Affiliate Position
- Faculty, Center for an Informed Public
Specialization
- Computer security and privacy for end users of existing and emerging technologies
Biography
Franziska (Franzi) Roesner is an associate professor in the Paul G. Allen School of Computer Science & Engineering at the University of Washington, where she co-directs the Security and Privacy Research Lab. Her research focuses on computer security and privacy for end users of existing and emerging technologies. She is the recipient of an MIT Technology Review "Innovators Under 35" Award, an Emerging Leader Alumni Award from the University of Texas at Austin, a Google Security and Privacy Research Award, and an NSF CAREER Award. She received her PhD from the University of Washington in 2014 and her BS from UT Austin in 2008.
Education
- Ph D, University of Washington, 2014
- MS, University of Washington, 2011
- BS, Computer Science, University of Texas at Austin, 2008
- BA, Plan II Honors Prgram, University of Texas at Austin, 2008
Awards
- Emerging Leader Award - UT Austin College of Natural Sciences, 2017
- Google Security and Privacy Research Award - Google, 2017
- MIT Technology Review Innovator Under 35, 2017
- NSF CAREER Award - National Science Foundation, 2017
- William Chan Memorial Dissertation Award, 2014
- IEEE Security & Privacy Best Practical Paper Award, 2012
Publications and Contributions
-
Conference PaperPrinciples Matter: Integrating an Ethics Intervention into a Computer Security Course (2022)Association for Computing Machinery's Special Interest Group on Computer Science Education (SIGCSE), pp. 474-480
-
Conference PaperInteractions with Potential Mis/Disinformation URLs Among U.S. Users on Facebook, 2017-2019 (2021)FOCI '21: Proceedings of the ACM SIGCOMM 2021 Workshop on Free and Open Communications on the Internet
-
NewspaperKnow the facts: Do social media covid-19 banners help? (2020)Medium
-
White Paper
-
Conference PaperAnalysis of the Susceptibility of Smart Home Programming Interfaces to End User Error (2019)IEEE Workshop on the Internet of Safe Things (SafeThings)(SafeThings’ 19). ACM, New York, NY, USA
-
Conference PaperComputer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors (2019)Proceedings of the 28th USENIX Security Symposium, pp. 89--104
-
Conference ProceedingConsumer Smart Homes: Where We Are and Where We Need to Go (2019)Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, pp. 117--122
-
Journal Article, Academic JournalDefending Against Neural Fake News (2019)arXiv preprint arXiv:1905.12616
-
Conference PaperEnabling Multiple Applications to Simultaneously Augment Reality: Challenges and Directions (2019)Proceedings of the 20th Workshop on Mobile Computing Systems and Applications (HotMobile)
-
Conference PaperSecure Multi-User Content Sharing for Augmented Reality Applications (2019)Proceedings of the 28th USENIX Security Symposium, pp. 141--158
-
Conference PaperWho's In Control?: Interactions In Multi-User Smart Homes (2019)Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 268
-
Journal Article, Academic JournalArya: Operating system support for securely augmenting reality (2018)IEEE Security & Privacy, 16(1), pp. 44--53
-
Journal Article, Academic JournalChallenges and New Directions in Augmented Reality, Computer Security, and Neuroscience--Part 1: Risks to Sensation and Perception (2018)arXiv preprint arXiv:1806.10557
-
Conference ProceedingComputer Security and Privacy for Refugees in the United States (2018)2018 IEEE Symposium on Security and Privacy (SP), pp. 409--423
-
Journal Article, Academic JournalComputer security for data collection technologies (2018)Development engineering, 3(Unknown Issue), pp. 1--11
-
Conference ProceedingTowards security and privacy for multi-user augmented reality: Foundations with end users (2018)2018 IEEE Symposium on Security and Privacy (SP), pp. 392--408
-
Conference ProceedingConfidante: Usable encrypted email: A case study with lawyers and journalists (2017)2017 IEEE European Symposium on Security and Privacy (EuroS\&P), pp. 385--400
-
Conference ProceedingCreative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms (2017)7th $\{$USENIX$\}$ Workshop on Free and Open Communications on the Internet ($\{$FOCI$\}$ 17)
-
Journal Article, Academic JournalDesigning Application Permission Models that Meet User Expectations (2017)IEEE Security \& Privacy, 15(1), pp. 75--79
-
Conference PaperEnd user security and privacy concerns with smart homes (2017)Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 65--80
-
Conference PaperExploring ADINT: Using ad targeting for surveillance on a budget-or-how Alice can buy ads to track Bob (2017)Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, pp. 153--164
-
Conference PaperRewriting history: Changing the archived web from the present (2017)Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1741--1755
-
Conference PaperSecuring augmented reality output (2017)2017 IEEE Symposium on Security and Privacy (SP), pp. 320--337
-
Conference PaperSecuring vulnerable home IoT devices with an in-hub security manager (2017)2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 551--556
-
Conference PaperToys that listen: A study of parents, children, and internet-connected toys (2017)Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 5197--5207
-
Journal Article, Academic JournalUnderstanding and Designing for End Users' Security Expectations (2017)
-
Conference PaperWhen the weakest link is strong: Secure collaboration in the case of the Panama Papers (2017)26th Security Symposium (Security 17), pp. 505--522
-
Conference PaperAudacious: User-driven access control with unmodified operating systems (2016)Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 204--216
-
Conference PaperComputer security and privacy: where human factors meet engineering (2016)Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2015 Symposium
-
Journal Article, Academic JournalExcavating Web Trackers Using Web Archaeology (2016); login:, 41(4)
-
Conference ProceedingHow to safely augment reality: Challenges and directions (2016)Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp. 45--50
-
Journal Article, Academic JournalIndividual versus organizational computer security and privacy concerns in journalism (2016)Proceedings on Privacy Enhancing Technologies, 2016(4), pp. 418--435
-
Conference ProceedingInternet Jones and the raiders of the lost trackers (2016)An archaeological study of web tracking from 1996 to 2016
-
Conference ProceedingLet's Talk Money: Evaluating the Security Challenges of Mobile Money in the Developing World (2016)Proceedings of the 7th Annual Symposium on Computing for Development, pp. 4
-
Managing access by applications to perceptual information (2016)
-
Conference PaperRadiatus: a Shared-Nothing Server-Side Web Architecture (2016)Proceedings of the Seventh ACM Symposium on Cloud Computing, pp. 237--250
-
Conference PaperSensemaking and Storytelling: Network Security Strategies for Collaborative Groups (2016)2016 International Conference on Collaboration Technologies and Systems (CTS), pp. 622--623
-
Conference PaperAnalyzing the use of quick response codes in the wild (2015)Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pp. 359--374
-
Conference PaperCryptographic currencies from a tech-policy perspective: Policy issues and technical directions (2015)International Conference on Financial Cryptography and Data Security, pp. 94--111
-
Technical ReportDisplay leakage and transparent wearable displays: Investigation of risk, root causes, and defenses (2015)
-
Conference PaperInvestigating the computer security practices and needs of journalists (2015)24th Security Symposium (Security 15), pp. 399--414
-
Technical ReportRethinking Mobile Money Security for Developing Regions (2015)
-
Conference PaperThe privacy-utility tradeoff for remotely teleoperated robots (2015)Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction, pp. 27--34
-
Conference PaperAugmented reality: hard problems of law and policy (2014)2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp'14): Adjunct Publication, pp. 1283--1288
-
Conference PaperCollaborative verification of information flow for a high-assurance app store (2014)Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1092--1104
-
Ph.D. ThesisSecurity and Privacy for Untrusted Applications in Modern and Emerging Client Platforms (2014)
-
Conference PaperSex, lies, or kittens? investigating the use of snapchat’s self-destructing messages (2014)International Conference on Financial Cryptography and Data Security, pp. 64--76
-
Conference PaperWorld-driven access control for continuous sensing (2014)Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1169--1181
-
Conference PaperOperating system support for augmented reality applications (2013)Presented as part of the 14th Workshop on Hot Topics in Operating Systems
-
Conference PaperSecuring embedded user interfaces: Android and beyond (2013)Presented as part of the 22nd $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 13), pp. 97--112
-
Magazine/Trade PublicationBalancing privacy and functionality of third-party social widgets (2012)USENIX Magazine
-
Conference PaperDetecting and defending against third-party tracking on the web (2012)Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp. 12--12
-
Magazine/Trade PublicationSharemenot: Balancing privacy and functionality of third-party social widgets (2012)Usenix; login
-
Conference PaperUser interface toolkit mechanisms for securing interface elements (2012)Proceedings of the 25th annual ACM symposium on User interface software and technology, pp. 239--250
-
Conference PaperComprehensive experimental analyses of automotive attack surfaces. (2011)USENIX Security Symposium, 4(Unknown Issue), pp. 447--462
Presentations
-
Online Tracking and Targeting
(2019)
MisinfoDay - Seattle, WA
-
Privacy Risks from the Targeted Advertising Ecosystem: Web Trackers, Ad Networks, and Ad Purchasers.
(2018)
Workshop on Technology and Consumer Protection (ConPro 2018) - San Francisco, CA
-
Security in IoT
(2018)
GeekWire Summit - Seattle, WA