| 2025 | "Hello, is this Anna?": Unpacking the Lifecycle of Pig-Butchering Scams. Rajvardhan Oak, Zubair Shafiq |
| 2025 | "TikTok, Do Your Thing": User Reactions to Social Surveillance in the Public Sphere. Meira Gilbert, Miranda Wei, Lindah Kotut |
| 2025 | "We are not Future-ready": Understanding AI Privacy Risks and Existing Mitigation Strategies from the Perspective of AI Developers in Europe. Alexandra Klymenko, Stephen Meisenbacher, Patrick Gage Kelley, Sai Teja Peddinti, Kurt Thomas, Florian Matthes |
| 2025 | "You go now! No trouble!" Understanding the Offboarding Process in Companies from an IT Security Perspective. Christina Detsika, Timo Jagusch, Nora Weidner, Larissa Weir, Florin Martius, Christian Tiefenau |
| 2025 | Adopting AI to Protect Industrial Control Systems: Assessing Challenges and Opportunities from the Operators' Perspective. Clement Fung, Eric Zeng, Lujo Bauer |
| 2025 | Between Court Orders and Platform Policies: Understanding Law Enforcement and Meta Interactions in Addressing Non-Consensual Image Disclosure Abuse. Amna Batool, Kentaro Toyama |
| 2025 | Can You Walk Me Through It? Explainable SMS Phishing Detection using LLM-based Agents. Yizhu Wang, Haoyu Zhai, Chenkai Wang, Qingying Hao, Nick A. Cohen, Roopa Foulger, Jonathan A. Handler, Gang Wang |
| 2025 | Design and Evaluation of Privacy-Preserving Protocols for Agent-Facilitated Mobile Money Services in Kenya. Karen Sowon, Collins W. Munyendo, Lily Klucinec, Eunice Maingi, Gerald Suleh, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye |
| 2025 | Do You See If I See? Investigating Reciprocity in Interpersonal Access-Control Settings (in the U.S.). Nathan Malkin, Alan F. Luo, Evan J. Zhao, Michelle L. Mazurek |
| 2025 | From TOTPs to Security Keys: Studying the Reality of Passwordless FIDO2 Authentication With PIN and Biometrics in a Corporate Environment. Leona Lassak, Nicklas Lindemann, Marvin Kowalewski |
| 2025 | How Predatory Monetization Designs Manifest in Child-Friendly Video Games. Qiurong Song, ZiNan Zhang, Rie Helene (Lindy) Hernandez, Xinning Gui, Yubo Kou |
| 2025 | I never reuse passwords! Development and Validation of a Security and Privacy Social Desirability Scale (SP-SDS) for end users without a background in computer science. Laura Marie Abels, Matthew Smith, Anna-Marie Ortloff |
| 2025 | Integrating Large Language Models into Security Incident Response. Diana Kramer, Lambert Rosique, Ajay Narotam, Elie Bursztein, Patrick Gage Kelley, Kurt Thomas, Allison Woodruff |
| 2025 | Language as Lure: A Naturalistic Study on Pasifika Phishing Susceptibility. Eric Spero, Isa Seow, Lucas Betts, Eddie Fuatimau, Robert Biddle, Danielle M. Lottridge, Giovanni Russello |
| 2025 | Measuring NIST Authentication Standards Compliance by Higher Education Institutions. Noah J. Apthorpe, Boen Beavers, Yan Shvartzshnaider, Brett Frischmann |
| 2025 | Minoritised Ethnic People's Security and Privacy Concerns and Responses towards Essential Online Services. Aunam Quyoum, Mark Wong, Sebati Ghosh, Siamak F. Shahandashti |
| 2025 | Misuse, Misreporting, Misinterpretation of Statistical Methods in Usable Privacy and Security Papers. Jenny Tang, Lujo Bauer, Nicolas Christin |
| 2025 | More than Usability: Differential Access to Digital Security and Privacy. Annalina Buckmann, Jan Magnus Nold, Yasemin Acar, Yixin Zou |
| 2025 | Playing in the Sandbox: A Study on the Usability of Seccomp. Maysara Alhindi, Joseph Hallett |
| 2025 | Replication: "No one can hack my mind" - 10 years later: An update and outlook on experts' and non-experts' security practices and advice. Anna-Marie Ortloff, Jenny Tang, Arthi Arumugam, Daniel Huschina, Lisa Geierhaas, Florin Martius, Luisa Jansen, Kolja von der Twer, Lilly Jungbluth, Matthew Smith |
| 2025 | Safety Perceptions of Generative AI Conversational Agents: Uncovering Perceptual Differences in Trust, Risk, and Fairness. Jan Tolsdorf, Alan F. Luo, Monica Kodwani, Junho Eum, Mahmood Sharif, Michelle L. Mazurek, Adam J. Aviv |
| 2025 | Shiny Shells, Rusty Cores: A Crowdsourced Security Evaluation of Integrated Web Browsers. Gertjan Franken, Pieter Claeys, Tom van Goethem, Lieven Desmet |
| 2025 | Smart Spaces, Private Lives: A Culturally Grounded Examination of Privacy Tensions in Smart Homes. Yara Alsiyat, Yuanhaur Chang, Ning Zhang, Ivan Flechais |
| 2025 | Spy-oT: Understanding How Users Learn to Use Internet of Things Devices For Abusive Purposes. Kieron Ivy Turk, Alice Hutchings |
| 2025 | The more accounts I use, the less I have to think': A Longitudinal Study on the Usability of Password Managers for Novice Users. Patricia Arias Cabarcos, Peter Mayer |
| 2025 | Trust-Enabled Privacy: Social Media Designs to Support Adolescent User Boundary Regulation. JaeWon Kim, Robert Wolfe, Ramya Bhagirathi Subramanian, Mei-Hsuan Lee, Jessica Colnago, Alexis Hiniker |
| 2025 | Twenty-First Symposium on Usable Privacy and Security, SOUPS 2025, Seattle, WA, USA, August 10-12, 2025. Patrick Gage Kelley, Mainack Mondal, Kami Vaniea |
| 2025 | Unpacking the Social and Emotional Dimensions of Security and Privacy User Engagement. Nina Gerber, Verena Zimmermann, Alexandra von Preuschen, Karen Renaud |
| 2025 | User Understandings of Technical Terms in App Privacy Labels. Ishika Keswani, Kerick Walker, Adrian Clement, Eusila Kitur, Nannapas Wonghirundacha, Ryan Aubrey, Vivien Song, Eleanor Birrell |
| 2025 | Victims, Vigilantes, and Advice Givers: An Analysis of Scam-Related Discourse on Reddit. Rajvardhan Oak, Zubair Shafiq |
| 2025 | Youth-Centered GAI Risks (YAIR): A Taxonomy of Generative AI Risks from Empirical Data. Yaman Yu, Yiren Liu, Jacky Zhang, Yun Huang, Yang Wang |