The following are research publications on computer security that have been authored or co-authored by CSRL members.


If-This-Then-Allow-That (to phone home): A trigger-based network policy enforcement framework for smart homes

Anthony Tam, Furkan Alaca, David Barrera.

International Symposium on Foundations & Practice of Security (FPS) 2022, December 12-14, Ottawa, ON.

Authors' copy (PDF)

Device fingerprinting for augmenting web authentication: Classification and analysis of methods

Furkan Alaca, P. C. van Oorschot.

Annual Computer Security Applications Conference (ACSAC) 2016, December 5-9, Los Angeles, CA.

Authors' copy (PDF) ACM Digital Library


Comparative analysis and framework evaluating mimicry-resistant and invisible web authentication schemes

Furkan Alaca, AbdelRahman Abdou, P. C. van Oorschot.

IEEE Transactions on Dependable and Secure Computing (TDSC) 18(2):534-549, March-April 2021.

Preprint: arXiv.1708.01706 [cs.CR] IEEE Xplore

Comparative analysis and framework evaluating web single sign-on systems

Furkan Alaca, P. C. van Oorschot.

ACM Computing Surveys, 53 (5) 112:1-112:34, September 2020.

Preprint: arXiv:1805.00094 [cs.CR] ACM Digital Library

Why phishing still works: User strategies for combating phishing attacks

Mohamed Alsharnouby, Furkan Alaca, Sonia Chiasson.

International Journal of Human-Computer Studies (Elsevier), 82:69-82, 2015.

Authors' copy (PDF) ScienceDirect