The following are research publications on computer security that have been authored or co-authored by CSRL members.
Conferences
If-This-Then-Allow-That (to phone home): A trigger-based network policy enforcement framework for smart homes
Anthony Tam, Furkan Alaca, David Barrera.
International Symposium on Foundations & Practice of Security (FPS) 2022, December 12-14, Ottawa, ON.
Authors' copy (PDF)Device fingerprinting for augmenting web authentication: Classification and analysis of methods
Furkan Alaca, P. C. van Oorschot.
Annual Computer Security Applications Conference (ACSAC) 2016, December 5-9, Los Angeles, CA.
Authors' copy (PDF) ACM Digital LibraryJournals
Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes
Furkan Alaca, AbdelRahman Abdou, P. C. van Oorschot.
IEEE Transactions on Dependable and Secure Computing (TDSC) 18(2):534-549, March-April 2021.
Preprint: arXiv.1708.01706 [cs.CR] IEEE XploreComparative analysis and framework evaluating web single sign-on systems
Furkan Alaca, P. C. van Oorschot.
ACM Computing Surveys, 53 (5) 112:1-112:34, September 2020.
Preprint: arXiv:1805.00094 [cs.CR] ACM Digital LibraryWhy phishing still works: User strategies for combating phishing attacks
Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson.
International Journal of Human-Computer Studies (Elsevier), 82:69-82, 2015.
Authors' copy (PDF) ScienceDirect