Symposium on Usable Security and Privacy (USEC) 2025 Accepted Papers

View the detailed program page to learn when each paper will be presented during the upcoming event.

“Do We Call Them That? Absolutely Not.”: Juxtaposing...

Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Luca Favaro...

More Details

“I’m 73, you can’t expect me to have...

Ashley Sheil (Munster Technological University), Jacob Camilleri (Munster Technological University), Michelle O Keeffe (Munster...

More Details

A Field Study to Uncover and a Tool...

Leon Kersten (Eindhoven University of Technology), Kim Beelen (Eindhoven University of Technology), Emmanuele Zambon...

More Details

Can a Cybersecurity Question Answering Assistant Help Change...

Lea Duesterwald (Carnegie Mellon University), Ian Yang (Carnegie Mellon University), Norman Sadeh (Carnegie Mellon...

More Details

Evaluating LLMs Towards Automated Assessment of Privacy Policy...

Keika Mori (Deloitte Tohmatsu Cyber LLC, Waseda University), Daiki Ito (Deloitte Tohmatsu Cyber LLC),...

More Details

Modeling End-User Affective Discomfort With Mobile App Permissions...

Yuxi Wu (Georgia Institute of Technology and Northeastern University), Jacob Logas (Georgia Institute of...

More Details

On-demand RFID: Improving Privacy, Security, and User Trust...

Youngwook Do (JPMorganChase and Georgia Institute of Technology), Tingyu Cheng (Georgia Institute of Technology...

More Details

Security Advice on Content Filtering and Circumvention for...

Ran Elgedawy (The University of Tennessee, Knoxville), John Sadik (The University of Tennessee, Knoxville),...

More Details

Throwaway Accounts and Moderation on Reddit

Cheng Guo (Clemson University), Kelly Caine (Clemson University)

More Details

Understanding Influences on SMS Phishing Detection: User Behavior,...

Daniel Timko (California State University San Marcos), Daniel Hernandez Castillo (California State University San...

More Details

Understanding reCAPTCHAv2 via a Large-Scale Live User Study

Andrew Searles (University of California Irvine), Renascence Tarafder Prapty (University of California Irvine), Gene...

More Details

User Comprehension and Comfort with Eye-Tracking and Hand-Tracking...

Kaiming Cheng (University of Washington), Mattea Sim (Indiana University), Tadayoshi Kohno (University of Washington),...

More Details

Victim-Centred Abuse Investigations and Defenses for Social Media...

Zaid Hakami (Florida International University and Jazan University), Ashfaq Ali Shafin (Florida International University),...

More Details

Vision: Comparison of AI-assisted Policy Development Between Professionals...

Rishika Thorat (Purdue University), Tatiana Ringenberg (Purdue University)

More Details

Vision: Retiring Scenarios — Enabling Ecologically Valid Measurement...

Oliver D. Reithmaier (Leibniz University Hannover), Thorsten Thiel (Atmina Solutions), Anne Vonderheide (Leibniz University...

More Details

Vision: The Price Should Be Right: Exploring User...

Jacob Hopkins (Texas A&M University - Corpus Christi), Carlos Rubio-Medrano (Texas A&M University -...

More Details

Vision: Towards True User-Centric Design for Digital Identity...

Yorick Last (Paderborn University), Patricia Arias Cabarcos (Paderborn University)

More Details

What Makes Phishing Simulation Campaigns (Un)Acceptable? A Vignette...

Jasmin Schwab (German Aerospace Center (DLR)), Alexander Nussbaum (University of the Bundeswehr Munich), Anastasia...

More Details