💾 Archived View for bogwonch.smol.pub › bibliography captured on 2024-06-16 at 12:10:14. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2021-11-30)
-=-=-=-=-=-=-
Occasionally my research gets published. BibTeX entries for all my papers are bellow. If you would like to read any of them do send me an email, and I will happily send you a copy (or at least the PDF).
@InProceedings{hallett-2014-towards, author = {Joseph Hallett and David Aspinall}, title = {Towards an Authorization Framework for App Security Checking}, booktitle = {{ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems}}, year = 2014 } @Misc{hallett-2015-using, author = {Joseph Hallett and David Aspinall}, title = {Using Authorization Logic to Capture User Policies in Mobile Ecosystems}, howpublished = {Poster at the {Symposium On Usable Privacy and Security}}, year = 2015 } @InProceedings{hallett-2016-apppal, author = {Joseph Hallett and David Aspinall}, title = {{AppPAL} for {A}ndroid: Capturing and Checking Mobile App Policies}, booktitle = {{International Symposium on Engineering Secure Software and Systems}}, year = 2016 } @InProceedings{hallett-2017-capturing, author = {Joseph Hallett and David Aspinall}, title = {Capturing Policies for {BYOD}}, booktitle = {{IFIP Information Security Conference \& Privacy Conference}}, year = 2017 } @InProceedings{hallett-2017-common, author = {Joseph Hallett and David Aspinall}, title = {Common Concerns in {BYOD} Policies}, booktitle = {{Innovations in Mobile Privacy \& Security}}, year = 2017 } @PhdThesis{hallett-2017-phd, author = {Joseph Hallett}, title = {Capturing Mobile Security Policies Precisely}, school = {Laboratory for the Foundations of Computer Science, School of Informatics, University of Edinburgh}, year = 2017 } @InProceedings{hallett-2018-mirror, author = {Joseph Hallett and Robert Larson and Awais Rashid}, title = {Mirror, Mirror On the Wall: {W}hat are we Teaching Them All? {C}haracterising the Focus of Cybersecurity Curricular Frameworks}, booktitle = {{USENIX} ASE}, year = 2018 } @InProceedings{hallett-2018-evolve, author = {Joseph Hallett}, title = {How can we evolve cyber physical security policies to automatically manage changing threats?}, booktitle = {{USENIX} Summit on Hot Topics in Security}, year = 2018, address = {Baltimore}, url = {https://www.usenix.org/conference/hotsec18/presentation/hallett} } @InProceedings{patnaik-2019-usability, author = {Nikhil Patnaik and Joseph Hallett and Awais Rashid}, title = {Usability Smells: An Analysis of Developers' Struggle With Crypto Libraries}, booktitle = {Symposium on Usable Privacy and Security}, year = 2019, address = {Santa Clara}} @InProceedings{hallett-2019-so, author = {Joseph Hallett and Awais Rashid}, booktitle = {Workshop on Security Information Workers}, title = {So, tell me what you know, what you really really know: Identifying the knowledge gaps of future security information workers}, year = 2019, address = {Santa Clara}} @Misc{shreeve-2019-cyber, author = {Benjamin Shreeve and Joseph Hallett and Richard Atkins and Awais Rashid}, title = {Cyber Security Awareness Via Gamification: Lessons Learned From Decisions \& Disruptions}, howpublished = {Poster at the Symposium on Usable Privacy and Security}, year = 2019} @Article{pencheva-2019-bringing, author = {Denny Pencheva and Joseph Hallett and Awais Rashid}, title = {Bringing Cyber To School: Integrating Cybersecurity Into Secondary School Education}, journal = {IEEE Security \& Privacy}, year = 2019} @Article{linden-2020-stackoverflow, author = {Dirk Van Der Linden and Emma J Williams and Joseph Hallett and Awais Rashid}, title = {The impact of surface features on choice of (in)secure answers by {Stackoverflow} readers}, year = 2020, journal = {IEEE Transaction on Software Engineering} } @Article{shreeve-2020-bluehead, author = {Benjamin Shreeve and Joseph Hallett and Matthew Edwards and Pauline Anthonysamy and Sylvain Frey and Awais Rashid}, title = {``So if {M}r {B}lue {H}ead here clicks the link\ldots'' {R}isk thinking in cyber security decision making}, journal = {ACM Transactions on Privacy and Security (TOPS)}, year = 2020, } @Article{shreeve-2020-best-laid, author={Benjamin Shreeve and Joseph Hallett and Matthew Edwards and Kopo M. Ramokapane and Richard Atkins and Awais Rashid}, title = {The best laid plans or lack thereof: Security decision-making of different stakeholder groups}, journal = {IEEE Transactions on Software Engineering (TSE)}, year = 2020} @inproceedings{hallett-2021-do-this, author = {Joseph Hallett and Nikhil Patnaik and Benjamin Shreeve and Awais Rashid}, title = {``{D}o this! {D}o that!, {A}nd nothing will happen" {D}o specifications lead to securely stored passwords?}, booktitle = {43rd {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2021, Madrid, Spain, 22-30 May 2021}, pages = {486--498}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICSE43902.2021.00053}, doi = {10.1109/ICSE43902.2021.00053} } @InProceedings{chowdhury-2021-developers, author = {Partha Das Chowdhury and Joseph Hallett and Nikhil Patnaik and Mohammad Tahaei and Awais Rashid}, title = {Developers are neither enemies nor users: they are collaborators}, booktitle = {IEEE SecDev 2021}, year = 2021, publisher = {IEEE Computer Society}, }