Tim Vidas
Title
Cited by
Cited by
Year
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
4442012
How does your password measure up? the effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2862012
All Your Droid Are Belong to Us: A Survey of Current Android Attacks.
T Vidas, D Votipka, N Christin
Woot, 81-90, 2011
2172011
Evading android runtime analysis via sandbox detection
T Vidas, N Christin
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
2122014
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2122013
Toward a general collection methodology for Android devices
T Vidas, C Zhang, N Christin
digital investigation 8, S14-S24, 2011
1922011
Curbing android permission creep
T Vidas, N Christin, L Cranor
Proceedings of the Web 2, 91-96, 2011
1912011
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 1-20, 2012
1462012
Efficient and scalable socware detection in online social networks
MS Rahman, TK Huang, HV Madhyastha, M Faloutsos
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
1092012
Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption
R Bhagavatula, B Ur, K Iacovino, SM Kywe, LF Cranor, M Savvides
Internet Society, 2015
1072015
The current state of access control for smart devices in homes
B Ur, J Jung, S Schechter
Workshop on Home Usable Privacy and Security (HUPS) 29, 209-218, 2013
1072013
QRishing: The susceptibility of smartphone users to QR code phishing attacks
T Vidas, E Owusu, S Wang, C Zeng, LF Cranor, N Christin
International Conference on Financial Cryptography and Data Security, 52-69, 2013
712013
Sweetening android lemon markets: measuring and combating malware in application marketplaces
T Vidas, N Christin
Proceedings of the third ACM conference on Data and application security and …, 2013
652013
It’s all about the Benjamins: Incentivizing users to ignore security advice
N Christin, S Egelman, T Vidas, J Grossklags
Proceedings of IFCA Financial Cryptography 11, 2011
63*2011
A5: Automated analysis of adversarial android applications
T Vidas, J Tan, J Nahata, CL Tan, N Christin, P Tague
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
592014
Empirical analysis of solid state disk data retention when used with contemporary operating systems
C King, T Vidas
digital investigation 8, S111-S117, 2011
482011
Usability of forensics tools: a user study
H Hibshi, T Vidas, L Cranor
2011 Sixth International Conference on IT Security Incident Management and …, 2011
462011
The acquisition and analysis of random access memory
T Vidas
Journal of Digital Forensic Practice 1 (4), 315-323, 2007
462007
OpenLV: Empowering investigators and first-responders in the digital forensics process
T Vidas, B Kaplan, M Geiger
Digital Investigation 11, S45-S53, 2014
172014
Volatile memory acquisition via warm boot memory survivability
T Vidas
2010 43rd Hawaii International Conference on System Sciences, 1-6, 2010
152010
The system can't perform the operation now. Try again later.
Articles 1–20