Archive for the 'Uncategorized' Category

May 26 2011

GRAND Annual Conference

Published by under Uncategorized

We’ve recently returned from beautiful Vancouver for the 2nd Annual GRAND Conference. We are part of projects on “Usable Privacy and Security for New Media Environments” and “Digital Games for Learning and Training”. It was an oppportunity to discuss on-going projects, get feedback from others in different disciplines, talk about research priorities, and plan for the next year.

May 18 2011

CHI 2011

Published by under Uncategorized

Members of our lab attended CHI 2011 in beautiful but cloudy Vancouver, Canada. The usable security sessions covered a wide array of sub-topics, including authentication, access control, Facebook privacy, phishing, and more. CHI’s Interactivity sessions lived up to their previous years of providing novel innovative ways of interacting with technology. We played around with Tobii’s prototype laptop with a build-in eye tracker. The Buxton Collection was very popular, where Bill tirelessly shared his insights and experiences throughout the evolution of computing technology all days of the conference.

May 10 2011

“Technologies of the Future” session

Published by under Uncategorized

On May 6, we hosted grade 8-9 students from Ottawa in our lab for a session on user interaction technologies as part of Carleton’s Enrichment Mini-Courses.  Students learned about the technologies and got hands-on experience with multitouch tables, a haptic device, an eye tracker, a head-mounted display, and a digital pen.

May 02 2011

2011 ISSNet Annual Workshop

Published by under Uncategorized

We spent a week in Toronto for the ISSNet Annual Workshop. We heard updates on recent work on research projects in all three themes (Network-oriented Security, Software Systems-oriented Security, Human-oriented Security) and had plenty of opportunity to catch up and discuss research with members from other Universities and industry partners. Several students from our lab presented posters of their on-going research projects. Invited talks by Nart Villeneuve from Trend Micro and by N. Asokan and Valtteri Niemi from Nokia gave us interesting insight into current industry work.

Mar 20 2011

Graphical passwords survey accepted to ACM Computing Surveys

Published by under Uncategorized

We were pleased to learn that our survey of graphical passwords has been accepted for publication in ACM Computing Surveys. It will appear in issue 44(4).

Title: Graphical Passwords: Learning from the First Twelve Years
Abstract:
Starting around 1999, a great many graphical password schemes have been proposed as alternatives to text-based password authentication. We provide a comprehensive overview of published research in the area, covering both usability and security aspects, as well as system evaluation. The paper first catalogues existing approaches, highlighting novel features of selected schemes and identifying key usability or security advantages. We then review usability requirements for knowledge-based authentication as they apply to graphical passwords, identify security threats that such systems must address and review known attacks, discuss methodological issues related to empirical evaluation, and identify areas for further research and improved methodology.

Mar 10 2011

FC 2011

Published by under Uncategorized

Several Carleton security and usable security researchers attended Financial Cryptography ‘11 in St. Lucia.  We were pleasantly surprised to see that several of the papers addressed human factors and usable security. Our workshop on Authentication was well-attended and generated lots of questions and discussion between attendees and panelists.  The workshop included invited talks by Cormac Herley, Steven Bellovin, and Robert Biddle.

Dec 21 2010

FC’11 Workshop on User Authentication

Published by under Uncategorized

Join us for a one-day workshop on user authentication:
We are organizing a workshop on user authentication, co-located with Financial Cryptography 2011 in St. Lucia on March 4, 2011. The workshop will consist of invited talks and expert panels. A preliminary program is available and will be updated as details are finalized.

Workshop on The Future of User Authentication and Authorization on the Web:
Challenges in Current Practice, New Threats, and Research Directions

Friday, March 4, 2011 — St. Lucia

Dec 15 2010

ACSAC 2010

Published by under Uncategorized

Robert, Elizabeth, and Sonia attended ACSAC in Austin, TX. Elizabeth presented our paper on the first day. It was the only usable security paper at the conference, but there was lots of audience interest and questions. Tom Longstaff’s invited talk about the experimental process and the importance of gathering real data resulted in lively discussion and was encouraging to see given our research. It was nice to see someone advocating for proper experimental work and analysis. Bill Cheswick’s great talk on his experiences with Berferd was both entertaining and informative.

Oct 03 2010

Microsoft Research Internship

Published by under Uncategorized

After completing his comprehensive examinations, Alain spent the past 3 months as an intern at Microsoft Research. He worked with fellow intern and Ph.D. Candidate Kami Vaniea and mentors Stuart Schechter and Rob Reeder on Laissez-faire file sharing.

It has been a fantastic learning experience on several topics, including the subtle issues involved in designing usable access control, how industry-based research at Microsoft differs from academic research, and sneak peeks of upcoming Windows products, such as Windows Phone 7 and Kinect; a controller-less interface for the Xbox 360.

Kami & Alain @ Microsoft

Aug 20 2010

PST 2010

Published by under Uncategorized

IEEE’s Privacy, Security, Trust conference (PST) was held here in Ottawa this year. The talks were an interesting mix ranging from very technical to public policy topics, including a keynote by Ann Cavoukian, the Information and Privacy Commissioner of Ontario. Dan, Alain, and Robert presented a paper on using eye-gaze as a tool to predict likely click-based graphical password click-points. Sonia taught a half-day tutorial introducing usable security and how to run usability evaluations.

« Prev - Next »