Follow
Maximilian Golla
Maximilian Golla
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
USENIX Security Symposium (SSYM), 255-272, 2018
2572018
On the Accuracy of Password Strength Meters
M Golla, M Dürmuth
Conference on Computer and Communications Security (CCS), 1567-1582, 2018
1072018
"What was that site doing with my Facebook password?" Designing Password-Reuse Notifications
M Golla, M Wei, J Hainline, L Filipe, M Dürmuth, E Redmiles, B Ur
Conference on Computer and Communications Security (CCS), 1549--1566, 2018
712018
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
Symposium on Security and Privacy (SP), 286-303, 2020
652020
Exploring Accidental Triggers of Smart Speakers
L Schönherr, M Golla, T Eisenhofer, J Wiele, D Kolossa, T Holz
Computer Speech & Language, 101328, 2021
59*2021
On the Security of Cracking-Resistant Password Vaults
M Golla, B Beuscher, M Dürmuth
Conference on Computer and Communications Security (CCS), 1230-1241, 2016
492016
Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google’s My Activity
FM Farke, DG Balash, M Golla, M Dürmuth, AJ Aviv
USENIX Security Symposium (SSYM), 483-500, 2021
372021
Reasoning Analytically About Password-Cracking Software
E Liu, A Nakanishi, M Golla, D Cash, B Ur
Symposium on Security and Privacy (SP), 1272-1289, 2019
342019
“It’s Stored, Hopefully, on an Encrypted Server”: Mitigating Users’ Misconceptions About FIDO2 Biometric WebAuthn
L Lassak, A Hildebrandt, M Golla, B Ur
USENIX Security Symposium (SSYM), 91-108, 2021
332021
Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns
M Golla, G Ho, M Lohmus, M Pulluri, EM Redmiles
USENIX Security Symposium (SSYM), 109-126, 2021
322021
Towards Implicit Visual Memory-Based Authentication
C Castelluccia, M Dürmuth, M Golla, F Deniz
Network and Distributed System Security Symposium (NDSS), 2017
312017
Work in Progress: A Comparative Long-Term Study of Fallback Authentication
P Markert, M Golla, E Stobert, M Dürmuth
Workshop on Usable Security and Privacy (USEC), 2019
18*2019
On the Security of Smartphone Unlock PINs
P Markert, DV Bailey, M Golla, M Dürmuth, AJ Aviv
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-36, 2021
172021
"Will Any Password Do?" Exploring Rate-Limiting on the Web
M Golla, T Schnitzler, M Dürmuth
Who Are You?! Adventures in Authentication (WAY), 2018
14*2018
EmojiAuth: Quantifying the Security of Emoji-based Authentication
M Golla, D Detering, M Dürmuth
Workshop on Usable Security (USEC), 2017
132017
Work in Progress: On the In-Accuracy and Influence of Android Pattern Strength Meters
M Golla, J Rimkus, AJ Aviv, M Dürmuth
Workshop on Usable Security and Privacy (USEC), 2019
11*2019
Analyzing 4 Million Real-World Personal Knowledge Questions (Short Paper)
M Golla, M Dürmuth
International Conference on Passwords (PASSWORDS), 39-44, 2015
102015
"As soon as it's a risk, I want to require MFA": How Administrators Configure Risk-based Authentication
P Markert, T Schnitzler, M Golla, M Dürmuth
Symposium on Usable Privacy and Security (SOUPS), 483-501, 2022
82022
"We may share the number of diaper changes": A Privacy and Security Analysis of Mobile Child Care Applications
M Gruber, C Höfig, M Golla, T Urban, M Große-Kampmann
Privacy Enhancing Technologies Symposium (PETS), 394-414, 2022
82022
"I want my money back!" Limiting Online Password-Guessing Financially
M Golla, DV Bailey, M Dürmuth
Who Are You?! Adventures in Authentication (WAY), 2017
8*2017
The system can't perform the operation now. Try again later.
Articles 1–20