Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| public:research:main [2025-10-06 08:45] – [Usable security] Petr Švenda | public:research:main [2025-10-12 19:13] (current) – [Usable security] Petr Švenda | ||
|---|---|---|---|
| Line 422: | Line 422: | ||
| ===== Side-channel analysis ===== | ===== Side-channel analysis ===== | ||
| - | {{ : | + | {{ : |
| Line 461: | Line 461: | ||
| ===== Usable security ===== | ===== Usable security ===== | ||
| - | {{ : | + | {{ : |
| Our usable security projects focus on computer security and interactions of systems with end-users (true end-users as well as IT professionals using a particular system for their job). We are currently investigating factors influencing usability of reports from penetration testing, figuring out what those that use these reports can and cannot really find out from pentesting reports - and how to improve that. We also examine usability of AI-assisted pentesting report writing. | Our usable security projects focus on computer security and interactions of systems with end-users (true end-users as well as IT professionals using a particular system for their job). We are currently investigating factors influencing usability of reports from penetration testing, figuring out what those that use these reports can and cannot really find out from pentesting reports - and how to improve that. We also examine usability of AI-assisted pentesting report writing. | ||