Lab Members are Underlined
Signals of Provenance: Practices & Challenges of Navigating Indicators in AI-Generated Media for Sighted and Blind Individuals
Ayae Ide, Tory Park, Jaron Mink, Tanusree Sharma
ACM Conference on Computer-Supported Cooperative Work and Social Computing, 2026
PDF
I Can SE Clearly Now: Investigating the Effectiveness of GUI-based Symbolic Execution for Software Vulnerability Discovery
Yi Jou Li, Zeming Yu, James A Mattei, Ananta Soneji, Zhibo Sun, Ruoyu Wang, Jaron Mink, Daniel Votipka, Tiffany Bao
ACM CHI Conference on Human Factors in Computing Systems, 2026
PDF
Do Hackers Dream of Electric Teachers?: A Large-Scale, In-Situ Evaluation of Cybersecurity Student Behaviors and Performance with AI Tutors
Michael Tompkins, Nihaarika Agarwal, Ananta Soneji, Robert Wasinger, Connor Nelson, Kevin Leach, Rakibul Hasan, Adam Doupé, Daniel Votipka, Yan Shoshitaishvili, Jaron Mink
Pre-Print, 2026
PDF
"Unlimited Realm of Exploration and Experimentation": Methods and Motivations of AI-Generated Sexual Content Creators
Jaron Mink*, Lucy Qin*, Elissa M. Redmiles
Pre-Print, 2026
PDF
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner
33rd USENIX Security Symposium, 2024
PDF
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias
Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang
ACM CHI Conference on Human Factors in Computing Systems, 2024
PDF
Talk
News:
NIST AI Executive Order RFI
"Security is not my field, I'm a stats guy": A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry
Jaron Mink*, Harjot Kaur*, Juliane Schmüser*, Sascha Fahl, Yasemin Acar
32nd USENIX Security Symposium, 2023
PDF
Talk
Slides
News:
Human-Centered Security Podcast,
NIST AI Executive Order RFI
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan
44th IEEE Symposium on Security and Privacy, 2023
PDF
Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations
Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang
44th IEEE Symposium on Security and Privacy, 2023
PDF
Talk
Slides
Teaser
News:
Human-Centered Security Podcast,
NIST AI Executive Order RFI
FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput
Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan
38th Annual Computer Security Applications Conference, 2022
PDF
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueria, Yang Wang, Gang Wang
31st USENIX Security Symposium, 2022
PDF
Supplemental Materials
Website
Talk
Slides
News:
Futurum,
New Scientist,
NIST AI Executive Order RFI
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking App
Jaron Mink, Amanda Rose Yuile, Uma Pal, Adam J Aviv, Adam Bates
ACM CHI Conference on Human Factors in Computing Systems, 2022
PDF
Supplemental Materials
Talk
Slides
News:
The 21st Show
Beyond Bot Detection: Combating Fraudulent Online Survey Takers
Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang
The ACM Web Conference, 2022
PDF
News:
The Transmitter
On the Forensic Validity of Approximated Audit Logs
Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates
36th Annual Computer Security Applications Conference, 2020
PDF
Talk
Slides
The documents listed here are available for downloading and have been provided as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be re-posted without the explicit permission of the copyright holder.