkey, Kasia Muldner, Konstantin Beznosov, Sean Bechhofer, Yeliz Yesilada, Robert Stevens, Simon Jupp, & Bernard Horan.
. .
link
bibtex
@article{payneuseful,
title={UsefUl CompUTer seCUrITy},
author={Payne, Bryan D and Edwards, W Keith and Hawkey, Kirstie and Muldner, Kasia and Beznosov, Konstantin and Bechhofer, Sean and Yesilada, Yeliz and Stevens, Robert and Jupp, Simon and Horan, Bernard}
}
Poster: OpenIDemail Enabled Browser, Towards Fixing the Broken Web Single Sign-On Triangle.
San-Tsai Sun, Kirstie Hawkey, & Konstantin Beznosov.
. .
link
bibtex
@article{sunposter,
title={Poster: OpenIDemail Enabled Browser, Towards Fixing the Broken Web Single Sign-On Triangle},
author={Sun, San-Tsai and Hawkey, Kirstie and Beznosov, Konstantin}
}
Poster: Expectations, Perceptions, and Misconceptions of Personal Firewalls.
Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, & Kellogg S Booth.
. .
link
bibtex
@article{rajaposter,
title={Poster: Expectations, Perceptions, and Misconceptions of Personal Firewalls},
author={Raja, Fahimeh and Hawkey, Kirstie and Jaferian, Pooya and Beznosov, Konstantin and Booth, Kellogg S}
}
Poster: OpenIDemail Enabled Browser.
San-Tsai Sun, & Konstantin Beznosov.
. .
link
bibtex
@article{sunposter,
title={Poster: OpenIDemail Enabled Browser},
author={Sun, San-Tsai and Beznosov, Konstantin}
}
Charles Payne (PC Co-Chair), Adventium Labs.
Tuomas Aura, Lujo Bauer, David Elliott Bell, Terry Benzel, Konstantin Beznosov, Rafae Bhatti, Sabrina De Capitani Vimercati, Marc Dacier, Mary Denz, Jan Eloff, & others.
. .
link
bibtex
@article{auracharles,
title={Charles Payne (PC Co-Chair), Adventium Labs},
author={Aura, Tuomas and Bauer, Lujo and Bell, David Elliott and Benzel, Terry and Beznosov, Konstantin and Bhatti, Rafae and di Vimercati, Sabrina De Capitani and Dacier, Marc and Denz, Mary and Eloff, Jan and others}
}
Poster: Toward Enabling Secure Web 2.0 Content Sharing Beyond Walled Gardens.
San-Tsai Sun, & Konstantin Beznosov.
. .
link
bibtex
@article{sunposter,
title={Poster: Toward Enabling Secure Web 2.0 Content Sharing Beyond Walled Gardens},
author={Sun, San-Tsai and Beznosov, Konstantin}
}
Poster: Fine-Grained Locking System for Data and Applications in Smartphones.
Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov, Cynthia Kuo, & Jonathan Lester.
. .
link
bibtex
@article{muslukhovposter,
title={Poster: Fine-Grained Locking System for Data and Applications in Smartphones},
author={Muslukhov, Ildar and Boshmaf, Yazan and Beznosov, Konstantin and Kuo, Cynthia and Lester, Jonathan}
}
Poster: Towards Improving Usability of Access Certification Interfaces.
Pooya Jaferian, Hootan Rashtian, & Konstantin Beznosov.
. .
link
bibtex
@article{jaferianposter,
title={Poster: Towards Improving Usability of Access Certification Interfaces},
author={Jaferian, Pooya and Rashtian, Hootan and Beznosov, Konstantin}
}
POSTER: How Many Attackers Did You Befriend Today? An Automated Social Engineering Attack in Social Networking Sites.
Yazan Boshmaf, Konstantin Beznosov, & Matei Ripeanu.
. .
link
bibtex
@article{boshmafposter,
title={POSTER: How Many Attackers Did You Befriend Today? An Automated Social Engineering Attack in Social Networking Sites},
author={Boshmaf, Yazan and Beznosov, Konstantin and Ripeanu, Matei}
}
Poster: Privacy Aspects of Health Related Information Sharing in Online Social Networks.
Sadegh Torabi, & Konstantin Beznosov.
. .
link
bibtex
@article{torabiposter,
title={Poster: Privacy Aspects of Health Related Information Sharing in Online Social Networks},
author={Torabi, Sadegh and Beznosov, Konstantin}
}
Searching for the Right Fit.
Kirstie Hawkey, Kasia Muldner, & Konstantin Beznosov.
. .
link
bibtex
@article{hawkeysearching,
title={Searching for the Right Fit},
author={Hawkey, Kirstie and Muldner, Kasia and Beznosov, Konstantin}
}
The Socialbot Network: Are Social Botnets Possible?.
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, & Matei Ripeanu.
. .
link
bibtex
@article{boshmafsocialbot,
title={The Socialbot Network: Are Social Botnets Possible?},
author={Boshmaf, Yazan and Muslukhov, Ildar and Beznosov, Konstantin and Ripeanu, Matei}
}
Poster: Speculative Authorizations.
Pranab Kini, & Konstantin Beznosov.
. .
link
bibtex
@article{kiniposter,
title={Poster: Speculative Authorizations},
author={Kini, Pranab and Beznosov, Konstantin}
}
Resource Access Decision Facility: Overview.
Konstantin Beznosov.
. .
link
bibtex
@article{beznosovresource,
title={Resource Access Decision Facility: Overview},
author={Beznosov, Konstantin}
}
Revealing hidden context.
Fahimeh Raja, K Hawkey, & K Beznosov.
In
Proc. 5th Symp. Usable Priv. Secur.-SOUPS, volume 9, pages 1, .
link
bibtex
@inproceedings{raja9revealing,
title={Revealing hidden context},
author={Raja, Fahimeh and Hawkey, K and Beznosov, K},
booktitle={Proc. 5th Symp. Usable Priv. Secur.-SOUPS},
volume={9},
pages={1}
}
Why is it important to detect fakes?.
Yazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Dionysios Logothetis, Georgios Siganos, Jorge Laria, & Jose Lorenzo.
. .
link
bibtex
@article{boshmafimportant,
title={Why is it important to detect fakes?},
author={Boshmaf, Yazan and Ripeanu, Matei and Beznosov, Konstantin and Logothetis, Dionysios and Siganos, Georgios and Laria, Jorge and Lorenzo, Jose}
}
OASIS eXtensible Access Control Markup Language (XACML) Working Draft 17, 27 September 2002.
Anne Anderson, Don Flinn, Quadrasis Ernesto Damiani, Konstantin Beznosov, Quadrasis Michiharu Kudoh, Pierangela Samarati, Pirs Vilandai Thiyatarajan, Polar Humenn, Sekhar Vajjhala, Steve Anderson, & others.
. .
link
bibtex
@article{andersonoasis,
title={OASIS eXtensible Access Control Markup Language (XACML) Working Draft 17, 27 September 2002},
author={Anderson, Anne and Flinn, Don and Damiani, Quadrasis Ernesto and Beznosov, Konstantin and Kudoh, Quadrasis Michiharu and Samarati, Pierangela and Thiyatarajan, Pirs Vilandai and Humenn, Polar and Vajjhala, Sekhar and Anderson, Steve and others}
}
Systematization of Knowledge: Human, Organizational, and Technological Dimensions of Developers’ Challenges in Engineering Secure Software.
Azadeh Mokhberi, & Konstantin Beznosov.
. .
link
bibtex
@article{mokhberisystematization,
title={Systematization of Knowledge: Human, Organizational, and Technological Dimensions of Developers’ Challenges in Engineering Secure Software},
author={Mokhberi, Azadeh and Beznosov, Konstantin}
}
OASIS eXtensible Access Control Markup Language (XACML) Committee Specification 1.0, 8 October 2002.
Anne Anderson, Don Flinn, Quadrasis Ernesto Damiani, Konstantin Beznosov, Quadrasis Michiharu Kudo, Pierangela Samarati, Piras Vilandai Thiyatarajan, Polar Humenn, Sekhar Vajjhala, Steve Anderson, & others.
. .
link
bibtex
@article{andersonoasis,
title={OASIS eXtensible Access Control Markup Language (XACML) Committee Specification 1.0, 8 October 2002},
author={Anderson, Anne and Flinn, Don and Damiani, Quadrasis Ernesto and Beznosov, Konstantin and Kudo, Quadrasis Michiharu and Samarati, Pierangela and Thiyatarajan, Piras Vilandai and Humenn, Polar and Vajjhala, Sekhar and Anderson, Steve and others}
}