Lab Members are Underlined
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Miranda Wei, Jaron Mink, Yael Eiger, Tadayoshi Kohno, Elissa M. Redmiles, Franziska Roesner
33rd USENIX Security Symposium, 2024
PDF
It’s Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias
Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang
ACM CHI Conference on Human Factors in Computing Systems, 2024
PDF Talk
“Security is not my field, I’m a stats guy”: A Qualitative
Root Cause Analysis of Barriers to Adversarial Machine
Learning Defenses in Industry
Jaron Mink*, Harjot Kaur*, Juliane Schmüser*, Sascha Fahl, Yasemin Acar
32nd USENIX Security Symposium, 2023
PDF Talk Slides
News: Human-Centered Security Podcast
Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of
ML-Based Security Tools and Explanations
Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang
44th IEEE Symposium on Security and Privacy, 2023
PDF Talk
Slides Teaser
News: Human-Centered Security Podcast
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan
44th IEEE Symposium on Security and Privacy, 2023
PDF
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan
38th Annual Computer Security Applications Conference, 2022
PDF
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
Jaron Mink, Licheng Luo, Nata M. Barbosa, Olivia Figueria, Yang Wang, Gang Wang
31st USENIX Security Symposium, 2022
PDF Supplemental Materials Website Talk Slides Artifact Available, Artifacts Functional, Results Reproduced
News: Futurum, New Scientist
Beyond Bot Detection: Combating Fraudulent Online Survey Takers
Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang
The ACM Web Conference, 2022
PDF
News: The Transmitter
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking App
Jaron Mink, Amanda Rose Yuile, Uma Pal, Adam J Aviv, Adam Bates
ACM CHI Conference on Human Factors in Computing Systems, 2022
PDF Supplemental Materials Talk Slides
News: The 21st Show
On the Forensic Validity of Approximated Audit Logs
Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates
36th Annual Computer Security Applications Conference, 2020
PDF Talk Slides
The documents listed here are available for downloading and have been provided as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be re-posted without the explicit permission of the copyright holder.