Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| public:research:main [2025-09-08 08:29] – [Randomness statistical testing of TRNG and PRNG] Marek Sýs | public:research:main [2025-10-12 19:13] (current) – [Usable security] Petr Švenda | ||
|---|---|---|---|
| Line 422: | Line 422: | ||
| ===== Side-channel analysis ===== | ===== Side-channel analysis ===== | ||
| - | {{ : | + | {{ : |
| Line 435: | Line 435: | ||
| **Contact: Lukasz Chmielewski < | **Contact: Lukasz Chmielewski < | ||
| - | **More information, | + | **More information, |
| - | * JCAlgTest | + | * Attack_Kyber_ACNS2024 |
| + | | ||
| **Involved people: | **Involved people: | ||
| * [[https:// | * [[https:// | ||
| - | * Milan Šorf ? | + | * [[https:// |
| - | + | | |
| - | **Past members:** xxx 2019-2022 | + | * Master students: Tomáš Jaroš, Michal Masrna, and Oliver Bajus |
| + | | ||
| + | | ||
| + | |||
| + | **Past members:** master students: Daud Naveed, Lubomír Hrbáček, and Radomír Mann. | ||
| | | ||
| ** Selected publications: | ** Selected publications: | ||
| Line 453: | Line 458: | ||
| ---- | ---- | ||
| - | ---- | ||
| - | ---- | + | ===== Usable security ===== |
| - | ---- | + | {{ : |
| - | ====== Archived research | + | Our usable security |
| - | <callout type=" | + | |
| - | </ | + | |
| - | < | + | We started our first significant project in the area of usable security in 2014, in cooperation with three industrial partners, Faculty of social studies, and Faculty of law. The project aimed to identify influences that make users change their risky behavior to more secure one. Four sets of experiments ran in cooperation with commercial companies (ESET, Netsuite and SodatSW). Every experiment targeted a different target group and used a different technique (warning, security dialogue, e-learning, user-friendly password recovery, etc.). This project was unique for the cooperation of three different faculties of MU and three commercial companies, who wanted to understand their users better and increase their products' |
| - | |||
| - | ===== Social and behavioral aspects of security ===== | ||
| - | |||
| - | Our end-user oriented usable security projects focus on computer security and interactions of systems with end-users. We started in our first significant project in this area in 2014, in cooperation with three industrial partners, Faculty of social studies, and Faculty of law. | ||
| - | The project aimed to identify influences that make users change their risky behavior to more secure one. Four sets of experiments ran in cooperation with commercial companies (ESET, Netsuite and SodatSW). Every experiment targeted a different target group and used a different technique (warning, security dialogue, e-learning, user-friendly password recovery, etc.). This project was unique for the cooperation of three different faculties of MU and three commercial companies, who wanted to understand their users better and increase their products' | ||
| - | |||
| - | We also finished a project in cooperation with the Faculty of social studies and AHEAD Itec/Monet+ company. It aimed at user testing of selected authentication methods (NFC token, smart card with card reader, fingerprint and PIN code). Results from this project are available here: https:// | ||
| Line 477: | Line 472: | ||
| < | < | ||
| <button icon=" | <button icon=" | ||
| + | < | ||
| - | **Last update: | + | **Last update: |
| - | **Contact: | + | **Contact: |
| **Involved people: | **Involved people: | ||
| - | {{:public: | + | * [[https://www.muni.cz/ |
| * [[https:// | * [[https:// | ||
| - | * [[https:// | + | * [[https:// |
| - | **Former participants: | + | **Former participants: |
| ** Selected publications: | ** Selected publications: | ||
| - | + | * [2025] Galanska, K, Kruzikova, A., Matyas, V., Pibilota, M. M., and Just, M. From Reports to Actions: Bridging the Customer Usability Gap in Penetration Testing. IEEE ACCESS. IEEE, 2025, vol. 13, No 2025, p. 73975-73986. ISSN 2169-3536. Available from: https:// | |
| - | * [2018] Stavova, V., Dedkova, L., Ukrop, M., and Matyas, V. (in press). A large-scale comparative study of beta testers | + | * [2024] Kruzikova, A., Di Campi, M., Cerny, T., and Matyas, V. No Thumbs Up in Pictures! Experimental Fingerprint Forgery for Inexperienced Impostors. IEEE ACCESS, 2024, vol. 12, No 131297, p. 131297-131312. ISSN 2169-3536. Available from: https:// |
| - | * [2017] Stavova, V., Matyas, V., Just M. and Ukrop, M.:Factors Influencing the Purchase | + | * [2024] Kruzikova, A., Muzik, M., Knapova, L., Dedkova, L., Smahel, D., and Matyas, V. Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction. Computers & Security. 2024, vol. 138, No 103667, p. 1-11. ISSN 0167-4048. Available from: https:// |
| + | * [2022] Matyas, V., Malinka, K., Kraus, L., Knapova, L., and Kruzikova, A. Even if users do not read security directives, their behavior is not so catastrophic. Communications of the ACM. New York, NY, USA: ACM, 2022, vol. 65, No 1, p. 37-40. ISSN 0001-0782. Available from: https:// | ||
| + | * [2022] Smahel, D., Dedkova, L., Kraus, L., Matyas, V., and Bukacova, V. Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences. Human Behavior and Emerging Technologies. 2022, vol. 2022, No 1230344, p. 1-12. ISSN 2578-1863. Available from: https:// | ||
| + | * [2022] Kruzikova, A., Knapova, L., Smahel, D., Dedkova, L. and Matyas, V. Usable and secure? User perception | ||
| + | * [2020] Ukrop, M., Kraus, L., and Matyas, V. Will You Trust This TLS Certificate? | ||
| + | * [2018] Stavova, V., Dedkova, L., Ukrop, M., and Matyas, V. A large-scale comparative study of beta testers and standard users. Communications of the ACM. ACM, 2018, 64–71. | ||
| * [2016] Stavova, V., Matyas, V. and Just M.: Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms, WISTP 2016. | * [2016] Stavova, V., Matyas, V. and Just M.: Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms, WISTP 2016. | ||
| * [2016] Stavova, V., Matyas, V. and Just M.: On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications, | * [2016] Stavova, V., Matyas, V. and Just M.: On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications, | ||
| * [2015] {{public: | * [2015] {{public: | ||
| + | |||
| + | </ | ||
| + | ---- | ||
| + | |||
| ---- | ---- | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ====== Archived research projects in CRoCS laboratory ====== | ||
| + | <callout type=" | ||
| + | </ | ||
| + | |||
| + | < | ||
| + | |||
| ===== Disk encryption ===== | ===== Disk encryption ===== | ||
| {{ : | {{ : | ||