Остановите войну!
for scientists:
default search action
Franziska Roesner
- > Home > Persons > Franziska Roesner
Publications
- 2024
- [j8]Franziska Roesner, Tadayoshi Kohno:
Security and Privacy in the Metaverse. IEEE Secur. Priv. 22(1): 7-9 (2024) - [i17]Yuhao Wu, Franziska Roesner, Tadayoshi Kohno, Ning Zhang, Umar Iqbal:
SecGPT: An Execution Isolation Architecture for LLM-Based Systems. CoRR abs/2403.04960 (2024) - 2023
- [c68]Pardis Emami Naeini, Joseph Breda, Wei Dai, Tadayoshi Kohno, Kim Laine, Shwetak N. Patel, Franziska Roesner:
Understanding People's Concerns and Attitudes Toward Smart Cities. CHI 2023: 71:1-71:24 - [c66]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CHI 2023: 190:1-190:17 - [c64]Jackson Stokes, Tal August, Robert A Marver, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, Katharina Reinecke:
How Language Formality in Security and Privacy Interfaces Impacts Intended Compliance. CHI 2023: 617:1-617:12 - [c63]Christina Yeung, Umar Iqbal, Tadayoshi Kohno, Franziska Roesner:
Gender Biases in Tone Analysis: A Case Study of a Commercial Wearable. EAAMO 2023: 21:1-21:12 - [c61]Mattea Sim, Kurt Hugenberg, Tadayoshi Kohno, Franziska Roesner:
A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design. NSPW 2023: 102-115 - [c60]Miranda Wei, Pardis Emami Naeini, Franziska Roesner, Tadayoshi Kohno:
Skilled or Gullibleƒ Gender Stereotypes Related to Computer Security and Privacy. SP 2023: 2050-2067 - [c58]Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, Franziska Roesner:
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality. USENIX Security Symposium 2023: 911-928 - [c57]Christina Yeung, Umar Iqbal, Yekaterina Tsipenyuk O'Neil, Tadayoshi Kohno, Franziska Roesner:
Online Advertising in Ukraine and Russia During the 2022 Russian Invasion. WWW 2023: 2787-2796 - [i14]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Franziska Roesner, Kurt Thomas:
"There's so much responsibility on users right now: " Expert Advice for Staying Safer From Hate and Harassment. CoRR abs/2302.08057 (2023) - [i13]Umar Iqbal, Tadayoshi Kohno, Franziska Roesner:
LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins. CoRR abs/2309.10254 (2023) - 2022
- [c55]Kentrell Owens, Johanna Gunawan, David R. Choffnes, Pardis Emami Naeini, Tadayoshi Kohno, Franziska Roesner:
Exploring Deceptive Design Patterns in Voice Interfaces. EuroUSEC 2022: 64-78 - [c54]Eric Zeng, Rachel McAmis, Tadayoshi Kohno, Franziska Roesner:
What factors affect targeting and bids in online advertising?: a field measurement study. IMC 2022: 210-229 - [c52]Miranda Wei, Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled Surveillance and Control in Intimate Partner and Parent-Child Relationships. SOUPS @ USENIX Security Symposium 2022: 447-462 - [c50]Kentrell Owens, Anita Alem, Franziska Roesner, Tadayoshi Kohno:
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives. USENIX Security Symposium 2022: 4077-4094 - 2021
- [c49]Eric Zeng, Tadayoshi Kohno, Franziska Roesner:
What Makes a "Bad" Ad? User Perceptions of Problematic Online Advertising. CHI 2021: 361:1-361:24 - [c48]Eric Zeng, Miranda Wei, Theo Gregersen, Tadayoshi Kohno, Franziska Roesner:
Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. elections. Internet Measurement Conference 2021: 507-525 - [c46]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. SOUPS @ USENIX Security Symposium 2021: 695-714 - [i9]Pardis Emami Naeini, Tiona Francisco, Tadayoshi Kohno, Franziska Roesner:
Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. CoRR abs/2106.05227 (2021) - 2020
- [j7]Shrirang Mare, Franziska Roesner, Tadayoshi Kohno:
Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proc. Priv. Enhancing Technol. 2020(2): 436-458 (2020) - [i7]Lucy Simko, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. CoRR abs/2005.06056 (2020) - [i5]Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno:
COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. CoRR abs/2012.01553 (2020) - 2019
- [c39]Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Secure Multi-User Content Sharing for Augmented Reality Applications. USENIX Security Symposium 2019: 141-158 - [c37]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
Enabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions. HotMobile 2019: 81-86 - [c36]Shrirang Mare, Logan Girvin, Franziska Roesner, Tadayoshi Kohno:
Consumer Smart Homes: Where We Are and Where We Need to Go. HotMobile 2019: 117-122 - 2018
- [j6]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Arya: Operating System Support for Securely Augmenting Reality. IEEE Secur. Priv. 16(1): 44-53 (2018) - [c35]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Towards Security and Privacy for Multi-user Augmented Reality: Foundations with End Users. IEEE Symposium on Security and Privacy 2018: 392-408 - [c34]Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, Tadayoshi Kohno:
Computer Security and Privacy for Refugees in the United States. IEEE Symposium on Security and Privacy 2018: 409-423 - [i2]Stefano Baldassi, Tadayoshi Kohno, Franziska Roesner, Moqian Tian:
Challenges and New Directions in Augmented Reality, Computer Security, and Neuroscience - Part 1: Risks to Sensation and Perception. CoRR abs/1806.10557 (2018) - 2017
- [c33]Ada Lerner, Tadayoshi Kohno, Franziska Roesner:
Rewriting History: Changing the Archived Web from the Present. CCS 2017: 1741-1755 - [c30]Anna Kornfeld Simpson, Franziska Roesner, Tadayoshi Kohno:
Securing vulnerable home IoT devices with an in-hub security manager. PerCom Workshops 2017: 551-556 - [c28]Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner:
Securing Augmented Reality Output. IEEE Symposium on Security and Privacy 2017: 320-337 - [c25]Paul Vines, Franziska Roesner, Tadayoshi Kohno:
Exploring ADINT: Using Ad Targeting for Surveillance on a Budget - or - How Alice Can Buy Ads to Track Bob. WPES@CCS 2017: 153-164 - 2016
- [j3]Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Excavating Web Trackers Using Web Archaeology. login Usenix Mag. 41(4) (2016) - [c20]Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard J. Anderson, Franziska Roesner, Tadayoshi Kohno:
Computer Security for Data Collection Technologies. ICTD 2016: 2 - [c19]Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, Franziska Roesner:
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. USENIX Security Symposium 2016 - [c18]Kiron Lebeck, Tadayoshi Kohno, Franziska Roesner:
How to Safely Augment Reality: Challenges and Directions. HotMobile 2016: 45-50 - 2015
- [c17]Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno:
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. Financial Cryptography Workshops 2015: 94-111 - [c15]Adam Lerner, Alisha Saxena, Kirk Ouimet, Ben Turley, Anthony Vance, Tadayoshi Kohno, Franziska Roesner:
Analyzing the Use of Quick Response Codes in the Wild. MobiSys 2015: 359-374 - 2014
- [j2]Franziska Roesner, Tadayoshi Kohno, David Molnar:
Security and privacy for augmented reality systems. Commun. ACM 57(4): 88-96 (2014) - [c12]Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang:
World-Driven Access Control for Continuous Sensing. CCS 2014: 1169-1181 - [c11]Franziska Roesner, Brian T. Gill, Tadayoshi Kohno:
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages. Financial Cryptography 2014: 64-76 - [c10]Franziska Roesner, Tadayoshi Kohno, Tamara Denning, Ryan Calo, Bryce Clayton Newell:
Augmented reality: hard problems of law and policy. UbiComp Adjunct 2014: 1283-1288 - 2013
- [c9]Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - [c8]Franziska Roesner, Tadayoshi Kohno:
Securing Embedded User Interfaces: Android and Beyond. USENIX Security Symposium 2013: 97-112 - 2012
- [j1]Franziska Roesner, Christopher Rovillos, Tadayoshi Kohno, David Wetherall:
ShareMeNot: Balancing Privacy and Functionality of Third-Party Social Widgets. login Usenix Mag. 37(4) (2012) - [c7]Franziska Roesner, Tadayoshi Kohno, David Wetherall:
Detecting and Defending Against Third-Party Tracking on the Web. NSDI 2012: 155-168 - [c6]Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. IEEE Symposium on Security and Privacy 2012: 224-238 - [c5]Franziska Roesner, James Fogarty, Tadayoshi Kohno:
User interface toolkit mechanisms for securing interface elements. UIST 2012: 239-250 - 2011
- [c4]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - 2010
- [c3]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 01:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint