mmazurek @ bsky.social Profile
mmazurek @ bsky.social

@mmazurek_

Followers
843
Following
2K
Media
30
Statuses
811

not here anymore.

Joined March 2020
Don't wanna be here? Send us removal request.
@mmazurek_
mmazurek @ bsky.social
2 years
In general though, I don't really care to support this platform anymore; I have a few bluesky invites if anyone wants one.
3
0
2
@mmazurek_
mmazurek @ bsky.social
2 years
Here only to congratulate the immensely deserving @kfulton121!.
@SOUPSConference
Symposium on Usable Privacy and Security
2 years
This year’s John John Karat Usable Privacy and Security Student Research Award goes to Kelsey Fulton (@kfulton121.) from the University of Maryland, College Park. Congratulations, Kelsey! Well deserved! Learn more about their work at
Tweet media one
1
1
4
@mmazurek_
mmazurek @ bsky.social
2 years
RT @royaensafi: Best Practical award 🏅. The Best Practical Paper Award goes to the authors of the paper "How the Great Firewall of China De….
0
9
0
@mmazurek_
mmazurek @ bsky.social
2 years
RT @PET_Symposium: If you're not joining us in Lausanne, you can watch online: #pets23. If you want to ask question….
0
3
0
@mmazurek_
mmazurek @ bsky.social
2 years
RT @PET_Symposium: Everybody ready? We've got a fantastic program for you. #pets23.
0
4
0
@mmazurek_
mmazurek @ bsky.social
2 years
Mostly too busy running around #pets23 to tweet but super excited to see so many wonderful colleagues and great talks. Huge thanks to the (too many to name) people who helped make this all happen!.
0
2
13
@mmazurek_
mmazurek @ bsky.social
2 years
This is a @UMDResearch IRB (and specifically Joe Smith) appreciation tweet. It's such a pleasure to work with knowledgeable, thoughtful people who always take the time to answer questions and help us figure out how to handle complicated situations.
0
0
10
@mmazurek_
mmazurek @ bsky.social
2 years
RT @LauraEdelson2: California's CPPA is hiring a Technologist Student Intern and a Usability and Design Student Intern. These roles look li….
0
9
0
@mmazurek_
mmazurek @ bsky.social
2 years
RT @Caroline_Bartma: no one: . scientist: you guys i did some great science! i'm so excited!.scientist: I'm going to print it on an ENORMOU….
0
2K
0
@mmazurek_
mmazurek @ bsky.social
2 years
Congrats Dr. @kfulton121 who passed their defense with flying colors this morning. Love to celebrate the culmination of so much hard work!.
0
2
23
@mmazurek_
mmazurek @ bsky.social
2 years
RT @CalPrivacy: CPPA is hiring a technologist intern! If you are a graduate student interested in a paid internship focused on emerging tec….
0
14
0
@mmazurek_
mmazurek @ bsky.social
2 years
RT @_oakgul: The Workshop on Security Information Workers (WSIW) is happening again this year! We take papers up to 6 pages but shorter sub….
0
4
0
@mmazurek_
mmazurek @ bsky.social
2 years
RT @haldaume3: @trails_ai Postdoctoral Fellowship calls:.UMD: GW: Successful candidates wil….
0
9
0
@mmazurek_
mmazurek @ bsky.social
2 years
In this paper, we argue that an old idea, asking forgiveness not permission, can be helpful in upholding policies that derive from interpersonal norms -- it's not perfect security, but in some situations it can be better than the alternative.
0
0
0
@mmazurek_
mmazurek @ bsky.social
2 years
In IoT, as in other contexts, users can't or won't set up and maintain complex access policies, defaulting to least secure options like sharing one account across the household.
1
0
0
@mmazurek_
mmazurek @ bsky.social
2 years
Last but not least, after lunch today Nathan Malkin will talk about optimistic access control for smart homes (with Alan Luo, @juliopovedacs). This paper was a fun flashback to my grad school days (access control!).
1
1
1
@mmazurek_
mmazurek @ bsky.social
2 years
Phoebe killed it in her first-ever conference talk, about "everyday" misuse of home IoT devices by friends, family, and visitors. We attempted to measure what kinds of misuse occur and how prevalent they are.
@AdamBatesOrg
Adam Bates Yuile
2 years
Today at @IEEESSP, 11am Bayview AB -- we've seen the esoteric IoT attacks (light bulb botnets, laser voice commands). what do *real world* violations look like? Find out when Phoebe Moh presents our (award-winning) paper, "Characterizing Misuse and Snooping in Home IoT Devices".
0
0
7
@mmazurek_
mmazurek @ bsky.social
2 years
RT @AdamBatesOrg: Today at @IEEESSP, 11am Bayview AB -- we've seen the esoteric IoT attacks (light bulb botnets, laser voice commands). w….
0
3
0
@mmazurek_
mmazurek @ bsky.social
2 years
RT @AdamBatesOrg: Tomorrow morning in Session 9C (9am, Bayview AB) — system auditing research may not be sexy, but it has *exploded* since….
0
6
0