Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| public:research:main [2025-10-04 09:58] – Václav Matyáš | public:research:main [2025-10-12 19:13] (current) – [Usable security] Petr Švenda | ||
|---|---|---|---|
| Line 422: | Line 422: | ||
| ===== Side-channel analysis ===== | ===== Side-channel analysis ===== | ||
| - | {{ : | + | {{ : |
| Line 457: | Line 457: | ||
| ---- | ---- | ||
| - | |||
| - | ---- | ||
| - | |||
| - | ---- | ||
| - | |||
| - | ---- | ||
| - | |||
| - | ====== Archived research projects in CRoCS laboratory ====== | ||
| - | <callout type=" | ||
| - | </ | ||
| - | |||
| - | < | ||
| ===== Usable security ===== | ===== Usable security ===== | ||
| + | |||
| + | {{ : | ||
| Our usable security projects focus on computer security and interactions of systems with end-users (true end-users as well as IT professionals using a particular system for their job). We are currently investigating factors influencing usability of reports from penetration testing, figuring out what those that use these reports can and cannot really find out from pentesting reports - and how to improve that. We also examine usability of AI-assisted pentesting report writing. | Our usable security projects focus on computer security and interactions of systems with end-users (true end-users as well as IT professionals using a particular system for their job). We are currently investigating factors influencing usability of reports from penetration testing, figuring out what those that use these reports can and cannot really find out from pentesting reports - and how to improve that. We also examine usability of AI-assisted pentesting report writing. | ||
| - | We started our first significant project in the area of usable security in 2014, in cooperation with three industrial partners, Faculty of social studies, and Faculty of law. The project aimed to identify influences that make users change their risky behavior to more secure one. Four sets of experiments ran in cooperation with commercial companies (ESET, Netsuite and SodatSW). Every experiment targeted a different target group and used a different technique (warning, security dialogue, e-learning, user-friendly password recovery, etc.). This project was unique for the cooperation of three different faculties of MU and three commercial companies, who wanted to understand their users better and increase their products' | + | We started our first significant project in the area of usable security in 2014, in cooperation with three industrial partners, Faculty of social studies, and Faculty of law. The project aimed to identify influences that make users change their risky behavior to more secure one. Four sets of experiments ran in cooperation with commercial companies (ESET, Netsuite and SodatSW). Every experiment targeted a different target group and used a different technique (warning, security dialogue, e-learning, user-friendly password recovery, etc.). This project was unique for the cooperation of three different faculties of MU and three commercial companies, who wanted to understand their users better and increase their products' |
| Line 481: | Line 472: | ||
| < | < | ||
| <button icon=" | <button icon=" | ||
| + | < | ||
| Line 488: | Line 480: | ||
| **Involved people: | **Involved people: | ||
| - | {{: | ||
| - | |||
| * [[https:// | * [[https:// | ||
| * [[https:// | * [[https:// | ||
| Line 508: | Line 498: | ||
| * [2016] Stavova, V., Matyas, V. and Just M.: On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications, | * [2016] Stavova, V., Matyas, V. and Just M.: On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications, | ||
| * [2015] {{public: | * [2015] {{public: | ||
| + | |||
| + | </ | ||
| + | ---- | ||
| + | |||
| ---- | ---- | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ---- | ||
| + | |||
| + | ====== Archived research projects in CRoCS laboratory ====== | ||
| + | <callout type=" | ||
| + | </ | ||
| + | |||
| + | < | ||
| + | |||
| ===== Disk encryption ===== | ===== Disk encryption ===== | ||
| {{ : | {{ : | ||